Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!



How Neuros Built Their Nearly Silent HTPC

marol Re:Fan = not silent. (199 comments)

Watching a solid block of aluminium. Now that's time well spent. Kids today and their TV sets.

more than 4 years ago

Indian CEO Says Most US Tech Grads "Unemployable"

marol Re:outsourcing and unemployment (1144 comments)

On the topic of strange Slashdot behaviour. Can anyone explain why Slashdot comments often look like this? This is with Firefox 3.0.11 in Ubuntu.

more than 5 years ago

Researchers Build a Browser-Based Darknet

marol Re:But what about the quality? (163 comments)

That certainly is a problem. A brute force solution to that problem is to make sure the network has enough "non-government" nodes to drive down the probability figures in such analyses. I guess if the probability of identifying an end node is low enough, that also makes it less likely for the government to seek warrants. (Unless they are just trying to bring down all nodes of the network.)
The I2P website has a list of different threat models and links to related papers. I guess this one falls under partitioning attacks.

more than 5 years ago

Researchers Build a Browser-Based Darknet

marol Re:But what about the quality? (163 comments)

I'm not sure I'm qualified but, in loose wording. The entity running N nodes should not know how long the bounce length is. In that way it cannot determine if the nodes it is talking to are endpoints or just routing nodes. Also, since the data is encrypted, the entity cannot read it in transit.

more than 5 years ago

Palm's webOS Root Image Leaks Out

marol Re:Cool, but where are the kernel sources? (176 comments)

The real question is whether it runs X11 like the Nokia 770/N800/N810, allowing it to run unmodified desktop apps.

From a glance, it looks like drawing is done via directfb.

more than 5 years ago

DIY 1980s "Non-Von" Supercomputer

marol Non-Van (135 comments)

It had been a wonderful evening and what I needed now, to give it the perfect ending, was a little of the Non-Van.

more than 5 years ago

Global Warming Irreversible, NOAA Scientist Finds

marol Re:First post (1061 comments)

Sounds interesting, can you link to a good source with more info?

more than 5 years ago

Pirate Bay Gets a 4,000-Page Complaint

marol Re:Wow! Top 10?? (643 comments)

They have more members than the green party , which HAS seats in parliament.

Looking at the pirate partys web page, they clearly state (on the first page) that they have roughly half the number of members as the green party. Furthermore, the green party got 5.24% last election being the coalition party with least votes, while the pirate party got 0.63%, behind SD and FI which got 2.93% and 0.68% respectively. So saying that the pirate party was close to a seat in parliment is not really true at all.

more than 6 years ago


marol hasn't submitted any stories.


marol has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>