Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!



Google Adds Two-Factor Authentication To Gmail

takev Re:One more reason to use Google Apps (399 comments)

a "good for one minute" code should also be used only once. A colleague told me to access all his wow accounts he has to wait 1 minute for each, because the "good for one minute" code is only allowed once.

more than 3 years ago

Gov App Detects Potholes As Your Drive Over Them

takev Re:swerves? (181 comments)

It's just you.

more than 3 years ago

Microsoft Kills AutoRun In Windows

takev Re:Option? (340 comments)

The installer is a fixed signed application I believe. You cannot make your own installer and allow it to execute automatically.
I am not sure if the installer is actually on the disk image, I think they are .pkg files.

If there are application bundles in the disk image, they will be executable, but you will get a warning that you are trying to execute an application which you have just downloaded from a website (it shows the website).

more than 3 years ago

If You Think You Can Ignore IPv6, Think Again

takev Re:ISP (551 comments)

ULAs are routable, just not globally. ULAs are supposed to be globally unique though, so when your company mergers with an other you can just link the two networks together without renumbering.

Right now when companies merge they both will (with high probability) have used the same range of addresses, so one of the companies will need to renumber.

Also although in IPv4 multiple ip address assignments is an administrative nightmare, with IPv6 it will not be as most of it will be handled automatically by hosts. You will only need to configure the routers to advertise the prefix of the global routable networks.

more than 3 years ago

If You Think You Can Ignore IPv6, Think Again

takev Re:Why would you want to do those broken things? (551 comments)

The reason FTP adds the ip-address and port number in the payload of a packet is to allow server to server data transfers. You can take an ftp client and connect to two servers at once, then tell one server to listen for a data connection from the other server, then let the other server send the data to the first.

If those servers are going to be NATed this is going to be hard, in fact these days it just will not work anymore as all the NAT devices expect the client to also be the receiver/sender of the data. Or the NAT may not see the control connection of the client at all.

There are so many things broken with NAT you wont belief it, but because you've never used such features you cannot think they could exists, nor could you see the use of it, so you want NAT.

more than 3 years ago

If You Think You Can Ignore IPv6, Think Again

takev Re:Can someone explain IPv6 without NAT? (551 comments)

IPv6 is designed to assign multiple addresses to your network interface.

By default an interface is assigned a link local address, that can only be used inside the broadcast domain of your network. So all the host/routers connected to the same switch can talk to each other, without being configured to work on the internet.

When you connect a router to an ISP it will receive a network address which it will advertise to all the hosts in the network. The hosts in the network can use the advertised network address and auto configure a second address on their network interfaces. You can also manually configure, and also make manual subnets by configuring the router.

When you connect a router (may be the same router) to a second ISP, then the router advertises and other network number, and all the host on the network will add this to their interface as well. With some stacks you can configure policies for costs and quality to use one ISP over an other, of course this requires a bit more work by the network administrator. Multihoming with IPv4 was a lot more difficult.

You can also make your routers advertise Unique Local Addresses, basically a private range, then you can have a stable numbering within your organization. From what I understand from the wiki article, the unique local addresses are hopefully still be globally unique so you can route between two ULA networks for example when two companies merge (which is an extreme hell now with IPv4 where every company has chosen the exact same range of addresses)

I am not sure if using ULA inside your network, to make internal-services provider independent, is recommended.

So what I am saying is, that NAT is not necessary, because it was build in the protocol to work with private ranges and public ranges at the same time.

more than 3 years ago

The Case of Apple's Mystery Screw

takev Re:While annoying... (845 comments)

Yes, these are not torx, nor are they secure torx.

more than 3 years ago

Espionage In Icelandic Parliament

takev Re:Recovery Fairy Tales again (274 comments)

Harddrives no longer have stepper motors for positioning the head, they use a voice coil and you can position the head anywhere you want. In all likelyhood the internal electronics uses PWM to drive the voice coil, I am guessing with data retrieval you can get a higher resolution PWM or use an analogue system.

more than 3 years ago

Major Sites To Join ‘World IPv6 Day’

takev Re:Yay (247 comments)

You are forgetting the whole point of NAT: To make non-routable addresses routable to the internet.
This simple fact is why the "NAT is a security device" argument "Because my network addresses are not routable" does not hold.

And MAC address filtering is not a NAT function, but a firewall function.

more than 3 years ago

First-Sale Doctrine Lost Overseas

takev Re:The stupidest thing is (775 comments)

Moral copyright law says you are not allowed to vandalize or destroy a copyrighted work.
The USA only respects moral copyright on visual art, which Omega claims on its "logo", so it applies.

more than 3 years ago

NASA To Auction Automated Code Generation Patents

takev Re:Sickening (134 comments)

Copyright is enough to cover software from being stolen by another company.

Right now we are in de ridicules situations that a single piece of software is covered by three different property rights:
- Copyright, which covers the original source code and binary as a work of art/craft.
- Trade secret, because most software is only released in binary form.
- Patent, which oddly for software does not break the trade secret because they mostly cover ideas instead of implementation or are written in such a way that one skilled in the art can't recreate the implementation from the patent.

In other fields you have to choose one, and only one, of these rights.
- The formula for Coca Cola cannot be copyrighted, they don't want to patent it because it only last for a few years, so they have a trade secret they protect.
- The song Happy Birthday is copyrighted, there are no patents for the order of notes in the music, nor can it be a trade secret on how to sing Happy Birthday.
- The cap of a shampoo bottle, can't be copyrighted, a trade secret is useless because everyone can see it, so they opted for a patent.

more than 3 years ago

Ergonomic Mechanical-Switch Keyboard?

takev Re:Full sized laptop key style (310 comments)

Actually they probably do use dome switches. Still they click much better than normal keyboards.

more than 3 years ago

Ergonomic Mechanical-Switch Keyboard?

takev Re:Full sized laptop key style (310 comments)

I know what you mean, I also like notebook keyboards. Somehow they never use the dome switches, and have much more of a click feel compared to normal keyboards. Although the Apple unibody notebook keyboards look odd they feel quite good for typing, and crums don't seem to get underneath the keys like they do on other notebooks.

The Apple keyboards are the same ones used on their notebooks, so you may want to check those out.

They used to also have wired keyboards, not sure if you can still buy those.

more than 3 years ago

In France, Hadopi Reporting Begins, With (Only) 10,000 IP Addresses Per Day

takev Re:Dear companies, (376 comments)

Please don't forget to pay for the right to entertain your family with your music, it is very likely (actually mathematically certain) that you infringe on part (one beat of musical passage is enough these days) of a copyrighted song.

more than 3 years ago

Looking Back At OS X's Origins

takev Re:What the article doesn't mention (312 comments)

Their first Beta had lots of colors, their windows has a light blue pin stripe. Then the graphic artists told Apple that all their graphics became off-color, because their eyes compensated against the slight blue tint (our eyes' automatic white balance).

Ever since then each version removed more color from the themes and from their applications. Personally I think they went overboard with iTunes, but it may also be that they want everyone to adopt the gray icons in a list for other applications as well. Don't forget that Apple applications are often used by programmers as example applications on how to visually design their own. For programmers making application that are used in any way during (not just for) Image and Video editing it is wise to reduce the amount of colors in their application. Just like most applications shouldn't make any kind of sound when people want to do sound editing.

more than 3 years ago

HDCP Master Key Is Legitimate; Blu-ray Is Cracked

takev Re:Much easier than that.. (1066 comments)

The key of the splitter could be revoked. You can now make a splitter which cannot be revoked.

Although most of these strippers have sourced their chip from a factory who sold the same chip with the same key to a large television company, so in practice they couldn't revoke the key anyway.

about 4 years ago

Preventing Networked Gizmo Use During Exams?

takev Re:Why do the complicated expensive solution? (870 comments)

When you are dyslexic it is very hard to remember information like telephone numbers, list of words or formulas. Luckily technical schools mostly allow you to bring a formula book with you on exams.

However on the occasion I forgot to bring a book, I had to recreate the formulas. Which took more time to figure out, but I often got more points because the teacher read the notes and thus knows I understand the material. But in that particular school the teachers are more interested in if you know how to solve the problem than if you got the correct answer (I once had every answer wrong on a test and I still got an 8 because they way I got to the answer was different (not how it was thought) and correct).

about 4 years ago

HDR Video a Reality

takev Re:HDR? (287 comments)

HDR means you use more bits when recording the image. More than the usual 8 bits per color component. One can already do a bit of HDR when you take the raw image from most photo cameras that have 10 to 14 bits of depth. However these 10 to 14 bits are linear light (as opposed to gamma corrected for the display, so their dynamic range is not much better).

The real improvement comes from taking multiple exposures of different lengths of the same subject. Then combine these exposures into a single image; basically you would try to use the pixels from the long exposure (more accurate measurement) unless the pixel is over exposed, then you would use the same pixel from the short exposure; in reality you would use a weighted average to smooth it out a bit more. The more exposures you have the more range of accurate measurements you have.

In this case they took two cameras, set to a different exposure speed, then later they combined the two videos into a HDR image.

Now comes the interesting part, displaying the HDR image/video. You can now simply choose a virtual exposure time to show the image in a normal way, but more convenient than having to select the exposure during filming.

Or you use a special algorithm that changes the exposure of an image on a per pixel basis based on the surrounding pixels, in sort of the same way as a human eye would interpret the real world. This would show a picture with both dark a light patches very clearly, and more lively. However such algorithms always make it look fake, but it may just be conditioning that we have had looking at normal photographs (like a transistor amp compared to the valve amp).

Also from the video it looks like the algorithm used here causes flickering in the image (unless the flickering was caused by the cameras themselves), I guess the algorithm needs to be modified to take into account moving images.

about 4 years ago

Apple Relaxes iOS Development Tool Restrictions

takev Re:Problem (347 comments)

I do not know exactly what the blind grenade does, but if the purpose to make the enemy invisible, then maybe the game server should not send update to the client for this enemy.

For looking through walls, it is the same thing, don't update persons that are not visible. This is not super simple, because you may not want to do accurate visibility culling on the server. But maybe there is a happy median.

I don't really have a solution for aimbots, nor can an anti cheat program help against this very well. If one makes one that no one has one, then the anti cheat software may not find the signature for it. Or the aimbot may be build completely outside of the computer; capture video and emulate a keyboard and mouse (I've seen eve online bots that could use this method).

I can see the problem for the games you guys mentioned, with a high twitch element and where the fog-of-war is hard to calculate by the server. I am actually much more puzzled about the aggressive use of anti-cheat software for games like world of warcraft.

about 4 years ago

Apple Relaxes iOS Development Tool Restrictions

takev Re:Problem (347 comments)

I find anti-cheating software an unnecessary evil.

It is very basic software engineering: "never trust input from a user". As the client software of game is in the hands of the user this extends to the client itself. In fact this also extends to the anti-cheating software itself.

Like DRM, anti-cheating software is a mathematical impossibility.

It is far easier to just design your game so that you do not trust the client code, run the simulation/game on the server and let the client be a dumb terminal. Dumb being a relative term, as you do want to implement some sort of prediction in the game to what the game server will do, to make it a smooth user experience.

about 4 years ago


takev hasn't submitted any stories.


takev has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>