Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Ask Slashdot: Where Do You Draw the Line On GPL V2 Derived Works and Fees?

mindstrm Re:They can charge what they like (371 comments)

There may be legal limits on 3(b).. it does seem unreasonable at that extreme.

In reality, though, the simple answer is use 3(a) - give them the source right away and end your obligation immediatley.

about a year and a half ago
top

Ask Slashdot: Where Do You Draw the Line On GPL V2 Derived Works and Fees?

mindstrm Re:Work for Free (371 comments)

The GPL isn't about compensating people for group projects....

about a year and a half ago
top

Ask Slashdot: Where Do You Draw the Line On GPL V2 Derived Works and Fees?

mindstrm Re:Pay the $3.99 (371 comments)

If you don't have the source, or a binary, then you have no work to which the GPL can apply in the first place.

about a year and a half ago
top

Ask Slashdot: Where Do You Draw the Line On GPL V2 Derived Works and Fees?

mindstrm Re:Pay the $3.99 (371 comments)

To be really really obtuse - only the rightsholders who's work he based his own on (DOSBox) are in a position to say if he is violating their licenses or not - the authors could have collectively licensed the sotware to him and not spoken publicly about it.

I realize that didn't happen.... but for the sake of argument.

about a year and a half ago
top

The Chicken May Have Come Before the Egg

mindstrm Nope. (341 comments)

This all depends on how you define egg. Is it the egg that the first "chicken" came out of, or the first egg a "chicken" laid?

I would argue that the egg came first, because at some point, a creature that was genetically different enough to not be considered a chicken laid an egg, and out of that egg came something that we consider a chicken. Therefore, the egg came first - the first egg that a chicken came out of - the first chicken-egg.

about 4 years ago
top

The Curious Case of SSD Performance In OS X

mindstrm Re:Why not just open fs.blocksize to 64-256k? (205 comments)

TRIM isn't about blocksize - it's about letting the drive know that a block can be freed up and reset to a fast-writeable state - only the filesystem driver can do that in a meaningful way - the drive can't automatically know on it's own.

You an cleverly hack around with GC and spare blocks and whatnot to keep SOME blocks free and available all the time, but they won't necessarily represent what the filesystem thinks are free - so it's sub-optimal. TRIm isn't an abstraction layer - it's a simple command to effect a simple action that wasn't previously necessary because this limitation simply does not exist on magnetic media - we don't have to erase it before writing to it again.

about 4 years ago
top

The Curious Case of SSD Performance In OS X

mindstrm Re:My experience with SSD & a Mac (205 comments)

"Any controller will detect a block of zero's as being unused data and just mark the block as such." - can you cite a source for that? It makes sense, as long as we're talking about full, raw blocks full of zeroes.

And it's still a hack, compared to a simple command like TRIM which simply says "No longer in use - zap away" - it's just something we never had to worry about before, and now we do - there are lots of other clever hacks - but it's still necessary.

about 4 years ago
top

The Curious Case of SSD Performance In OS X

mindstrm Re:I've never seen a problem (205 comments)

That.... makes sense.... I think you just made something click for me.
Thanks.

about 4 years ago
top

The Curious Case of SSD Performance In OS X

mindstrm Re:OS X has nothing to do with it (205 comments)

Care to post your xbench results?

The write performance can and should drop significnatly as soon as you've burned through all the unused blocks - so unless you are really sparse on the disk writes over the last year and haven't hit that point, or the drive was already degraded when you got it (which is still good and damn fast compared to the non-SSD drives) - this sounds suspicious.

about 4 years ago
top

Neutrino Data Could Spell Trouble For Relativity

mindstrm Re:Relativity is just a model (279 comments)

It's "just" from people who don't actually get what theories and models are actually all about.... people who think there is some absolute truth out there to be discovered.

about 4 years ago
top

Neutrino Data Could Spell Trouble For Relativity

mindstrm Re:Relativity is just a model (279 comments)

"We just want to know how the universe behaves; we don't need to calculate anything fancier."

If we had a set of laws that predicted everything we could observe in the universe precisely,then not only would we not need to calculate anyhting fancier, the entire concept of calculating anything fancier would have no meaning, as we would already have the theory of *Everything*

about 4 years ago
top

Neutrino Data Could Spell Trouble For Relativity

mindstrm Re:I think I had an astronomy prof that talked abo (279 comments)

Right - but the mental model you work with to figure out how much counterbalance and weight you need on a construction crane, or ballistics for firing large rounds from a warship doesn't need to include relativistic effects. You don't need to consider spacetime or einstein when doing these things... newton's model is just fine.

And let's be clear - both are just models. Relativity goes further to model more about cosmology and goes off on a bigger, deeper scale - but it's not the theory of everything, and we know that. It's still just a model.

So fundamentally - you apply the correct model to the correct situation. Neither newton nor einstein have the whole picture, nor could they, nor shoudl they - they just worked with the evidence and observations they were capable of making, and came up with models.

about 4 years ago
top

Prosecuting DDoS Attacks?

mindstrm Re:AI DDOS Monitoring (164 comments)

40 years? Check your history a bit.....

Also, how would that system work, exactly? 1 million infected machines from all over the world, from hundreds, if not thousands, of networks, suddenly opening a few connections a minute and sending a relatively small amount of traffic at a target host looks just like normal traffic, unless you are on the receiving end and run out of bandwidth HARD.

(but yeah, in the end, some kind of automated alert system and cooperation between ISPs will probably be needed to combat this type of thing if nothing else changes... if only to cut down on the manpower needed right now to track it down. eg: let someone punch in an attack signature and find all requesting hosts globally, then request that they be blocked at their component ISPs, subject to the approval of those ISps, etc.... something like that.

more than 4 years ago
top

Prosecuting DDoS Attacks?

mindstrm Re:It depends on the scale of your operation (164 comments)

Having been on the receiving end of huge, huge attacks - I can say with certainty that, push come to shove, in the end it's about bandwidth.

They'll try resource attacks first - to see if they can take your app down (syn flood, perhaps HTTP app-level attacks....) - but in the end, they just *hammer* you with hundreds of thousands of hosts with useless traffic - like UDP floods (which won't hit any application at all) and syn floods that are dead easy to filter out. It's quite rare to see a well-thought out application level attack these days - though it still happens.

Larger botnets can generate tens of gigabits of traffic.... even highly profitable business can't keep enough bandwidth around to deal with that - which is why you end up with dedicated solutions that work close to the core (eg: Prolexic.com). You get attacked, you re-route your traffic through them, they sanitize it, and send you back the clean stuff.

more than 4 years ago
top

Prosecuting DDoS Attacks?

mindstrm Re:Dear China... (164 comments)

Sure about that? They were 12 years ago - where on machine could syn-flood a huge machine - but nowadays it's actually really tends or hundreds of thousands of zombied machnes all sending a few requests. Botnets are all the rage, and have been for ages.
Networks these days have proper egress filtering (as well as other filtering - like your cable modem or whatever) and plain old spoofing is harder than it used to be.

more than 4 years ago
top

Prosecuting DDoS Attacks?

mindstrm Re:Illegal; but.... (164 comments)

The damages would have to be significant, and jurisdiction becomes a problem.

If you're in, say, italy, and you call up some US police station saying some kid in town is responsible for a giant DDOS network, you'er unlikely to get a response- because those officers aren't paid to protect you.

If you took it to local law enforcement, and it was escalated internationally, and the damages were high enough, maybe coupled with some publiity, then you might get some action.

more than 4 years ago
top

Prosecuting DDoS Attacks?

mindstrm Re:Illegal; but.... (164 comments)

Actually, albeit indirectly, offshore gaming and other out-of-jurisdiction (out of the US) business, fed a ton of information to the FBI/DHS and the Scotland Yard high-tech crimes unit several years ago to take down a ring of DDOS *extortionists*.

In the end, they followed the *money* - just like any other type of crime.

While the FBI is certainly not concerned with the welfare of the offshore gambling, and/or out of jurisdiction businesses, nor should they be, they were, and likely still are, certainly interested in the overall problem, as the extortion (which is the more important part of the crime here in legal terms) and subsequent money laundering (extortionists want to get paid, that means those kiddie hackers had to use traditional organized crime avenues to get paid) are of interest to law enforcement internationally. It's a global problem and one that's difficult to resolve without cooperation from everyone involved.

It's quite easy to just plain old DDOS places for fun, and probably not get caught.
If you want to use it to run a protection racket, which is about all you can do - that brings a whole set of other law enforcement institutions to bear on you, and if you keep it up long enough you'll likely be caught, and jailed, along with others involved.

more than 4 years ago
top

The Fashion Industry As a Model For IP Reform

mindstrm Re:Except... (398 comments)

"Try doing the same with software and pretty soon they will try to sell you a new desktop background."

They'll try - without much success.

I'd argue that watching free software evolve over the last 15 years or so along with the internet has set a constantly improving baseline which forced commercial software giants to stop shovelling garbage and start innovating again, rather than selling the same hashed-over junk with marginal improvements year by year, with few competitors.

(The mobile industry is undergoing this same shift now...)

more than 4 years ago
top

Duke To Shut Down Usenet Server

mindstrm Re:...and there's still no comparable alternative. (273 comments)

And then keep policing every other group to ensure no binaries are posted there....
Then you'd look at what percentage of your customers are actually using the server -vs- the cost of running and maintaining it - and you'd probably come to the conclusion that there was no business sense in keeping it running.

more than 4 years ago

Submissions

mindstrm hasn't submitted any stories.

Journals

mindstrm has no journal entries.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...