Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!



Unwise — Search History of Murder Methods

teh moges Re:timothy... (532 comments)

The existence of the book draft would provide defence against that sort of evidence. However, if someone you know is killed by a faulty nuclear fusion reactor while the elevator override button has been disabled, I think you might still get in trouble.

more than 3 years ago
top Not Really Gone

teh moges Re:The important part (276 comments)

I had never heard of the site until this hoax. Now I at least know about it. I would say it would be a positive outcome (more people coming than going).

about 4 years ago

Intel Wants To Charge $50 To Unlock Your CPU's Full Capabilities

teh moges Re:Step right up, place your bets (832 comments)

Who cares if it can be pirated? It'll cost Intel very little to do this and the aim isn't to get lots of geeks paying $50, its to get average Joe at home to do it. They will still make money off this idea (so long as it isn't a huge PR disaster - selling crippled hardware...) with or without a patch.

about 4 years ago

How Cyber Spies Infiltrate Business Systems

teh moges Re:Cyber Spies (83 comments)

I like your idea of calling non-cyberspies 'meatspies' from now on.

more than 4 years ago

Knuth Plans 'Earthshaking Announcement' Wednesday

teh moges Re:What I would do... (701 comments)

Wouldn't the result be (P-1)!=N ?

more than 4 years ago

Google Introduces, Then Scraps, Bing-Style Background Images

teh moges Re:Microsoft Responds (466 comments)

I love the mindset of the computing field, when a 'background image' is considered copying (not least on twitter, for which its a fairly standard thing).

more than 4 years ago

At Issue In a Massachusetts Town, the Value of Two-Thirds

teh moges Re:Learn 2 math (449 comments)

Exactly. Just because it doesn't have a decimal representation, doesn't mean it isn't a valid number...

... ahem... you insensitive clod!

more than 4 years ago

Warner Brothers Hiring Undercover Anti-Pirates

teh moges Re:They will not collapse! (443 comments)

That makes sense if someone is willing to pay $100 million for the first copy of the movie. A more reasonable suggestion would be that once a movie starts to profit, they allow free copies to be distributed. Even then, there is an issue of making an overall profit as some movies fail, and what the level of 'enough profit'. I am completely against many of the claims and practises that the *AAs perform (download != sale, poor profits given to recording artists), but they release a product under a set of conditions. If you don't like those conditions, don't get the product. Eventually free market forces will allow the studios that make the best use of the Internet to profit and the rest will catch on. Yes they have a near-monopoly on the industry and they advertise particularly well, but people lived perfectly well before Avatar came out, so if you don't want to pay to see it, you don't have to see it right away. Wait until the movie is showed with advertising for free or don't even see it at all.

more than 4 years ago

How To Evade URL Filters With (Not-So) Fancy Math

teh moges Re:Technical details here (162 comments)

It works fine for me (v3.5.8 on kubuntu)

more than 4 years ago

Major ISPs Help Fund BitTorrent User Tracking Research

teh moges Re:It could be related to ACTA, or. . . (190 comments)

You would find that the majority of the 'good' botnets rely on many computers doing low-bandwidth operations, so that the owner of the computer doesn't notice. If the speed of the Internet gets too slow, the owner could send the computer in to get fixed, and the IT guy would find and remove the problem files. If the owner never notices, its less likely this could happen. There still exists viruses that do the 'high impact' thing, but they are less common now and don't last very long (for the previously mentioned reason).

more than 4 years ago

Ubuntu Gets a New Visual Identity

teh moges Re:Excuse me? (683 comments)


more than 4 years ago

Narus Develops Social Media Sleuth

teh moges Re:Ummmm.... (96 comments)

You don't need to market to 'the masses' to make (substantial) money off a product. Law enforcement is a big enough market if you get good saturation and Google + other ad networks would be a massive market.

more than 4 years ago

Air Cannon Ties Pirates In Knots

teh moges Re:And what happens.. (770 comments)

While at the same time ensuring that all on board the pirate ships are in fact pirates (no hostages, etc). Bad things happen when people become judge and jury themselves. Stun them, call the authorities and then stay out of it.

more than 4 years ago

StarCraft AI Competition Announced

teh moges Re:Does AI have to be good? (200 comments)

Hardly infinite. Most games place a limit on how much resources the AI can use, which means they need to make good decisions using limited resources. I'm not sure if Starcraft has these limits (a cursory glance suggests so), but it doesn't have good control over the micro of the player, which is what makes the difference between good players and great players.

more than 4 years ago

FBI Cracks "Largest Phishing Case Ever"

teh moges Re:Best use of money? (132 comments)

Don't forget the "it'll never happen to me" attitude that allows people to ignore the risks and do phishing anyway.
There will never be a short supply of people desperate enough to become phishers, just like house robberies are still an issue (despite, I am assuming, higher arrest rates).

more than 4 years ago

Security / Privacy Advice?

teh moges Do not move data if you do not have to (260 comments)

One thing about security is that people always take shortcuts, and one of the main outcomes of this is that data gets lost when it should never have been copied in the first place. A key example of this is when consultants take a copy of a database so that they can create a program to access the data. They don't need the data, they just need the schema. Get this into people's heads (think 'least necessary information' rather then 'easiest command') and it wouldn't matter how poorly your consultant handles your data, because they can't lose any of it.

about 5 years ago

StarCraft II Delayed Until 2010

teh moges Re:Not really (453 comments)

Perhaps it is fine with you, but it assumes broadband everywhere and perfect connectivity.
In Australia, I have a fast speed, but its ADSL and, while better then it used to be, it isn't reliable.
So if my ADSL goes down after I organize to have everyone over to play Starcraft II, we can no longer play. Its a stupid decision from misguided management types who don't realise, as someone said above, that soon after the release, the DRM will be cracked and the LAN support added. If Blizzard aren't going to look after their fans, they won't get any respect from them, and many will pirate the game out of spite.

I am happy to give Blizzard my money, I buy the commercial games that I play, but this decision will hurt Blizzard.

more than 5 years ago



Strict road rules against mobiles in Victoria

teh moges teh moges writes  |  about 5 years ago

teh moges (875080) writes "The Victorian road regulatory body, VicRoads, has introduced a range of strict measures against using mobile phones, PDAs, GPS units and other in car displays. Holding a phone or resting it on your lap is not prohibited, regardless of whether the phone is in use or not. The same rules apply for GPS units, which much be fixed using a commercially designed holder. In car displays are now banned from use by the drive, unless the display does can be used without touching it. Finally, TV screens must also be out of sight of the driver, or not setup to distract other drivers."

C# to Java conversion

teh moges teh moges writes  |  more than 5 years ago

teh moges (875080) writes "I am helping to manage the joining of two academic groups, one uses Java and the other C#. We are considering how we can package our software together, so that it can be monetized. As cross-platform compatability is a requirement, we are against using C# as the main language and are considering porting the C# code to Java. This question has been asked before when C# was in its infancy, and since then an open source project that converts the code has sprung up and gone stagnant.
Since the C# group isn't enthusiastic about changing their language, does anyone have any suggestions for converting the code, or other options which would allow us to use the C# code as simply as possible within a Java environment? It would need to be automated, as we don't have the resources to port large portions of existing code manually, as well as any new code that comes from the C# group."

Clarrifying the Australia ISP Filtering

teh moges teh moges writes  |  more than 5 years ago

teh moges (875080) writes "I recently received a response from the Minister for Broadband, Communications and the Digital Economy, Senator Stephen Conroy, regarding issues I had with the ISP filtering. My comment can be summed up by "Any efficient filter won't be effective and any effective filter won't be efficient". His response clarifies the issue of using the blacklist for censorship:

"...concerns have been raised that filtering a blacklist beyond 10 000 URLs may raise network performance issues... The pilot will therefore seek to also test network performance against a test list of 10 000 URLs... As this test is only being performed to test the impact on network performance against a list of this size, and actual customers are not involved,the make-up of the list is not an issue."

My initial query about the lack of effectiveness of the filter still stands, however it is important that the censorship issue is clarified. It seems, at least for now, that the trial that will begin on December 24th for the "10,000" list is for testing purposes, rather then using a list that will be used later. Still, no information on a guarantee of regulation is provided, so there is still a long way to go before this ISP filtering gains support, especially given Senator Stephen Conroy's lack of ability to answer questions in media conferences."

Link to Original Source

Aussie phones now outnumber Aussies

teh moges teh moges writes  |  more than 6 years ago

teh moges (875080) writes "The Australian Communications and Media Authority has just released a report that shows that there are now more mobiles phones (cellphones) in Australia then there are people. iTWire has a summary of the report which highlights that the new 3G networks here are driving growth and also that landline phones are still in sharp decline. This trend is expected to continue with the emergence of naked broadband services starting to become available in Australia."

teh moges teh moges writes  |  more than 7 years ago

teh moges (875080) writes "From an administrator point of view, I know a lot about MS Windows, where files are stored, where settings are, which registry keys to edit, how to change drivers and so on. I made the initial switch to Linux a year ago, and now that I feel capable with using Linux from an end user's point of view, and when things go wrong, I can fix them, thanks to Google. I now want to now start to get deeper into it. Are there any great resources, such as websites, wikis or books for someone that wants to find out exactly how Linux works and how to fix and modify it?"


teh moges has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?