Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

The Binary Code In Canada's Gov-Gen Coat of Arms

bagsta Maybe... (486 comments)

... this number represents the coordinates of a lost treasure... :P

about 4 years ago
top

Stuxnet Analysis Backs Iran-Israel Connection

bagsta There is ... (307 comments)

... also an analysis from F-secure about Stuxnet here.

about 4 years ago
top

Berlin Wall 'Death Strip' Game Sparks Outrage In Germany

bagsta Instead of... (193 comments)

... accusing the game's creator, it's better to accuse the leaders and the people who allowed these things to happen back then. If they don't want similar games to exist, then they should not have allowed these actions to happen in the first place. I think the same applies to this.

about 4 years ago
top

Steve Jobs Tries To Sneak Shurikens On a Plane

bagsta I think... (661 comments)

... he wanted to take the Suriken in the plane in order to test the durability of the glass of the new iPhone... with the Ninja way... :)

more than 4 years ago
top

Microsoft's Adaptive Touchscreen Keyboard

bagsta Re:Seen before ... (77 comments)

I find it very impressive, but as I can see it's a concept ... for the time being... But I would like to see in production...

more than 4 years ago
top

'u' — the First Authentic Klingon Opera On Earth

bagsta Will They Accept The Invitation...? (165 comments)

An invitation by Klingon language expert Marc Okrand has been sent to Kronos, home planet of the Klingons, via radio telescope.

Just waiting if they are going to accept or not

more than 4 years ago
top

How Death Rally Got Ported

bagsta Re:I read... (89 comments)

Sorry, just ignore this comment and read the above. Cheers

more than 4 years ago
top

How Death Rally Got Ported

bagsta I read... (89 comments)

... the article and I found it interesting. But it would be more interesting if the code was open source and could see all these changes with our eyes, just for educational purposes. A nice article that I came across lately just review the code of Doom which ported to iPhone by iD.

more than 4 years ago
top

How Death Rally Got Ported

bagsta I read... (89 comments)

... the article about porting the game and I found it interesting. It would be better, though, to be open source and would be able to compare the changes in the code, just for educational purposes. Recently I came across with a rather interesting article describing the process of porting the open source code of Doom to iPhone.

more than 4 years ago
top

Pentagon Demands Return of Leaked Afghanistan Documents

bagsta I hope... (523 comments)

... DoD won't do a war in order to find those documents, such as the war in Iraq in order to find the WMDs...

more than 4 years ago
top

FBI Instructs Wikipedia To Drop FBI Seal

bagsta FBI seal is an explotion device... (485 comments)

I believe that FBI have to concentrate on how to catch terrorists and not if a web site has the seal or not. Except if they believe that wikipedia is a terrorist organisation and the seal is some kind of weapon ready to explode...

more than 4 years ago
top

Crack the Code In US Cyber Command's Logo

bagsta I think that... (380 comments)

...the binary value is much easier to decipher...
000101000111
010011110010
100110010000
010110001100
111000110000
000000000000

more than 4 years ago
top

Wikileaks Founder Advised To Avoid American Gov't

bagsta There is... (632 comments)

...an interesting article here regarding this story about the arrest of Manning after the information that were given by Adrian Lamo.

more than 3 years ago
top

Sniffing the Wireless Traffic of MIT Students

bagsta It would be ... (218 comments)

... interesting if someone could sniff the wireless traffic in dormitories...

more than 4 years ago
top

NASA Finds Cause of Voyager 2 Glitch

bagsta Lasts longer... much longer... (283 comments)

Voyager 2's initial mission was a four-year journey to Saturn, but it is still returning data 33 years later

It must have one of these batteries

more than 4 years ago
top

NASA Finds Cause of Voyager 2 Glitch

bagsta Voyager 2 source code... (283 comments)

So, for that reason we couldn't find any alien...

#include <stdio.h>
#include <stdlib.h>

#define TRUE 0x00
#define FALSE 0x01

...
int sock_fd;
char line[50] = "Alien found!!";
int size = 15;

...

if (ALIEN_FOUND == TRUE)
send(sock_fd, line, size, 0);
else
continue;

...

more than 4 years ago
top

NIST Releases Updated Handbook of Math Functions

bagsta It would be... (128 comments)

...more than welcome if they could make an off-line digital DLMF in any of pdf, djvu, odt or any other format...

more than 4 years ago
top

Mpeg 7 To Include Per-Frame Content Identification

bagsta MPEG-7... (273 comments)

For the curious one, go here and start hacking MPEG-7...

more than 4 years ago
top

A Call For an Open, Distributed Alternative To Facebook

bagsta There is a... (363 comments)

... spreadsheet with some facebook alternatives...

more than 4 years ago

Submissions

top

1.5 million stolen Facebook IDs up for sale

bagsta bagsta writes  |  more than 4 years ago

bagsta (1562275) writes "A hacker named Kirllos has a rare deal for anyone who wants to spam, steal, or scam on Facebook: an unprecedented number of user accounts offered at rock-bottom prices. Researchers at VeriSign's iDefense group recently spotted Kirllos selling Facebook user names and passwords in an underground hacker forum, but what really caught their attention was the volume of credentials he had for sale: 1.5 million accounts."
Link to Original Source
top

Nokia launches Ovi maps to challenge to sat-navs

bagsta bagsta writes  |  more than 4 years ago

bagsta (1562275) writes "Phone giant Nokia has launched a free map and navigation service for its handsets that analysts believe could challenge stand-alone sat-nav devices. The service stores maps on the phone, cutting down the need to update and download new ones over the network. Ovi maps will initially be available on 10 handsets and will offer so-called "turn-by-turn" navigation, similar to that in existing GPS devices. It can display local data from travel guides, such as Lonely Planet. Users can also post their location to Facebook."
Link to Original Source
top

Computers Unlock Secrets Of Ancient Script.

bagsta bagsta writes  |  more than 5 years ago

bagsta (1562275) writes "Four-thousand years ago, an urban civilization lived and traded on what is now the border between Pakistan and India. During the past century, thousands of artifacts bearing hieroglyphics left by this prehistoric people have been discovered. Today, a team of Indian and American researchers are using mathematics and computer science to try to piece together information about the still-unknown script."
Link to Original Source
top

What is your favorite pair of allies, enemies?

bagsta bagsta writes  |  more than 5 years ago

bagsta (1562275) writes "What is your favorite pair of allies, enemies?
1)Microsoft with Yahoo vs Google(it's happening)
2)Microsoft with Google vs Yahoo(not likely)
3)Google with Yahoo vs Microsoft(interesting)
4)Microsoft with Yahoo with Google vs A.S.E.O.S.W.B Corp(Alien Search Engine Operating System Web Browser)?"
top

Twitter help Iran's anti-government protesters

bagsta bagsta writes  |  more than 5 years ago

bagsta (1562275) writes "According to this article Obama administration asked Twitter to postpone a scheduled maintenance in order to help the protesters to communicate each other."
top

Hacking in Movies

bagsta bagsta writes  |  more than 5 years ago

bagsta writes "I quote from here:

It brings me great joy to see what Hollywood thinks they can get away with when it comes to computer hacking. Usually in the movie the hacker is using some beyond versatile software that allows him or her to easily turn off the city's power grid or change traffic signals with either a click of a button or a few easy key strokes. Granted, Hollywood has to do this because computer illiterate viewers may not be able to keep up with what's going on if they aren't given something easy to follow. Plus, watching someone type out everything via command line could kill the pace of the movie and frankly is not very exciting or compelling to watch. Conversely, there are the times when the hacking is so over the top that you simply can't turn away from the absurdity. With that said, here's a retrospective of hacking in film.

It continues with some examples about some movies."

Journals

Slashdot Login

Need an Account?

Forgot your password?