Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!



When will large-scale IPv6 deployment happen?

athakur999 T-Mobile (305 comments)

Many of the newer phones from T-Mobile (the US version, anyway) are configured out of the box to use native IPv6. A third of their data traffic is now terminating on IPv6. They're using NAT64 for reaching hosts that don't have a native IPv6 address.

IPv6 rollout is happening, just not in the places some of us are looking.

about 3 months ago

Windows 8 Tells Microsoft About Everything You Install

athakur999 Re:Poor comparison (489 comments)

Don't be too sure about your Play store example. Unless something has changed in the most recent Play store version, the Play store will still bug you that an update is available even for apps you installed via another method. If the Play store app is pinging Google's servers checking for updates then Google definitely has the ability to know all of the apps you have installed on your phone, regardless of how they were installed.

about 2 years ago

Looks Like the End of the Line For LimeWire

athakur999 Re:They can't distribute the client any more? (277 comments)

Peer discovery is the very essence of the Gnutella protocol used by Gnutella. The Limewire client probably uses Limewire's servers to get an initial list of peers to connect to but beyond that, they shouldn't be needed. There are alternative methods to do this initial peer discovery as well so even if you take away Limewire's servers, things should still work fine, it just may take longer for your client to discover a decent amount of peers.

more than 3 years ago

Chevy Volt Not Green Enough For California

athakur999 Re:The leaf is not a hybrid (384 comments)

I can't believe how many people here seem to misunderstand this... As you say, the Volt is an EV. It can run without a drop of gasoline if you want it to, something a hybrid can't do. The drivetrain of the Volt is purely electric. The gasoline part of the Volt is just a generator to keep providing juice to the electric motor if the battery pack runs out. If you stay within the range of the battery pack, the generator will never need to turn on.

more than 4 years ago

Open Source GSM Cracking Software Released

athakur999 Re:Awesome (112 comments)

There is a key value on the SIM. The same key value is also provisioned in your subscriber profile in your provider's main subscriber registry (aka an HLR - Home Location Register).

When you're connecting to a mobile network, the serving switch sends a request to your provider's HLR. The HLR sends a set of tokens and an "expected result" value to the serving switch. The serving switch then sends those tokens down to your mobile. Your mobile then sends those tokens to your SIM card and your SIM card sticks them into a function along with the key value and produces a result value. The result value is passed back to your phone and your phone passes it back to the serving switch. The serving switch then compares the result value from your phone with the "expected result" value from your provider's HLR and if they match up, you're good to go.

Only the SIM and the HLR know your individual key value. Your mobile and the serving network are never provided this value. That's why your phone can't simply replicate the function of your SIM, because it would need to know the key value.

I think the problem alot of people have is they think of the SIM as just a dumb piece of storage. It really is a separate little computer in it's own right that just so happens to live behind your phone battery.

more than 4 years ago

HP To Buy Palm For $1.2 Billion

athakur999 Re:Doomed (271 comments)

On the plus side, it means they'll sell the new Palm phones for practically nothing!

However, replacement batteries will cost $100. Also, they can't be recharged and the one that comes with the phone will only last you about 10 minutes.

more than 4 years ago

All GSM Phones Open To Attack, Tracking

athakur999 Re:GSM != iDEN (119 comments)

The differences between iDEN and GSM are primarily on the access side. The network side is GSM, as is most of the access side messaging. The "attack" being described here is on the network side, so that would make Sprint susceptible to the same thing, at least its Nextel customers.

more than 4 years ago

All GSM Phones Open To Attack, Tracking

athakur999 Re:GSM != CDMA (119 comments)

The Nextel portion of Sprint is actually GSM.

more than 4 years ago
top Acquires EveryDNS

athakur999 Re:As a current free DynDNS user... (125 comments)

EveryDNS is more like the "custom DNS" feature in DynDNS which uses their servers to provide nameservers for your own domain. DynDNS's custom DNS service is $30/year if you aren't hosting with them, while EveryDNS is/was free.

more than 4 years ago

Black Screen of Death Not Microsoft's Fault

athakur999 Re:When you think "what's the difference" ... (583 comments)

Sure, Linux is a capable multi user system but the vast majority of Windows machines that /. would love to see converted to Linux will be single user systems. The fact that malware running with user-level privileges can't touch the files of other users would be of little comfort to single user machines.

more than 4 years ago

Black Screen of Death Not Microsoft's Fault

athakur999 Re:Really? (583 comments)

Does the sudo part really matter anyway? The most important files on my system are those in my home directory and they're owned by my own user account, thus no privilege escalation is required to touch them.

Having great security around the base OS is a good thing but if you don't also provide good security for the users' files, it's kind of like getting a bunch of guards to protect a bank but leaving the vault in an unprotected building next door.

On the other hand, I really don't want to have to deal with UAC/sudo/etc. every time I edit one of my own documents, so it's kind of an unwinable situation that only good backups can protect against.

more than 4 years ago

What Does Google Suggest Suggest About Humanity?

athakur999 Re:Peroxide (513 comments)

I suppose if you're ridiculously pedantic, you'd interpret "can you put peroxide in your ear?" as meaning "is it physically possible to put peroxide in your ear?" and the answer, of course, is yes and you'd have a good LOL and go back to counting the number of hairs on your arm.

Normal people, on the other hand, will interpret it as "is it a good idea to put peroxide in your ear?" which is indeed a valid and good question.

more than 4 years ago

Some Early Adopters Stung By Ubuntu's Karmic Koala

athakur999 Re:Actually (1231 comments)

I ran into "error 15" too. I have two hard drives and I think GRUB got the drive ordering mixed up. It put the boot drive as "drive 1" in the boot file when it really should have been "drive 0". Unlike GRUB1 though, it didn't give me an option to manually try altering parameters at that point, which was annoying.

I ended up removing my 2nd drive, reinstalling Karmic (this time it did mark it as "drive 0"), and then reinstalled the 2nd drive after the installation was complete and everything worked fine after that. Hopefully GRUB won't mess things up again at the next kernel upgrade though. I think GRUB has some configuration options to fix bad drive mappings so I'll have to look into that.

more than 4 years ago

Analyst Predicts Android Overtaking iPhone In 2012

athakur999 Re:Symbian and Windows Mobile (385 comments)

Nokia is starting to release phones with its Maemo operating system. Maemo is Linux based and uses a Mozilla-based web browser. The new N900 is, I believe, the first phone to use it.

Nokia hasn't made any statements about phasing out Symbian in favor of Maemo but it at least it's a good start.

more than 4 years ago

Google Groups Used To Control Botnets

athakur999 Re:Google Groups is just a way to Usenet (63 comments)

It's true Google Groups can be used to view Usenet groups, but you can also create groups that are completely independent of Usenet with it. That seems to be the case here.

about 5 years ago

Using a House's Concrete Foundation To Cool a PC

athakur999 Re:Resale value of house? (465 comments)

Or sell the house to Ted Stevens and tell him that's where his Internet comes out of.

about 5 years ago

Fear of Porn URL Exposure Discourages Firefox 3 Upgrade

athakur999 URL Shorteners (673 comments)

Use a URL shortening service to create URLs to point to your favorite websites you don't want others to see, and bookmark the shortened version.

Then, give the bookmark name itself something non-incriminating. Like just a set of initials for the website name.

These two methods will prevent anything incriminating from your bookmarks showing up when someone starts typing something in the address bar.

This won't help for any pages in your history, but fortunately that parts easy. Judicious use of "Clear Private Data" will take care of that.

about 5 years ago

Nielsen Struggles To Track Modern Viewing Habits

athakur999 Re:My Pet Peeve (248 comments)

A Tivo without a subscription operates like old VCRs do. You can schedule recordings based on channel/time/duration. With a subscription, you can do it based on the name of the show instead.

about 5 years ago

Why Is Linux Notebook Battery Life Still Poor?

athakur999 Re:power saving tip: disable the optical drive (907 comments)

Once you the movie ripped to a file, just copy it to a flash drive (or a SD card if your notebook has a reader). Then you don't have to worry about either the DVD drive or the hard drive motor using up power (assuming you have a traditional hard drive to begin with as many netbooks use flash-based ones now).

about 5 years ago

Local Privilege Escalation On All Linux Kernels

athakur999 Re:Local Privilege Escalation On All Linux Kernels (595 comments)

But if you have any programs that access the Internet that have a bug that allow running arbitrary code, couldn't a remote cracker could exploit the vulnerability in that program to invoke this bug, and through that gain root access to the machine? It sounds like the program being exploited could even be running as a regular user.

more than 5 years ago


athakur999 hasn't submitted any stories.




athakur999 athakur999 writes  |  more than 11 years ago

I've finally entered the 21st century and started up my very own weblog. I don't have the courage yet to post my innermost thoughts though, so expect the usual drivel.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>