Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Why Linux Can't 'Sell' On the Desktop

mulaz Re:heh (1091 comments)

If Ubuntu can do it, so can you!

Tip: try searching for "linux" on ubuntu.com

more than 2 years ago
top

Unauthorized iOS Apps Leak Private Data Less Than Approved Ones

mulaz Re:How about Android apps ? (179 comments)

There is an app called LBE security (or something simmilar, search for LBE), where you can give/take away permissions, and you can have the app prompt for some permissions ona per-use basis.

So, if angry birds wants location info, you get a pop-up, choose Don't allow (because it doesnt need it), mark 'remember', and continue playing.

The bigger question is, what data does the aplication itself send around, since it requires a rooted phone.

more than 2 years ago
top

VMware Causes Second Outage While Recovering From First

mulaz Re:Engineering Errors (215 comments)

VTP servers also accept configuration from other VTP servers, so they act as clients too.

more than 3 years ago
top

VMware Causes Second Outage While Recovering From First

mulaz Re:Engineering Errors (215 comments)

Easy!

Have a scaled-down copy of the production network in a lab, with all the same settings (like VTP domain etc.), test weird things (like it's normally done in a lab enviroment), and get the rev. number up high.

Then some piece of production equipment fails, (let's say a switch), and why not take one (basically the same one) from the lab? The lab can wait for the replacement, production usually can not. Then plug the switch to the production network, and puff, there go the vlans!

more than 3 years ago
top

Gizmodo Not Welcome at 2010 WWDC

mulaz Re:Wow (395 comments)

Nope...
There's no was Apple could do something like this...

more than 4 years ago
top

Open Source Router To Replace WRT54GL?

mulaz Re:RouterStation Pro (344 comments)

Yes you can(*)(**) :)


*You can use quagga and it will work as a BGP router, if your (private) network uses BGP.
**If you want to use it as a core router: that's why I wrote "pretty much" before "anything"... But still, you can connect it as a core router... it would be interesting to see how long will it stay online, and how many routes can it recieve before it crashes :)

more than 4 years ago
top

Open Source Router To Replace WRT54GL?

mulaz RouterStation Pro (344 comments)

RouterStation Pro has everything:

-gigE
-mini pci slot for wifi cards
-enough ram for pretty much anything

(some assembly required :))

I do not work for them, and am not payed by them, just a happy user

more than 4 years ago
top

DS Flash Carts Deemed Legal By French Court

mulaz Re:Any Application they want to? (267 comments)

They don't have standing, as they do not hold any copyrights over that code

Why would they need it? If you go to the shop and buy, for example, a media/dvd/etc. player, which uses GPL code, you're entitled to get the source to the program. If the company doesnt give you the source, you could sue. Or can anyone prove me otherwise?

more than 4 years ago
top

Bug in latest Linux gives untrusted users root

mulaz RHEL only? (1 comments)

It seems the bug is applicable just to RHEL (for which patches are provided) and distributions which intentinally have the option disabled (to run wine? - why??).

more than 4 years ago
top

Yale Physicists Measure 'Persistent Current'

mulaz Re:It's the little things that impress (68 comments)

If we study really small currents, and develop the technology around it, and bring the "normal" currents (~mA) down (to ~uA), a battery that today lasts 1 day (smartphone under heavy use), will last a 1000 times more (3 years).

Of course, this is true for logical circuits, etc... power used for example for (back)lightning can be brought down only by some level (not even close to uA), where we get close to 100% power->light output.

more than 4 years ago
top

Surprise Discovery In Earth's Upper Atmosphere

mulaz Re:Read Tesla & Heaviside from 100 years ago (243 comments)

Google for "tesla energy transfer atmosphere" or "tesla atmosphere energy" (he said he knew how to collect energy from the atmosphere, and how to transfer it through it.... of course noone listenede, noone believed, and noone wanted to sponsor it.... and of course: "if there are no wires, where are you going to put the elecitrc counters?")

fist link i found and there are more

about 5 years ago
top

Tracking Stolen Gadgets — Manufacturers' New Dilemma

mulaz Re:Owner bricking & selling process (250 comments)

Oh yes... and of course, the buyer should be able to verify the sellers code prior to paying.

about 5 years ago
top

Tracking Stolen Gadgets — Manufacturers' New Dilemma

mulaz Owner bricking & selling process (250 comments)

Reading the comments, I saw two problems:
1: who can brick it
2: is it really stolen or just sold?

The best solution would be to track ownership online, and that every owner can (temporarily) brick and unbrick his device whenever he wants.
The second problem is dealing with reselling... This could be solved by using a two-part code. The seller would get a "sellers code" from amazon (apple,...), which he would give to the buyer at the time of selling (or even post it on the ebay page). The buyer would have to register the device in his name (as he has to do now), but the device wouldn't work without the sellers code. After the registration and entering the code, the new owner (only him) could un/brick the device whenever he wanted.

about 5 years ago
top

Microsoft Attacks Linux With Retail-Training Talking Points

mulaz Image mirror (681 comments)

There are a couple of image mirrors, but for "just in case", I've made another one. Please don't hotlink (my upload speed is limited too) and/or abuse, thank you.

Image mirror

about 5 years ago
top

In UK, Two Convicted of Refusing To Decrypt Data

mulaz Re:Can I ask.. (554 comments)

AFAIK Truecrypt can use a 'normal' file as a key. So you can actually use a 700mb file as a key. So.. 1) Burn 700mb of random data on the cd 2) make a HUGE scratch (just one) that destroys the foil on the cd 3) put the cd in a spindle with other cd's and something that could've caused that scratch in between (metal shaving, etc) 4) ??? 5) profit Recovering full 700mb should be hard enough for them too. especially with random data, where they cannot predict the missing data. And with a file so large, the 'missing' part will be large enough to make brute-forcing useless.

more than 5 years ago
top

Sensor To Monitor TV Watchers Demoed At Cable Labs

mulaz Are we in Soviet Russia yet? (302 comments)

...probably :) In Soviet Russia, TV watches you!

more than 5 years ago
top

US Cell Phone Plans Among World's Most Expensive

mulaz Re:Stupid prices (827 comments)

Oh yeah, and for national calls, for 15eur/month I get 1000minutes in the same network, 200 for other networks, 1000sms. or mms, and 1gb of data transfer.

more than 5 years ago
top

US Cell Phone Plans Among World's Most Expensive

mulaz Re:Stupid prices (827 comments)

EU has pressed down on mobile companies, so prices have an upper limit. For example my carrier (mobitel slovenia) has a price of 0.132eur (13.2 cents) for sms, 0.516eur (51.6cents) for 1 minute of a call, all across EU. It is a bit more expensive then a national call, but still reasonable.

more than 5 years ago

Submissions

top

Spyware in BlackBerry updates (Etisalat)

mulaz mulaz writes  |  more than 5 years ago

mulaz writes "An update pushed out to BlackBerry users on the Etisalat network in the United Arab Emirates appears to contain remotely-triggered spyware that allows the interception of messages and emails, as well as crippling battery life.

Sent out as a WAP Push message, the update installs a Java file that one curious customer decided to take a closer look at, only to discover an application intended to intercept both email and text messages, sending a copy to an Etisalat server without the user being aware of anything beyond a slightly excessive battery drain.

Full story on thregister.co.uk"

Link to Original Source

Journals

mulaz has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>