×

Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

Comments

top

OwnCloud Dev Requests Removal From Ubuntu Repos Over Security Holes

iYk6 Re:Why not allow the update into the repos? (126 comments)

Why wouldn't Canonical simply update the repository with patches that address known security vulnerabilities?

"multiple critical security bugs for which no fixes have been backported,"

The summary answers your question. There are no patches that address the known security vulnerabilities.

it's up to someone from the Ubuntu community to step up and fix it.

If someone creates a patch, they are welcome to submit it, and maybe the package maintainer will apply it.

about 2 months ago
top

Irish Politician Calls For Crackdown On Open Source Internet Browsers

iYk6 Re:I think I speak for us all... (335 comments)

He starts by condeming browsers and proxies that help people browse the internet anonymously. Then he jumps to saying that anonymous browsing leads to trading drugs, weapons, and pornography. Then he commends the USA NSA for spying on Americans but is concerned that now that they have been caught Americans might do something about it.

about a year ago
top

Speed Test 2: Comparing C++ Compilers On WIndows

iYk6 Calling home threw off the results? (132 comments)

Did calling home really throw off the results? Since that is something that ordinary users would have to put up with, I would think it should be part of the test. It might be difficult to get an average, but testing Intel's compiler only when it is at its fastest doesn't seem fair.

1 year,28 days
top

2-D MMOG Glitch Released Completely Into the Public Domain

iYk6 Re:Cue Zynga code steal in 3 2 1 (70 comments)

How exactly would one steal a public domain work, even for a loose definition of "steal?"

about a year ago
top

GCC 4.9 Coming With Big New Features

iYk6 But but Google? (181 comments)

But then how would Googlebot know that Phoronix is really great and popular and they should rank it higher in searches?

about a year ago
top

Call Yourself a Hacker, Lose Your 4th Amendment Rights

iYk6 They do have the ability to release code silently. (488 comments)

The tipping point for the Court comes from evidence that the defendants â" in their own words â" are hackers. By labeling themselves this way, they have essentially announced that they have the necessary computer skills and intent to simultaneously release the code publicly and conceal their role in that act.

Sounds reasonable. Anyone with an intermediate understanding of computers and the internet would be able to publish something silently. Create an account with a seedbox, upload file, upload torrent to thepiratebay.sx.

It looks like all they did with the "hacker" identification is determine that they were intermediate level with computers and networking.

Judging from the summary, this is a standard courtroom procedure, and the submitter is trying to sensationalize it by leaving out all of the other evidence.

about a year ago
top

Should Google Get Aggressive About Monetizing Android?

iYk6 Not if they know history (168 comments)

History is ripe with companies that built a product that does something different, and in ways better, than the competition. And once their product is successful, they try to emulate something that somebody else does, and their product share slowly declines as their users realize there is no longer anything special about the product.

Look at Firefox. It was a faster, lighter, less annoying and extensible browser. Over time, it slowly got bulkier, slower, and in some ways buggier. They annoy users by panicing any time a certificate is signed by an authority not on the list. When Google released Chrome, Firefox decided they wanted to have a Chrome-like super fast release cycle, which hurt extensions. Users are slowly leaving Firefox for other browsers, especially Chrome, as Firefox becomes less and less special.

If Google locks down the OS and prevents users from installing their own applications, then Android will no longer be special. People will still use it, since it's still a smart phone and devices will be cheaper than Apple. But as soon as a competitor comes along that offers what Google used to offer, users will quickly leave, and within several years Android will be a memory.

about a year ago
top

Several Western Govts. Ban Lenovo Equipment From Sensitive Networks

iYk6 How would we know? (410 comments)

No evidence has yet been presented to back the claims...
Is it fearmongering?
Or is there some legitimate basis for the ban?

How would we know whether or not evidence exists? All we know is that we haven't seen any. Time will tell. If no evidence is preseneted in the next month or so, then we'll know that it's just fearmongering, and not a legitmate basis for a ban.

about a year ago
top

NSA Utah Data Center Blueprints Reveal It Holds Less Than Thought

iYk6 Obviously the previous reports were wrong (197 comments)

Obviously the previous reports were wrong. Anybody familiar with computers and storage space knew that the numbers reported by NPR and other "news" outlets were ridiculous. They were saying that the center would hold 5 zetabytes, and would only cost $1.2 billion! That's about 25 cents per TB.

Best I could tell, NPR et al misunderstood a Wired article from over a year ago. In the Wired article, somebody said that they would eventually like the processing power in the center to exceed 1 exaflops, and then maybe someday after that 1 zetaflops.

about a year and a half ago
top

Google Storing WLAN Passwords In the Clear

iYk6 Surprising? (242 comments)

the fact that Google can read them (and disclose them if forced by 'law') is a bit surprising, too put it nicely.

That's not just nice, that's outright flattery. Seriously, who is surprised by this? Lots of cloud backup storage services don't let you encrypt data (or make it hard to do so), so why would it be surprising that Google, the mother of all data hoarders, would want to store and read this stuff?

about a year and a half ago
top

ISPs To Censor Porn By Default In the UK By 2014

iYk6 Re:Why not block other things by default, too? (310 comments)

Block the whole internet by default. Customers have to submit a list of checkmarks letting the ISP know what they would like to have unblocked.

about a year and a half ago
top

New CFAA Could Subject Teens To Jail For Reading Online News

iYk6 This reminds me... (230 comments)

This reminds me of a female blogger several years ago after that tennager suicide case. She reported that she heard match.com didn't allow married people to use their site. She said that couldn't risk confirming this herself, since she was happily married.

The point is, how are you supposed to know if you are allowed to use a site, if you can't even read the terms of service without risking violating the terms of service?

about a year and a half ago
top

Spanish Open Source Group Files Complaint Over Microsoft Use of UEFI Secure Boot

iYk6 Samsung laptops (154 comments)

UEFI has been implicated in the death of Samsung laptops running Linux.

That had nothing to do with Linux, and UEFI had no fault in that. The problem is that Samsung wrote a serious bug into their UEFI implementation that causes the laptop to brick if the user does X, Y, and Z under any operating system.

about a year and a half ago
top

IBM Designing Superman Servers For World's Largest Telescope

iYk6 Re:26 petabytes? (67 comments)

Agreed. There are roughly 100 million internet enabled households in the United States. If each of these sent and received, on average, 1GB per month, that's 100 PB.

about 2 years ago
top

Can You Do the Regular Expression Crossword?

iYk6 That's not right (115 comments)

For example ... an * [matches] any number of characters and so on.

No. That's shell expansion, not regular expression. To match any number of characters, you would use ".*".

about 2 years ago
top

Online Ads Are More Dangerous Than Porn, Cisco Says

iYk6 Risky != Risky??? (110 comments)

The popular belief is that security risks increase as the user engages in riskier ... behavior online

So security risks don't increase as I engage in risky behavior? How does that even work? If something doesn't increase risk, then it isn't risky. I can start downloading and executing everything I see without increasing security risks?

about 2 years ago

Submissions

Journals

iYk6 has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?