Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!



Swedish Dad Takes Gamer Kids To Warzone

maas15 My Dad did that (419 comments)

My dad did that, but for fairly different reasons. His friends convinced him that their area of Yugoslavia was pretty unimpacted by fighting, so we visited. It was honestly one of the more interesting vacations I've taken; the entire country was completely economically devistated. Fortunately I don't think any of the involved governments (we're American) ever found out about that somewhat irresponsible vacation.

about two weeks ago

Ask Slashdot: Does Your Employer Perform HTTPS MITM Attacks On Employees?

maas15 Re:Maybe the company's not actually doing it? (572 comments)

I know certain commercial products, for example Fortanet firewalls, have this functionality built into them.

about 6 months ago

Ask Slashdot: Where Are the Complete Hosting Providers?

maas15 Re:DH, FTW (178 comments)

Their service is pretty inconsistant. I think most of their customers get frustrated when they're initially filling the server - they don't do a lot of administrative oversight into what goes onto their servers, and it really shows in the first 3-4 months you are a customer of theirs. The reason they come up however, is they offer all of the stated services except VOIP. And I wouldn't use their VPN, though they offer VPN services. You can always use SSH Tunnels. I think there's a real logistics problem in offering that wide a variety of services, which is why most hosting companies won't do so. The original poster may have 5 providers, but each of those providers only has to stock admins to deal with 2-3 of the requested services.

about 10 months ago

Mac OS 10.9's Mail App — Infinity Times Your Spam

maas15 iMail has a history of infinate recursion (158 comments)

This isn't the first infinate recursion iMail bug. Around five years ago I worked for a webhost at which we had customers complaining about there being nothing in their INBOX. When we checked, we'd find a giant tree of INBOX folders - for some reason iMail would create a new subirectory called INBOX every time it logged in, and then make the *new* INBOX folder the default INBOX. All the mail would still be delivered to the original inbox...

about 10 months ago

What I Did During My Summer Vacation: Burning Man Edition

maas15 A month later... (228 comments)

I think the most important aspect of this article is that people who went to burning man are still talking about burning man.

about a year ago

Chaos Computer Club, Others Scoff At German Email Security Move As "Marketing"

maas15 Its a start (135 comments)

It's a start, at least the passwords are safe... there's a tendency for security communities to scoff at nearly any half improvement

1 year,19 days

Neuroscientist: First-Ever Human Head Transplant Is Now Possible

maas15 I hear cackling (522 comments)

I'm fairly sure the author of the paper was laughing maniacally during most of it's writing.

about a year ago

Book Review: The New Digital Age

maas15 What about Mexico? (68 comments)

Is the internet a bigger experement in anarchy than Mexico?

about a year ago

Ask Slashdot: Protecting Home Computers From Guests?

maas15 I have to suggest a specific non-linux product (572 comments)

... but sometimes there are commercial solutions that fit a specific problem quite well - I'd use deep-freeze, a piece of windows software. I briefly attended a school that had it on their computer lab computers - effectively the computer is reset every time you restart it. It keeps a second partition sitting around with your save point or something like that. Guests are generally non-malicious so probably won't disable the software.

about a year ago

A New Benefit For Logged-In Readers: Meet Slashdot's ROT13 Initiative

maas15 Bring back Gnome2 (261 comments)

Dear Slashdot, Please bring back gnome2. Gnome3 isn't as good. Yrs, David Maas

about a year ago

Re: Bitcoin, I most strongly agree with the following:

maas15 BTC is not backed by that many goods (398 comments)

I wouldn't consider BTC a good currency because there isn't a whole lot that can be bought with it. Drugs, gems, metals, alpaca socks, and an extremely limited variety of items for sale on "underground" sites.

about a year and a half ago

Federal Court OKs Amazon's System of Suggesting Alternative Products

maas15 Re:Suggestions for subtly incorrect items (102 comments)

u r such an amazon luver u amazon luver 3 3 3 that was totally an amazon answer

about a year and a half ago

Federal Court OKs Amazon's System of Suggesting Alternative Products

maas15 Suggestions for subtly incorrect items (102 comments)

I find it really funny that Amazon is patenting their suggestion system since it's responsable for nearly every mis-purchased item I buy from Amazon. I wind up with GSM phones intead of CDMA (but in a better color), asus keyboards for a laptop I don't own, and a wireless access point instead of a wireless range extender! They should try to think of/patent a system for suggesting items that have the same important attributes and basic utility. It wouldn't kill Amazon to patent something that's not blaitantly obvious.

about a year and a half ago

Ask Slashdot: Dealing With an Advanced Wi-Fi Leech?

maas15 find the culprit first (884 comments)

Wander around with netstumbler, and monitor the strength of the evil network. Once you've actually located the person you can: a) complain to their mom b) move your access point to where it's out of their range c) setup a malicious network of the same name with and perform MITM attacks on them (sslstrip, sslsplit, dsniff, malicious nameserver, redirect them to a copy of someone elses drive-by-0day page) If they run the deauth attack more than once (it only has to be run once), they're fairly unlikely to succeed unless given serious help (like changing the network encryption to wep).

about a year and a half ago

Summer Programming Courses Before Heading Off To College?

maas15 Re:Not actually necessary (183 comments)

After a moments retrospect, see if your son can take a humanities course over the summer that will transfer to the new school ;).

about a year and a half ago

Summer Programming Courses Before Heading Off To College?

maas15 Not actually necessary (183 comments)

In my educational career (which involved a lot of wandering between schools), I found that *every single school* forces you to re-take cs101, even if you already know the language, even if you've already (literally) take 4 other cs101 courses. So your son should be aware that taking a programming course won't get him into higher level courses. Of course, programming is a whole lot of fun, so if he wants to take a course for it's entertainment value, he should go for it. Check your local community college - I've had great luck with community college courses (though I've never tried programming courses at one, more like networking and IT courses). Don't even think about a vocational school. If possible, try to find one that teaches C/C++, since most computer science courses in college are in Java, which isn't that useful of a language. Avoid C# courses, since C# teaches poor programming habits. Lastly, and slightly off topic, if your son wants to avoid a college career of nomadically wandering between schools, then make sure he realizes that the main objective of school is to learn things, including things that aren't as much fun to learn (like African History or Music Theory).

about a year and a half ago

Can a Regular Person Repair a Damaged Hard Drive?

maas15 DC Experiences (504 comments)

I work in a datacenter with large numbers of un-raided servers. Generally when someone wants to fix a drive, they just want their data off. Corrupted Filesystems due to Physical Problems: Corrupted filesystems are frequently due to bad blocks in the filesystem metadata. The fs metadata tends to go first because its the most read part of the disk. I've had really good luck with ddrescue for this sort of error (at least for ext3). Have ddrescue skip error blocks and keep a log of bad blocks, otherwise it'll literally take a week to recover. (Instructions: Fried Drive Controllers: These will generally completely fail to turn on or read at all. They're usually not detected as disks. Replacing the PCB would probably work if I were any good at hacking type soldering. If you're tempted to try sticking a drive in the freezer, just let it sit for 1-4 months instead. I believe it's effectively the same fix but with far lower of a chance of borking the electronics due to mosture. Believe it or not a fair number of drives will come back to live after this period of time (~15-20% I would *guess*). Mainly you should just be aware of the warning signs. Disappearing files, folders that cause crashes, ext3 related stack traces, and filesystems being auto-remounted as read-only are all signs that its about time the evacuate to a new disk within a day, two at the max. Bad ball bearings generally don't kill hard drives. Disks making weird unlubricated drive bearing/shaft sounds can still work for a year or so. If this disk seems to shutter or obviously has problems starting to spin you should definetely copy your data to a new disk, anything less will mainly just injure people's hearing. The main problem with bad bearing is that it *really* increases the amount of heat in the computer (which in turn can kill hard drives).

more than 2 years ago

Dell Announces Intent To Acquire SonicWALL

maas15 Ugh sonicwall (65 comments)

I really hope Dell took a look at a Sonicwall running in production - they're completely undependable! Real fixer-upper of a purchase.

more than 2 years ago

Video Appliance For a Large Library On a Network?

maas15 Re:My Setup (ie Buy a Playstation) (516 comments)

My friend uses a similar setup - Twonky media server + a playstation 3. Works flawlessly, beautifully. Plus, the playstation 3 can do 1.5x fast forward with sound that's digitally sped up without altering the pitch of the conversation. Really, Sony made the PS3 an awesome media center.

more than 3 years ago


maas15 hasn't submitted any stories.


maas15 has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>