Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Irish SOPA Used To Block Pirate Bay Access

jakykong Re:Making it harder to pirate? (94 comments)

I could try to justify it by saying that I already pay for it, that I want it without DRM, that they should provide it in an alternative format, etc... Those aren't very good justifications, if they don't provide it in a format that I want then I should go without. It is their property and their right to determine how they sell it. They are free to make unprofitable business decisions. I have neither the individual power nor control of the collective to ensure that my wants are met by the content producers. I'd guess that 80% of the content I download never gets watched. I think I do it just because they tell me I'm not allowed to.

The "go without" argument will never work. The problem is that it is only unprofitable for the business if the majority of people care about the content. In the real world, most people don't care about the format their content comes in; they don't care if their software is open source; they don't care if there is DRM. They care about exactly one thing: Does the movie I just bought play? If they cannot get the content for free (or it is inconvenient), then they'll just pay whoever will play it.

In other words, the reality is we geeks do not have enough market share to influence the bottom line.

But the real problem here isn't one of profit. Piracy is an excuse to power grab -- and I know that because they've been making the same claims since well before the internet came along, for the same reasons. As long as the content providers have enough power to push for anti-piracy laws (which ultimately give them more power, and do nothing to actually stop piracy), they will do exactly that, whether it is common or not.

about a year ago
top

Debian 7.0 ("Wheezy") Released

jakykong Re:Outdated (191 comments)

Correct me if I'm misunderstanding something, but a particular application should not depend on what desktop environment is running, since Gtk is primarily responsible for drawing. They may not interoperate with other applications, but they should run.

Having said that, it seems like there are basically two ways to go if Gtk+3 applications won't run outside of Gnome. The one I hope for is that the smaller window managers will support Gtk+ 3 (or, conversely, distributions continue to support Gtk+ 2). The alternative is that I'm forced either into using Gnome/KDE or using outdated software. The latter option bothers me deeply, so whatever work I am able to contribute to prevent it, I do.

about a year ago
top

Debian 7.0 ("Wheezy") Released

jakykong Re:Outdated (191 comments)

I have found that Gnome3 has some significant irritants that Gnome2 did not have. I found it cumbersome to actually get work done with, not completely unlike the way Unity is difficult to work with. The changes that were made (such as removing the taskbar, for example.) are arbitrary as far as I can tell. We've had literally decades to figure out good fundamentals, and while I'm not opposed to experimenting with user interfaces, doing it to the most widely used interface seems obnoxious. Especially among geeks, who develop habits and scripts around the tools they regularly use, such changes either need to be rolled out slowly or presented as an option.

I'm not trying to say that Gnome3 is useless. It is pretty much standard now, but saying that "it won't bite" ignores some significant problems. There are other options, whose only limitations are that Gnome and KDE applications seem to like their respective desktop environments to be running, and they're worth paying attention to. After all, this is Linux, these are geeks -- being "the standard" has never been a good reason to use something before, why start now?

about a year ago
top

Debian 7.0 ("Wheezy") Released

jakykong Re:Outdated (191 comments)

I've found that pulling tools together from desktop environments other than KDE and Gnome and just using a few of the indispensable apps from them is the best way to go. For example, I use Thunar instead of Nautilus or Dolphin. The simpler desktop environments tend to have more portable components, not as tied to their parent.

Then again, except for a web browser, e-mail, and feed reader, the majority of my time is spent on a terminal anyway, so I may be the outlier here.

about a year ago
top

Turbulenz HTML5 Games Engine Goes Open Source

jakykong Re:What? No IE 6 support?! (27 comments)

I'm pretty sure the parent post was thinking that we could thereby get Chrome and/or Firefox onto the IE6 user's machine.

about a year ago
top

Windows 8 To Fight Piracy With the Cloud

jakykong Re:Deja Vu (404 comments)

I planned on giving it another go in a while, but I tried the phone option, it told me the key wasn't usable with no details, and provided no further options. I suppose this shows how often I deal with windows :).

more than 2 years ago
top

IBM Shows Off Brain-Inspired Microchips

jakykong Re:Skynet... (106 comments)

why the hell would anyone program a car to behave like a cat?

Whoosh.

more than 2 years ago
top

Windows 8 To Fight Piracy With the Cloud

jakykong Re:Deja Vu (404 comments)

My problem with DRM is not that I'm a pirate -- I'm not. I try whenever possible to abide by copyright law. But it DRM legitimately gets in the way of getting things done.

Consider, a few days ago, my VirtualBox drive with windows XP died (primarily human error, admittedly.). Restoring to a previous point didn't fix it, so I had to reinstall. But -- Oh Noes! -- I had used my product key too many times. Even if they don't give a limit, there clearly is one -- the same key stopped working. (For the record: I purchased this copy of XP.)

I had to turn to an activation hack to get my legally purchased, still functional, still useful software running. Microsoft, of course, won't restore my key.

This is why I steadfastly avoid any and all DRM-crippled software whenever and wherever I can. The End-Of-Life from the company's standpoint is likely to be long before I think the product is dead.

more than 2 years ago
top

GPGPU Bitcoin Mining Trojan

jakykong Re:Fake? (258 comments)

While I generally agree, it should be noted that, in practice, bitcoin is already marginalized, and any connection to criminal activity could shed a bad light on it. If it loses reputation this early in the game due to bad/inaccurate reporting, or the inability of irrational sheep to distinguish the currency from the means of obtaining it, then that would be very bad for bitcoin.

more than 2 years ago
top

Firefox 6 Ships Next Week, 8 Blocks Sneaky Add-Ons

jakykong Re:Oh boy, more features! (247 comments)

I'm just curious which bug this is. I use FF3.6, and I haven't noticed losing any tabs. And I generally keep careful tabs on them (pun intended). Not that I doubt you experiencing this, but I'd love to read up on it.

more than 2 years ago
top

KDE Plans To Support Wayland In 2012

jakykong Re:Stupid (413 comments)

Correct me if I'm wrong, but Wayland doesn't claim to replace X -- at least not entirely. It's suggesting that X should be an add-on component, rather than the core process.
From the FAQ:

This doesn't mean that remote rendering won't be possible with Wayland, it just means that you will have to put a remote rendering server on top of Wayland. One such server could be the X.org server, but other options include an RDP server, a VNC server or somebody could even invent their own new remote rendering model. Which is a feature when you think about it; layering X.org on top of Wayland has very little overhead, but the other types of remote rendering servers no longer requires X.org, and experimenting with new protocols is easier.

It sounds to me like X is supposed to be an optional component, to support legacy code and/or remote machines, etc. -- but isn't the only option. Wayland just takes over the one particular part of the process (just compositing on screen).
Admittedly, I haven't read a lot about wayland. Until this article, I'd never heard of it (perhaps showing how little I've kept up on tech news lately). But, out of genuine curiosity, how is this going to ruin the flexibility of X?

more than 2 years ago
top

Facebook Exec: Online Anonymity Must Go Away

jakykong Re:Thus spoke Ben (553 comments)

They are not, actually, antonyms of one another. Consider a web of trust, using pseudonyms. That is an anonymous system. You are accountable based on who is willing to trust you -- if you behave badly, and lose your reputation, you lose trust in your communications. Even if this isn't explicitly coded, it happens almost by accident -- common forum dwellers are known by their handles, and trusted for their previous work, for example.

What anonymity implies is a lack of ability to provide civil/criminal/physical accountability -- psychological and social accountability still remain.

Or, phrased another way, it's a question of who you are accountable to. If you need to have accountability from the government, educational institutions, corporations, etc. -- then, of course, anonymity is impossible to maintain. However, if you need behavioral accountability, accountability to the community (whatever community that may be), then reputation is sufficient, along with filtering or web-of-trust-type systems to enforce it. Anonymity does not prevent this.

more than 2 years ago
top

Ask Slashdot: Do We Need Pseudonymous Social Networking?

jakykong Re:Yes. Reputation matters, not ID (213 comments)

A) The rest of the solution would be to use reputations, cryptographic keys (optionally), and so forth. Reputations seems to be sufficient, most of the time.

B) Well, an easy way would be to prevent one IP address from registering more than one username per, say, a day -- which would be fine for a household of users that want accounts, but not useful to spammers.

If someone is willing to put up the effort to run a botnet and register on that many different accounts -- well, why wouldn't they just use automated software like Rig to create 1,000,000 fake identities that are equally acceptable as a real name (leaving aside impractical requirements like presenting a passport to get an account). Not much you can do to stop someone determined enough to spam, but then you just rely on reputation to weed out the bad accounts, as per A) above.

about 3 years ago
top

Ask Slashdot: Do We Need Pseudonymous Social Networking?

jakykong Re:A better question: Do we need social networking (213 comments)

I have generally felt that social networks are besides the point. Real Life(tm) is the ultimate social network, and any communication medium -- be it forums, e-mail, snail mail, talking on the sidewalk, or phoning a friend -- all contribute to that network, without the assistance of Facebook or the like.

If you want to find a person, Facebook (may be) a free way to do it, assuming they use it and were willing to give their real name to them. But other methods exist -- including: Search engines, public networks, potentially shared acquaintances (finding someone from high school? Try asking other friends from high school. Or their parents, if you're that sort of person.)

Pseudonyms do NOT interfere with this. If I tell my friends that I am "jakykong" online, they can tell their friends to contact Jakykong for something. Thus the two-step distant people don't know my real name, but the one-step distant people do. No technology involved, and no real name required.

Of course, our modern concept of social networks that allow you to search for someone by name, rather than by common acquaintances or activities, probably need the real name to facilitate that. But I don't require that functionality -- the ability to meet my friends' friends is useful, whether or not I know their names. Facebook and now Google+ deny this functionality when they deny pseudonyms.

about 3 years ago
top

Look Forward To Per-Service, Per-Page Fees

jakykong Re:Inevitable (400 comments)

Whoosh.

more than 3 years ago
top

Your Computer Or iPad Could Be Disrupting Sleep

jakykong Re:f.lux (351 comments)

Sleep is one of the great gifts that we are granted as humans.

I see the propaganda has gotten to you! 8 hours of sleep a night -- bah! Computers don't sleep; why should I?

more than 4 years ago
top

Critical Flaw Found In Virtually All AV Software

jakykong Re:Solution to problem (279 comments)

Why would the evil sudo need to be setuid? It just forks the real sudo and keeps track of the I/O, thus gaining the password. No need to replace sudo when you could use the real thing.

more than 4 years ago
top

Critical Flaw Found In Virtually All AV Software

jakykong Re:Ubuntu (279 comments)

Easier: an alias in your ~/.profile. alias "sudo=/home/user/.hidden/script-that-acts-like-sudo would probably be sufficient, and, if written right, it'd get the user to type their password, convince the user that they made a typo, and then remove any trace that it was there, except that now it has a record of the password. This would work no matter what terminal the user prefers, even if it's ssh, and it doesn't require anything except a simple shell script to be run with user-level privileges to inject it.

Of course, it depends on the user not noticing the alias in their .profile, but how often do you actually look at that file these days?

more than 4 years ago
top

RFID Checks Student Attendance in Arizona

jakykong Re:Attendence in college? (554 comments)

That's probably true. But the lecture classes I've been in (granted, community college, not university (yet)) have had instructors that could tell, if not to the day, at least how frequently a student tended to appear. In a class of 60-70 students, this isn't much of a problem for the instructor to intuit. In a class of 300-400 students, the instructor probably isn't doing most of the tutoring anyway, leaving it to the TA's.

In short, you generally don't need to track attendance for an instructor to figure out whether a student shows up regularly or not. (And it may be irrelevant anyway, depending on how the instructor is payed for such questions.)

more than 4 years ago
top

Fate of Terry Childs Now In Jury's Hands

jakykong Re:My solution in the past (530 comments)

I believe that situation is why he stored two encrypted copies, one of which was with his asymmetric key (hence, can't be changed by someone else, assuming the key is secure).

Easy detail to miss, but oh so important.

more than 4 years ago

Submissions

jakykong hasn't submitted any stories.

Journals

jakykong has no journal entries.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...