×

Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

Comments

top

When will large-scale IPv6 deployment happen?

jupiter126 Expect a new internet by 2020! (305 comments)

With net neutrality, piracy and privacy issues... we should indeed expect a "new" internet by 2020.

IPv6 will be the rule of law of course, for one base reason:
IPV4 can not support the growth in emerging markets

and two (interconnected) reasons
- it allows more consumers to connect with more devices
- it allows better tracking - which is a crucial pillar of today's internet sponsorship

Finally, it is the only "partially working" solution today, commercial routers support it, and there is no other protocol that meet today's need and is implemented in most vendors next gen solutions: it has already been tested and accepted by the network's core infrastructure suppliers.

Of course, some custom industrial solutions might need more time to be replaced, but "on the shelf" solutions will be IPV6 before 2020!

SO YES... IPv6 will be mostly integrated (for consumers) before 2020...
In corporations, IPV4 will remain a compatibility issue for a long time, in a similar way that system admins still have to deal with coax cables and VAX or SPARC systems today.

about 6 months ago
top

Android 5 is coming, and only Google knows what's in it.

jupiter126 LibreDroid (2 comments)

Maybe it is time for the community to take on its shoulders and fork the project...

about 6 months ago
top

11 Reasons Encryption Is (Almost) Dead

jupiter126 I do not agree at all (1 comments)

While all these threads apply to today's public standards, it is still very possible for a motivated person to send strongly coded messages on internet, there are three simple rules to respect:
- Use a secured host which is not connected to any network (try openbsd for example)
- Use many encryption layers, and one passworded key (like I did in https://github.com/jupiter126/... )
- Send the pass and archives by secure ways... (ex: the pass on paper, and the key split in 128 different messages)

Encryption is not dead... it is the future, but it is one step behind decryption at this very moment.

about 7 months ago
top

The upcoming Windows 8.1 apocalypse

jupiter126 Surpriiise ;) (2 comments)

At least with Gentoo, I expect to have a bit of fun for some updates!

about 7 months ago
top

How the FCC Plans To Save the Internet By Destroying It

jupiter126 More spendings (217 comments)

Net neutrality can be approached with two purposes:
- Be neutral about what is allowed on internet (Block specific content)
- Be neutral about who is allowed on internet (Block specific sites)
Content distributors are interested in blocking specific content (MCAA, RIAA, ...), infrastructure providers are interested in blocking specific sites (netflix, ...): it is a battle for money.

Human nature dictates us to be creative to reach our objectives.
These laws will thus only accelerate the birth and growth of new networks, which their creators might surprisingly base on the shortcomings of what they miss in the existing one.
As users will be motivated to search for alternatives, demand will be raising, and while TOR is only a "first generation" secure network and its use remains marginal, these laws will help these kind of networks to go mainstream.
They will then try to block these networks, triggering further evolution, back to the chicken and the egg.

On the meantime, illegal organisations will benefit from those new mainstream technologies, and our dear agencies might need to gear up a bit ^^
Now for the funding: Taxes.

And this is how you lost the war for money, even if you did not buy their content or bypass their architecture \o/

about 8 months ago
top

Australian Law Enforcement Pushes Against Encryption, Advocates Data Retention

jupiter126 One more reason to give them work (88 comments)

If they want to have fun decrypting, lets at least give them a worthy challenge ;)

I send myself files coded with over 10 different algorythms (use of a bash script to automatise crypt/decrypt.
code is there: https://github.com/jupiter126/...

about 8 months ago
top

The RSA/NSA Controversy And What We Can Do About It

jupiter126 Solution (1 comments)

I asked myself the same question a few months ago, and came up with a homemade solution. The solution I adopted to make up for the lack of trust of vendors and algorithms, has been to layer many implementations of many algorithms to encrypt my files... this result is much more intensive encryption procedures, but the data feels safer - as long as we believe at least one vendor or one algoritm were not compromised. I scripted the method in bash: https://github.com/jupiter126/...

about 9 months ago
top

Stephen Hawking Was Wrong, So Ignore Whatever Scientists

jupiter126 Good point (1 comments)

Following the same rule, and as the church was wrong for condoms we can safely assume assume they are wrong too for god, creation, and all that bullshit. Same player shoot again \o/

about 10 months ago
top

BitTorrent traffic is up 40 percent from six months ago

jupiter126 means nothing (2 comments)

40% increase in traffic might actually be a decrease in the amount of files, if you consider that more and more are 3D/3D/Lossless, ...

more than 2 years ago
top

How do I De-Dup a system with 4.2 million files?

jupiter126 Re:Patience (2 comments)

Found an easy solution at http://elonen.iki.fi/code/misc-notes/remove-duplicate-files/

OUTF=rem-duplicates.sh; echo "#! /bin/sh" > $OUTF; find "$@" -type f -exec md5sum {} \; | sort --key=1,32 | uniq -w 32 -d --all-repeated=separate | sed -r 's/^[0-9a-f]*( )*//;s/([^a-zA-Z0-9./_-])/\\\1/g;s/(.+)/#rm \1/' >> $OUTF; chmod a+x $OUTF; ls -l $OUTF

This solution is based on the md5 checksum, it is probably the fastest and least reliable of checksums; sha256 or sha512 would be better but will require much more time to run.
This solution requires you to run some version of linux (a knoppix or ubuntu live CD should do).

more than 2 years ago
top

How do I De-Dup a system with 4.2 million files?

jupiter126 Patience (2 comments)

In my opinion, patience is your tool of choice. The issue with the program you tried, is that you won't know if it works well before you use it - so maybe you might want to search info on how it runs, so you can make sure it will sort your files as you wish. The way I would (will actually, cause I'm heading towards the same problem) is to make a simple script that calculates checksums for all files - and then find dupes based those checksums. I would choose this approach for two reasons: 1. The computer can't understand the contents of files - so there is no point checking it. 2. Checksums are faster to compare than files (though they are longer to calculate - but probability shows that is the way to go as you will need to make all possible comparison between pairs of 4.8million elements - or 4.800.000 (close to 250 000 000 000). Calculating checksums is a CPU intensive task, so the faster the cpu, the faster it will go - depending on the most acceptable factor (time or errors) are the checksums methods you can use. Checksums are not perfect and to reduce errors, you might want to use two checksum algorhytms, although the time required will more than double. I come back to my conclusion, patience, waiting one week was nice, but seen the amount of data you need to sort, I wouldn't be surprised to see the computer running 6 months (or 2 years) to do the sorting.

more than 2 years ago
top

Will Developers Finally Start Coding On iPad?

jupiter126 Ban that device! (1 comments)

Python? PHP? they must infringe some patents somewhere... be a fruit ninja, ban the apples!

more than 2 years ago
top

Bill Gates and his passion for reinventing the toilet

jupiter126 Seems logic (1 comments)

After over 20 years of shitty operating systems no wonder they need a toilet \o/

more than 2 years ago
top

Early iPad prototype appears in litigation against Samsung

jupiter126 Re:seriously (5 comments)

My sarcastic answer wasn't at all oriented towards your post but rather toward the actual patent system.

If inventors --- sorry - investors --- keep on using patents like they are ( shape - weight - size ), then we shouldnt be surprized they start to patent colour - material and why not natural states: 'My tablet is a solid: his should be liquid or gas to be different!'

more than 2 years ago
top

Early iPad prototype appears in litigation against Samsung

jupiter126 seriously (5 comments)

This is forgetting that the iPad 2 has exactly the same size and colour as the plastic board I used to cut bread for years before it came out!

more than 2 years ago
top

Unity alternatives

jupiter126 Try them out (1 comments)

As far as I know, UIs are like Distros: each person wants something else.

All of them should be able to run your favorite applications, allthough your choice might depend on them.
If your favorite applications are gtk-based, they are likely to integrate well in a gnome environment.
If your favorite applications are qt based, they are likely to intergate well in a kde environment.
If you're memory regarding, the "negative" aspect of mixing gtk and qt based apps is that you use more memory than you would if sticking to a single library toolkit.
Other than that, your favorite apps should work on any of those environments, as long as you installed their dependencies.

I love KDE, my father swears by xfce, my mother can't use something different than unity.

I guess the easiest solution is to install kde, xfce, e17, fluxbox, gnome, ... on your current ubuntu system, test them out (you can choose which you want to use at the login screen). When you'll have tested them all, you'll know which one is yours --> desinstall the others.

more than 2 years ago
top

College Freshman at Age 9, M.D. at 21 - A Real-World Doogie Howser

jupiter126 Where is Chicargo? (2 comments)

Chicargo sounds like "HiPhone" - would that be some cheap Chinese copy of Chicago?

more than 2 years ago
top

Rights Holders See Little Point Creating Legal Content Sources

jupiter126 bull$$$$ (1 comments)

Dear copyright holder,

Your theory is bullshit: to stop piracy in a minute, the law should just accept that people (yes everybody) copies "things": make copying legal --> If it's not illegal, it's not piracy: problem solved. (This was bullshit too, I agree now we're even)

Of course people will continue to copy things, that's how parents teach their babies, that's what we have done for millions of years, Copying is how our species evolved, copying nature is how technology evolves today.

When copyright holders change their point of vue from a negative one ("we can't stop piracy") to a positive one ("let's increase revenue") - They might reach a new business model where there are copied a lot AND make revenues.

more than 2 years ago
top

UN Takeover of Internet Must Be Stopped, US Warns

jupiter126 Re:UN takeover must be stopped? (454 comments)

US, EU, UN, China, Iran, CIA, RIAA, MPAA, your boss,... which of the above wouldn't want to control the internet (or at least what you do with it)? Controlling the internet is today's war, and most the precited don't care about your opinion and just want to enforce their convictions upon you.

The real question is thus not weither they will fight until one is victorious, but how and when we will organise against their control.

Actions like the "Pirate Party" tend to fight this trend in a legal way, but what governements and corporations should understand is that using steganography, create VPN's and mesh networks (ever setup a pirate box?) is only a consequence of their inability to find suitable legislation - and most likely a cause of their demisal.

more than 2 years ago

Submissions

top

CBI NTNU

jupiter126 jupiter126 writes  |  about 2 months ago

jupiter126 (2471462) writes "Born on the 14th of September at CERN, CBI NTNU is an awesome group of students dedicated to solve the problems that no one else can manage. We are a collaboration of students from several disiplines at NTNU, which gives us the advantages that is needed to succeed. We aim to push on forward and bridge the gap between science and society. We will give you the solutions of tomorrow, today. No matter how hard the task is, no matter how tired we are, one thing is for certain......we will succeed! Please check the webpage!

Dear slashdotters, we need your help, as enough likes of the page will unlock university grants for our projects! — thanks for slahsdotting our page ;p"

Link to Original Source
top

Ask Slashdot - Multilayer cryptography

jupiter126 jupiter126 writes  |  about a year ago

jupiter126 (2471462) writes "Not knowing which vendors/protocols have been compromised, I figured that my best option was to set a few layers of them.
I thus started to throw together a bash script, that would use many different algorithms and vendors to crypt a file.
What became interesting is that while encrypting, the script generates a decryption script as a key — rather than a monotonous key.
I dug a bit further, and put this bash code together, I'd love to have some feedback on the concept and it's implementation!
Thanks ;)"

Link to Original Source
top

Linux K90 - Custom Input Support

jupiter126 jupiter126 writes  |  more than 2 years ago

jupiter126 writes "After 10 years of intensive use, I decided to get a new keyboard. I choose one of those fancy multimedia keyboard (Corsair k90), in order to have plenty of keys to play with.
I had a 'nice' surprise when upon connecting, I discovered that almost none of the extra keys where supported by xorg (linux). Anyway, smart people check for compatibility before buying, and real man assume their impulsive buying afterwards.
So here we are, one week later, I came up with a little bash script that allows the proper use of the keyboard.
The interesting bit is that this script should be able to handle many more types of keyboards, wiimotes and custom inputs with quite minor adaptations.
The code is open source of course... I hope it helps some :)"

Link to Original Source
top

Quick Overview of the situation with SOPA-PIPA-Had

jupiter126 jupiter126 writes  |  more than 2 years ago

jupiter126 (2471462) writes "Since a few days, we know that SOPA and PIPA have been postponed, unfortunately this is only a temporary victory since ACTA is reappearing in Europe and C-11 in Canada: the fight is not over. How can such controversial law propositions manage to get such a political rebound?A major reason is that big companies’ lobbies (mostly the MPAA and RIAA) regrouped against an ennemy common to all economic sectors: counterfeiting.

Copyright, Patent, Trademark protection,... the lobbies have associated all counterfeiting problems in order to gather companies as various and important as Nike, Burberry, Electronics Arts, Time Warner,... and many other. A more complete list of SOPA supporters can be found here.

This reasoning is fallacious from the start because it makes no difference between digital and non-digital products:..."

Link to Original Source

Journals

jupiter126 has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?