Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!



Ask Slashdot: What To Do About the Sorry State of FOSS Documentation?

fulldecent CI (430 comments)

Now that server time has reduced in cost, you can add continuous integration to a project and make full documentation a requirement.

For example, here is a CI tool for KDE which tracks missing documentation at English Breakfast Network

about two weeks ago

Japan To Offer $20,000 Subsidy For Fuel-Cell Cars

fulldecent Re:Why isn't the U.S. doing things like this? (156 comments)

The correct solution(1):

Recover costs from wars in the middle east this millennium from taxes added to gas consumption, domestic or foreign, until repaid.

This would be a ~80 per gallon if spread over 10 years.

This is assuming we fought the war "for oil", whatever the hell that means.

about 1 month ago

Comcast Customer Service Rep Just Won't Take No For an Answer

fulldecent Re:So... (401 comments)

The correct hard ball approach is: I am recording this call and forwarding to my local cable franchise authority.

This is the entity that your local franchise must go through to offer service in your area and they are the ones that set rules like the number of seconds you may be placed on hold until you get a human without them having to pay a fine.

about a month ago

Consciousness On-Off Switch Discovered Deep In Brain

fulldecent Re:Brain ZAP! (284 comments)

But just imagine a current attack vector today:
  * Remotely infecting a personal computer -- Demonstrated, publicly available
  * Tethered infection of PC to mobile phone -- Demonstrated, publicly available
  * Bluetooth infection of common SOCs on pacemakers -- Not published
  * Pacemaker delivery of ill effects to user -- Demonstrated, details not public

As more consumer-friendly devices are produced that have a close connection to humans and are marketable, the number of attack vectors increases.

about a month and a half ago

Massachusetts SWAT Teams Claim They're Private Corporations, Immune To Oversight

fulldecent Filter -5 funny -5 insightful +5 informative (534 comments)

Does anyone remember the days when you might expect one of the comments here to provide an analysis of MA laws and find the line that makes their "corporations are exempt" argument void?

I know, right, and it was like: hey what are all you new people here doing with these 4-digit user IDs?

about 2 months ago
top, Mensa Create Dating Site For Geniuses

fulldecent The second test (561 comments)

After joining Mensa, you get invited to plenty of card games, speeches and nerd discussions. But you're still dealing with the general public.

Now, if there was a second test... where then only let in people that care about their appearance, maintain good eye contact, have a modicum of physical fitness, then I would definitely like to join that inner circle.

about 2 months ago

Supreme Court Rules Against Aereo Streaming Service

fulldecent SlingBox (484 comments)

How is this different than SlingBox?

about 2 months ago

San Francisco Bans Parking Spot Auctioning App

fulldecent Re:They hate our freedom (404 comments)

And yes, this is the correct way to deter behavior. Rather than another cease and desist which is probably based on no more legal authority than "I'm wearing a badge"

about 2 months ago

San Francisco Bans Parking Spot Auctioning App

fulldecent Law (404 comments)

That sounds like a great response from the police...

And what exact public law is being broken now?

about 2 months ago

Improperly Anonymized Logs Reveal Details of NYC Cab Trips

fulldecent Re: Data Security Officer (192 comments)

This is correct. MD5(salt + data). Salt is same for EVERY MD5 operation. Create the file and then delete the salt, done. This is called keying.

about 2 months ago

Mozilla Introduces Browser-Based WebIDE

fulldecent XUL (132 comments)

Hey that's cute, does anyone remember XUL from last decade?

about 2 months ago

TrueCrypt Author Claims That Forking Is Impossible

fulldecent Re:What whas the problem in the first place? (250 comments)

I think that one is easy... just ask him "Have you ever received an National Security Letters?". There are only two responses to that question: "No" or NULL.

about 2 months ago

Man Behind Hacks of Bush Family and Other Celebs Indicted In the US

fulldecent I am your elected representative (65 comments)

Speaking on behalf of Slashdot, the nerds and computer enthusiasts, we ask:

    "How did he get caught?"

about 2 months ago

Latin America Exhausts IPv4 Addresses

fulldecent Skip (197 comments)

IPV6 is like the iPhone *c and *s models that everyone skips while waiting for the next version -- not enough new features, the current one is good enough, and "polycarbonate" doesn't that just mean "plastic"?

about 2 months ago

Netflix Trash-Talks Verizon's Network; Verizon Threatens To Sue

fulldecent Re:Redbox Instant (364 comments)

> The customer service rep actually told me I should use Redbox Instant instead

Please provide these logs. This is newsworthy.

about 2 months ago

Replicating the NSA's Gadgets Using Open Source

fulldecent Re:Ok wait, hang on (47 comments)

It is audio exfiltration, not audio infection. Not very oh-my-god stuff here.

about 2 months ago



Ask Slashdot: Are there any responsible security disclosures that ended well?

fulldecent fulldecent writes  |  about 10 months ago

fulldecent (598482) writes "Technology online changes fast and large organizations often make poor implementations of this technology leading to security vulnerabilities. Some of the failures are egregious like websites that use a user ID in the URL to authenticate that user, and other take a little curiosity to find. Either way, they will be found. The people on Slashdot, I feel, are more likely to want to report this to the vendor and do these things for sport. Personally I take the smaller ones and mail a letter to the vendor and then post online in a few weeks. For bigger ones I wind up in high-pressure phone calls with "private public partnership" agencies, end up signing something unfavorable and the resolution still feels bad.

So, who out there is responsibly disclosing vulnerabilities? Are you getting public credit? Are you involved in (and getting paid for?) for a technical fix? Are you feeling good about the result? Do the rules still apply for state-protected industries like banks? And which lawyers provide advice to the finders, who are just normal people and don't have money and expertise dealing with lawyers?"

Link to Original Source

NH Supreme Court hears case on anonymous sources

fulldecent fulldecent writes  |  more than 4 years ago

fulldecent (598482) writes "The New Hampshire Supreme Court heard oral arguments Wednesday in a lawsuit that calls into question the legal protections available to independent Web sites that cover news.

The case involves mortgage lender Implode-Explode, a Las Vegas-based site launched in 2007 that publishes stories about the meltdown of the mortgage industry. The court did not make a final decision on the case Wednesday, but one of its options could be to send the case back to the lower court for further review and litigation on specific points of law."

Link to Original Source

Using comics to demonstrate protocol interactions

fulldecent fulldecent writes  |  more than 5 years ago

fulldecent writes "It is important to make your articles are reachable to non-technical audiences. This article uses a comic to demonstrate a simple HTTP interaction and why the technical details are important. The underlying post talks about TD Ameritrade and how they are selling users' financial information to News Corp via a cross-site image fetch."
Link to Original Source

Verizon trails SiteFinder 2

fulldecent fulldecent writes  |  more than 7 years ago

fulldecent writes "On June 11, 2007, Verizon Online will begin the trial of a new Advanced Web Search service designed to reduce the amount of dead-end, "no file exists" or similar error messages you see and to help you quickly find the destination web site you were seeking. If you type a nonexistent or unavailable URL (e.g., www.verizon.cmo), or enter a search term, into your browser address bar, Verizon may present you with an Advanced Web Search page containing suggested links based upon the query you entered. The Advanced Web Search page would be presented instead of your receiving an NXDOMAIN or similar error message. The Verizon Advanced Web Search page may impact applications that rely on an NXDOMAIN or similar error message and may override similar browser-based search results pages. If you would prefer not to receive Advanced Web Search pages from Verizon, you should follow the opt-out instructions that are available by clicking on the "About the Search Results Page" link on any Advanced Web Search page."
Link to Original Source


fulldecent has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>