Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!



How Identifiable Are You On the Web?

grep -v '.*' * Re:Why don't browsers clean it up? (159 comments)

Is there a reason why browsers like Firefox return everything?

"All the better to track you with, my dear..." -- the NSA

(... aka The Big Bad Wolf. And do you really think your house of bricks is that opaque?)

4 days ago

Just-Announced X.Org Security Flaws Affect Code Dating Back To 1987

grep -v '.*' * Re:In before the trolls (172 comments)

Open Source ... merely guarantees that all of the bugs can be found.

Well it seems like Closed Source "merely guarantees that all of the bugs can be found" by crackers. (NO, they're not hackers.) They seem to do a pretty good job of finding and exploiting problems withOUT any copy of the source for reference.

(Well, I presume they don't. Maybe Bill Gates has a whole independent second fortune that we don't know about. Or: how DID Balmer afford to pay $2B for a bunch of guys walking around while bouncing a ball?)

about two weeks ago

Negative Online Reviews Are Not Defamation (At Least In Canada)

grep -v '.*' * Re:Common Sense Prevails (62 comments)

...but where's the profit in that?

It's like you expect the schools to larn thuse kids sumfin and then expect the graduates to actually think logically for themselves. If we did that -- THEN where would we be?

about two weeks ago

Ask Slashdot: Making a 'Wife Friendly' Gaming PC?

grep -v '.*' * Re:Don't fight it (720 comments)

There seems to be a double standard where people are expected to make ... sacrifices

Wife: Huh? There's no double standard here. Just fix it up or you won't have dinner or sex for a week or four. Then I guess you'll have lots of time to sleep on the couch to play with your (ermm) games.

about three weeks ago

How the World's First Computer Was Rescued From the Scrap Heap

grep -v '.*' * Re:Except... (126 comments)

Colossus absolutely was general purpose ... No, it wasn't

So which of you two are going to tell Colossus that?

about three weeks ago

The Schizophrenic Programmer Who Built an OS To Talk To God

grep -v '.*' * And God responds back... (452 comments)

Eliza says: "So you say you feel the need to worship me. Tell me more."

GLaDOS says: "Well it's about bloomin' time. Go reattach that part that fell off me already."

Clippy says: "You appear to be writing a holy book. Would you like to change my appearance to one of my 666 skins before I begin to hel...p? "

about three weeks ago

Highly Advanced Backdoor Trojan Cased High-Profile Targets For Years

grep -v '.*' * I don't NEEED no stickin' source code.... (143 comments)

Researchers have unearthed highly advanced malware ... spy on a wide range of international targets in diverse industries

Oh my! Evil people are actively breaking into computers! Just imagine what they could do if they actually had the source code to what the targets run.

It's only by using proprietary software are we able to keep ourselves safe like this.

about a month ago

Alva Noe: Don't Worry About the Singularity, We Can't Even Copy an Amoeba

grep -v '.*' * Don't Worry About the Singularity... amoeba (455 comments)

Ha! Appropriate /. tagline while reading: Pound for pound, the amoeba is the most vicious animal on earth.

about a month ago

How "Big Ideas" Are Actually Hurting International Development

grep -v '.*' * It takes government to save every village (92 comments)

It takes a government to save every village in the world...

Ideas that work well ... oftentimes only apply to the specific area which was studied. ... charitable development needs to stop thinking big and start working incrementally, village by village

But wait! Homogenizing problems is what the government excels at! It's "too hard" to examine all of the individual situations*, and they'll all match up in the wash, so let's come up with a single, proven solution that solves things for everyone, everywhere, always. Any Unforeseen Consequences, if they exist, have a short Half-Life.

I really hadn't considered that NGOs had succumbed to this, I thought it was just something in the culture in D.C. and elsewhere. (Space aliens from Mars with their mind control, still pining for our Earth women, maybe.)

So is this a self-limiting thing of politics, the gathering of people and ideas together for a common cause? In order to reach a consensus you have to flatten out the facts SO MUCH that in some situations you miss the problem completely or even aggravate it?

(This does not bode well for the upcoming One World Government. Maybe the Illuminati invented the internet for this very reason?)

*) Unless one of the members needs to profit from a particular situation; then we'll make an exception.

about a month ago

Google Launches Service To Replace Web Ads With Subscriptions

grep -v '.*' * Re:Ads (319 comments)

They all must be blocked.

No no, you quoted it wrong: "They should all be destroyed."

(The laughter at the end there needs a LOT more bass, and a whole lot more "Ha"s. He got it wrong too.)

about a month ago

Aereo Files For Bankruptcy

grep -v '.*' * Re:innovation thwarted (137 comments)

Supremes: a bunch of senile old luddites. Lesser judges ... judge du jour

Now now, be very careful there or someone'll attempt to go all GitMo on your a$$.

Why? Because you might be telling the truth there. And then they'll escort and torture (sorry, "interview") you until you finally tell them exactly what they want to hear.

Understand? Not what you said -- or not even perhaps the truth as you know it -- but what they expect and want you to say; the truth that they want to hear.

And then they'll stop -- who continues to torture a person once they've finally told everything they know?

(Because if they did, you might change your story yet again and that might make them ACTUALLY upset with you.)

about a month ago

Aereo Files For Bankruptcy

grep -v '.*' * Re:innovation thwarted (137 comments)


No ... Lesser judges wouldn't let them.

"There's nothing new under the sun."
--- Proverb

... "and it's our job to make sure it STAYS that way."
--- entrenched corporate interests.

"...unless we own or can completely control them."
--- entrenched corporate interest lawyers.

about a month ago

Aereo Files For Bankruptcy

grep -v '.*' * Re:innovation thwarted (137 comments)

They were either a CATV system or not a CATV depending on the way the ... judge du jour

So: the judges weren't all consistent with each other throughout the legal system. I'd like to sue them over this but unfortunately I have no standing to do so, and even if I tried the courts wouldn't even begin to listen to me.

If only there were a company around that had a nonsensical judgement against them that could perhaps start working on this (... if only they weren't broke.)

about a month ago

Hacker Builds a Dark Net Version of the FBI Tip Form

grep -v '.*' * Re:Brilliant (41 comments)

It shows the authorities how TOR can be used in their favor...

But ... but ... what if we want to waterboa^H^H^H chat with the "informant"?

After all, if he's willing to betray his friends, how can we continue to trust him without sharing a little drink once in a while?

Back on topic: yes, but you assume that the people in control (a) WANT Tor in a good light, (b) don't want their department to get tainted with the "evil Tor" stigma, and (c) actually understand what's going on.

Strike that last one, the people right UNDERNEATH the people on top know how things work; the people on top know how people work.

Paranoid? I'm not paranoid. ... Why do you continue to look at me like that? :-)

about a month ago

If You're Connected, Apple Collects Your Data

grep -v '.*' * Re:Yay :D (313 comments)

are you trusting that "off" means off.

Well in California, Yes now means "Yes". I'm afraid that it's only "off" in some context you don't (aren't meant to) understand. But it's OK, it's Apple, after all --they're just backing up all of your keystrokes and swipes to the iCloud in case you forget them. After all: you might forgot how to reenable it and they only want to help.

OTOH, I've got a current Onkyo amp with a bright blue OFF light. It recently confused a friend of mine who was trying to turn off the stereo. She couldn't get both the light and the speakers off at the same time and complained that it was broken.

I agreed.

about a month ago

Lead Mir Developer: 'Mir More Relevant Than Wayland In Two Years'

grep -v '.*' * Re:I still don't see what's wrong with X (226 comments)

Seriously, what's so broken about X? Is it just a pain in the ass for developers to work with?

I thought I'd take a look at X. And suddenly it became easy to get the interface to behave *exactly* the way I wanted instead in somebody else's idea of what I should want.

And the documentation was complete, correct, and easy to follow.

Here's a transcript of a video call I recently had with a Lead Mir Developer(*): Ahhh! Geez, over here -- it's another luzer. Look, using this is just so obvious it's painful. We write wonderful, self-documenting code and haven't had a bug in months! And it's completely compatible with X -- here, let me show you.

See? It starts up and looks and responds completely like X, but it's got our better code and much better responsiveness. All you have to do it is read the simple documentation that Joe is writing by looking at his personal copy of the source code once he finishes up with his editor. The physical book will be placed on Amazon's self-publishing area shortly for a small pittance once we finally release the production code to the world. We'll be sure to keep releasing new books as the interface changes so you can expect an continual enjoyable reading experience.

Once you see what great things we've done for you you'll just wonder how you ever put up ... Hmm, what? Joe isn't here anymore? Did he quit? No, he died?? No problem, we'll get Indu to pick up right where Joe left off; he's almost done with that nightly beginning English class. We'll let him write the SystemD hooks too, it'll be good practice for him to actually write some code for once.

Well OK, so never mind all that, it'll be out shortly. Let me show you the software: I start my system and Mir wakes up and responds exactly like X does, and you can't even tell the ... WOULD YOU STOP LOOKING over my ...what do you mean I forgot to start the Mir daemon and this actually *IS* X? Oh well duh, you're right.

So, we restart our display server and ... what the HELL is THIS? What is that screen tearing bit and that looks like the top half of a line of text with the corrupted bottom half way over there. Who wrote this junk, it just looks horrible on ... What do you mean, this is our current production code?

Ummm, yeah, it'll all be great once we're completely finished, though, it's over 90% done -- you'll wonder how you ever lived without it. Yeah, well, umm -- BRB, OK?


(*) and if you believe this, I've got an guaranteed Ebola cure to sell you. Only $19.95 -- order now and get the second days' dose for free!

about 2 months ago

The "Man In the Moon" Was Created By Mega Volcano

grep -v '.*' * Shouldn't that be the "Man ON the Moon?" (33 comments)

If he was IN the moon, he's either an Evil Genius in his hidden lair, or a guy struggling to breathe for a multitude of reasons.

Either way, I'd still want to know about him. ("One MILLION Dollars...")

about 3 months ago

Ebola Has Made It To the United States

grep -v '.*' * Re:Quarantine? (475 comments)

So if a TSA person frisks someone with Ebola, does he pass it on to all of their subsequent "customers?"

I think NOT, because it's the bodily fluids that pass it on, and they're groping but not kissing all the passengers -- at least usually. If the one who's going to scan me is doing that, I want a DIFFERENT agent just on general principals.

about 3 months ago

Ebola Has Made It To the United States

grep -v '.*' * Don't freak out. (475 comments)

You're NOT contagious until you're actively showing symptoms, and then you have to somehow get it on someone else. It's not going to chase down an uninfected person like a tiger on Nat Geo or magically float thru the walls like a ghost.


"The best means of prevention are similar to those you would practice to prevent the common cold or the flu, and it starts at your bathroom sink. Thoroughly washing your hands, and practicing good hygiene with soap and water, is a good first step to preventing infection."

The early signs and symptoms of the Ebola virus include:

  1. Fever
  2. Severe headache
  3. Joint and muscle aches
  4. Chills
  5. Weakness

Symptoms may become increasingly severe over time, the Mayo Clinic said, with additional symptoms present, including:

  • Nausea and vomiting
  • Diarrhea (may be bloody)
  • Red eyes
  • Raised rash
  • Chest pain and cough
  • Stomach pain
  • Severe weight loss
  • Bleeding, usually from the eyes, and bruising (people near death may bleed from other orifices, such as ears, nose and rectum)
  • Internal bleeding

Be careful, but not frightened.

about 3 months ago

NSA Director Says Agency Is Still Trying To Figure Out Cyber Operations

grep -v '.*' * Re:Protect us against cyber-threats? (103 comments)

Well then I guess I'm a racist cunt too, because I agree with him (amiga3D (567632)) and I think he's right on the money: friends, Mecca, NSA, Patriot Act and all.

We'll both go take our racism over there, out of your way. Have fun chatting with the highly enthusiastic Religion of Peace supporters -- but I'm afraid you'll need a piece handy if you'd like to continue the conversation for an extended period of time.

May I point you to this highly charged and offensive picture and article here. His point is that this picture is designed to offend nearly everyone, yet no one has died from it -- that's been reported. But add a picture of "Allah" in there and things might get interesting. But I'm sure all of those Muslims were all just innocently sitting in a circle singing Kumbaya because that's all they ever do, right?

ISIS would like me dead (not personally) because I'm an atheist. Yep, they're extremists. So is most everyone (I assume) at Westboro Baptist Church, but at least they haven't killed anyone.

Maybe cockroaches should inherit the Earth -- we don't seem to be doing too hot of a job lately.

Mr. Cuntness signing off.

about 3 months ago



Article: The Secret Life of Passwords

grep -v '.*' * grep -v '.*' * writes  |  about a month ago

grep -v '.*' * (780312) writes ""We despise them – yet we imbue them with our hopes and dreams, our dearest memories, our deepest meanings. They unlock much more than our accounts."

Interesting article on people choosing their own NOT "fully safe" passwords.

For years I've used self-generated passwords as reminders or motivation. (As opposed to Stapling Batteries to Horses!) A very long time ago one of my passwords was "hYTTagt?" — have You Talked To a girl today? I'm shy, so that was a good prompting reminder.

Now, with a password manager, they're all randomized garbage to whatever the respective system will accept.

(What do you mean you want exactly 9 Latin character symbols each with exactly 2 strokes? Who the hell writes systems like that now-a-days? Do you think you're avoiding a SQL Injection Attack? (See: Bobby Tables.) )"

Link to Original Source

A black hole laser. No, really.

grep -v '.*' * grep -v '.*' * writes  |  about 2 months ago

grep -v '.*' * (780312) writes "I've heard of everything now.

"A single phonon is too weak to observe, but the phonons inside the black hole bounce back and forth between the inner and outer horizons, triggering the creation of more Hawking phonons each time, much like a laser amplifies light. Physicists call this effect a black hole laser."


NOW I'm sure that "everything has been discovered""

Link to Original Source

Homeland ICE Mission Creep, anyone?

grep -v '.*' * grep -v '.*' * writes  |  about 5 months ago

grep -v '.*' * (780312) writes "Now that all of the terrorists have been caught, no kids are waiting near the border, and Ebola is fully contained, U.S. Department of Homeland Security's Immigration and Customs Enforcement, or ICE, is on the hunt for those notorious killers, destroyers, and child-rapists of IP who have released "The Expendables 3" early.

I'm so glad that everything else is completely under control in Immigration and Customs Enforcement. On the other hand they just could be after Jet Li (Chinese) or Arnold Schwarzenegger (Austrian), so I guess that's OK after all. /sarcasm.

PS — don't tell me about Arnold's new citizenship — *I* know a foreigner when I see one. He talks funny, y'all."

Favorite unexpected comment/slang/denigration phrase?

grep -v '.*' * grep -v '.*' * writes  |  about 8 months ago

grep -v '.*' * (780312) writes "I just ran across a new turn-of-a-phrase: "kitten-chewing software vendor." (They were maligning a software vendor for an $8K per seat application upgrade charge from XP to W7.) Now that may or may not be justified — my point here is that the word imagery was more shocking than the upgrade charge. (Then again, maybe I'm just jaded.)

So, what's your favorite new or old phrase? Mine is still: "No good deed goes unpunished", although "Just because you're paranoid doesn't mean they're not out to get you" is looking better and better. (The "I'm from the government and here to help you" joke just seems to be a lost cause.)

Now: ID-10-T error is good too, although I've lately come to realize that there are some smart people who like things other than computers and just want their immediate problem solved so they can move on to their other fun, non-computer stuff. That's was a surprise — fine, but there also seem to be a lot of ID-#-T people too, where # seems to be their IQ, or at least their interest in anything that I can detect."

Link to Original Source

Crypto decoding software and keys moved to hardware

grep -v '.*' * grep -v '.*' * writes  |  about a year ago

grep -v '.*' * (780312) writes "Beyond Broadband Technology will soon help deliver entertainment content and data securely to consumers.

“It provides a totally secure communications path” that uses a “downloadable conditional access system,” or DRM (digital rights management), with its hardware specifically designed so only a licensed user can access the content.

An outside expert given access to the BBT system says it appears to be a real innovation. “It is a fundamental step forward,” says Jim Turner, the former technical director of ATIS,

The BBT “core” patent is very broad. (Well, aren't they ALL now-a-days? And yes, it points to managing an on-line card game. I too don't yet know what they're extrapolating.)

“Were ready to prove what we’ve done is unique and nobody has done it before. It exists and it is in secure microchips and the implications are very interesting.”

So: anybody got a 16mm camera and an 8-track recorder they're not using?"

Link to Original Source

Open Source Assists Crime

grep -v '.*' * grep -v '.*' * writes  |  about a year ago

grep -v '.*' * (780312) writes "("Source Code" and "Open Source" are equivalent ... right? :-) )

Just listen to this (senior security strategist) expert:

Concern is brewing that the bad guys [will] use knowledge of Acrobat source code to intensify already widespread attacks revolving around corrupted PDFs.

"Having the source code to an application is like having the blueprints to a product," says ... an IBM company, "having access to it expedites the vulnerability identification process — leading to more weaknesses being identified and used for cybercrime."

So: source code is bad, you should hide it at all costs, if not completely prevent it altogether. Gotcha.

Unfortunately I can't find the opposing text I read on crypto design long, long ago. Basically it argued that the best crypto design is completely published where everything is open and described, down to key generation and even possible starting encryption values. In addition, sample in-the-clear and coded messages and keys are given — Every Single Thing you need to encode and decode the given messages, as well as how to mint your own keys.

Here, instead of being somehow hidden and secret, everything is disclosed to everybody. Now, source code isn't crypto design, but the same rules really ought to apply. Disclose everything. Yep, the "bad guys" might find and utilize something first, but at least the "good guys" now have a chance of finding the same problem. But that goes against the trade secrets and 3rd party company contracts and NDAs though, and after all — THAT'S what's really important.

That would also create a problem for the PMs: programmers would now be wasting time producing (hopefully) secure code instead of implementing new sell-able features. And who wants to pay for features not on the box? Hell, when was the last time you saw:

* New! Now Actually Works as Described AND Implied

... on anything?

The analogy: Blueprints for a safe and lock are completely described. A compete, actual working model is given as well. This exact same safe design is then used in production.

Car analogy: describe everything about your engine, frame, and suspension design. PM / Lawyer anti-assists: ... but forget about publishing the trade-secret microcode, we'll just sell the Automobile Diagnostic Tools to interested monkeys^W parties with enough money ^W^W approved credentials every year. (You DID update the ROM year-stamp so the older OBD-II machines will refuse to read it, right?)

Interesting juxtaposition: It's just a terrible, horrible thing when closed-source code becomes available, yet open source (by definition) does it all of the time, and the agreed-upon absolute best design (in another field) is when everything is completely described and above-board with no hidey holes.

Why, it's almost like closed-source is using obscurity-by-design and hiding all of their marginal cases they're not interested in fixing. After all, if you can't see the problems they don't exist — right?

Please Compare and Contrast. This WILL appear on the final."

Link to Original Source


grep -v '.*' * has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?