Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Comcast Admits Delaying, Not Blocking, P2P Traffic

packetmon Lets be realistic (287 comments)

You don't like it leave. Its that simple. Maybe if Comcast customers started leaving in drones, Comcast would re-think their insane policy. Anything else is akin to whining like a child because you can't have the toy you wanted. If your phone company DID decide to pretend they were you and pick up and hang up your call what would you do. 1) Sue 2) Find new phone company. For those in a place where you're trapped in with solely one provider, I feel your pain. Maybe people need to start calling their local political representatives. Surely if anyone can take two to three minutes responding to this article or even my post, surely you can shoot off an email to a congressman or political dipshit to complain. Anything else, is whining.

more than 6 years ago

Submissions

top

packetmon packetmon writes  |  more than 7 years ago

packetmon writes "US Government officials in their infinite wisdom have created such a broad law in hopes of punishing malware writers that the law can punish just about anyone. "...engage in unfair or deceptive acts or practices in connection with specified conduct, including: (1) taking unsolicited control of the computer; (2) modifying computer settings; (3) collecting personally identifiable information [incl. using keystroke loggers]; (4) inducing the owner or authorized user to disclose personally identifiable information; (5) inducing the unsolicited installation of computer software; and (6) removing or disabling a security, anti-spyware, or anti-virus technology." Now, is this broad what? Using Geeksquad as an example of this insane law, imagine a GeekSquad employee having to fix someone's machine. What if he or she has to disable antivirus software in order to fix something. Oops there goes the law. What about on the ISP level, what about if an ISP is filtering dirty clients on his network and via MAC address filtering sends his client to a null routed VLAN. He technically "modified" a machine. There are so many avenues for abuse going on with a broad statement such as: "modifying computer settings". Wired Article"

Journals

packetmon has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>