Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Windows Flaw Allowed Hackers To Spy On NATO, Ukraine, Others

wiredog I wonder how long the NSA (97 comments)

has had this one on the shelf, without disclosing it?

5 days ago
top

Symantec To Separate Into Two Companies

wiredog split into Micro and Soft. (86 comments)

That would have been an excellent idea about 10-15 years ago. Lots of people thought that splitting it into MS Applications (Word, Excel, etc.) and MS OS (Windows, etc.) would have been a great thing all the way around.

about two weeks ago
top

Complain About Comcast, Get Fired From Your Job

wiredog your first amendment rights. (740 comments)

His First Amendment rights weren't violated at all, since his firing was related to what one company said about him to another. The First Amendment applies to being censored by the government.

He might have a defamation case.

about two weeks ago
top

To Fight $5.2B In Identity Theft, IRS May Need To Change the Way You File Taxes

wiredog Define 'food' and 'medicine' (410 comments)

Seriously. States that make this distinction end up maintaining databases of foods and medicines that merchants have to consult.

about three weeks ago
top

Google Quietly Nixes Mandatory G+ Integration With Gmail

wiredog Re:They Don't Need G+ To Track You Anymore (139 comments)

It's called "two factor authentication" and it's only mandatory if you care about security.

about a month ago
top

How Flickr Is Courting the Next Generation of Photographers

wiredog Re:Licensing issues (97 comments)

Flikr has CC licensing. IIRC, you have to opt in to the Getty thing.

about a month ago
top

Tim Cook Says Apple Can't Read Users' Emails, That iCloud Wasn't Hacked

wiredog Not really a lie (191 comments)

Apple doesn't run public email servers. At least, I don't think so. Nothing like gmail, anyway. So they aren't transporting your email. Unless they back up your mailbox to iCloud. But iMessage is encrypted, and Apple has stated many times that it can't read that traffic.

about a month ago
top

Ask Slashdot: What To Do After Digitizing VHS Tapes?

wiredog Safe deposit box (268 comments)

External hard drives are cheap. I Have one in the safe deposit box at the bank, one at home, and I rotate them every couple of months. I just do a copy of /Users (on my Mac, /home on Linux, not sure what the WIndows equivalent is) to the hard drive.

about a month ago
top

Microsoft To Buy Minecraft Maker Mojang For $2.5 Billion

wiredog Clearly, someone at MS said (330 comments)

We must not have a Minecraft gap!

about a month ago
top

After Celebrity Photo Leaks, 4chan Introduces DMCA Policy

wiredog Re:Doesn't this pretty much kill 4chan? (134 comments)

What is the legal status for hosting a server with illegal information on it?
If they don't know, then they are not responsible. It's in the DMCA, or possibly the CFAA.

about a month and a half ago
top

Interview: Ask Christopher "moot" Poole About 4chan and Social Media

wiredog So what do you think the chances are (220 comments)

That NSA and GCHQ are able to monitor 4Chan and track who the "anonymous" posters are?

about a month and a half ago
top

Professor Steve Ballmer Will Teach At Two Universities This Year

wiredog He's as much of a scientist (179 comments)

as my History professors and English professors were.

about 2 months ago
top

Fugitive Child Sex Abuser Caught By Face-Recognition Technology

wiredog Re:It's tinfoil time! (232 comments)

Or Congress, which has oversight authority.

about 2 months ago

Submissions

top

Silk Road Lawyers Poke Holes in FBI's Story

wiredog wiredog writes  |  about two weeks ago

wiredog (43288) writes "From the article by Brian Krebs:

Many in the Internet community have officially called baloney [that's a technical term] on the government’s claims, and these latest apparently contradictory revelations from the government are likely to fuel speculation that the government is trying to explain away some not-so-by-the-book investigative methods.

"

Link to Original Source
top

Consumer Reports Sells Out To Apple

wiredog wiredog writes  |  about three weeks ago

wiredog (43288) writes "CR claims that supposedly "unbiased" tests show that " both iPhones seem tougher" than #bendgate would imply and that the 6+ "outperformed the HTC One". CR also claims that "the Note 3's screen splintered and it stopped working.""
Link to Original Source
top

Canon printer hacked to run Doom video game

wiredog wiredog writes  |  about a month ago

wiredog (43288) writes "From the Beeb, the news that security researcher Michael Jordon has hacked a Canon's Pixma printer to run Doom. He did so by reverse engineering the firmware encryption and uploading via the update interface.

But does it play Barney Doom? And can you get Linux running on the thing?"

Link to Original Source
top

25th Anniversary of the Morris Worm

wiredog wiredog writes  |  about a year ago

wiredog (43288) writes "Yesterday was the 25th anniversary of the Morris Worm, the first malware to spread widely on the internet. The Washington Psot has a wrtiteup of the worm, it effects, and after-effects."
top

NSA is Collecting Lots of Spam.

wiredog wiredog writes  |  1 year,4 days

wiredog (43288) writes "Lots of it. Overwhelming amounts, perhaps. From The Washington Post

when one Iranian e-mail address of interest got taken over by spammers. The Iranian account began sending out bogus messages to its entire address book. ... the spam that wasn't deleted by those recipients kept getting scooped up every time the NSA's gaze passed over them. And as some people had marked the Iranian account as a safe account, additional spam messages continued to stream in, and the NSA likely picked those up, too....Every day from Sept. 11, 2011 to Sept. 24, 2011, the NSA collected somewhere between 2 GB and 117 GB of data concerning this Iranian address.

"
top

Samsung caught adding benchmark optimization code to Galaxy Note 3

wiredog wiredog writes  |  1 year,18 days

wiredog (43288) writes "From the article at ArsTechnica:

we can confidently say Samsung appears to be artificially boosting the US Note 3's benchmark scores with a special, high-power CPU mode that kicks in when the device runs a large number of popular benchmarking apps.

"
top

Why is the IRS targeting free software?

wiredog wiredog writes  |  about a year ago

wiredog (43288) writes "From the IRS "be on the lookout" list that listed "Tea Party", among others, as suspicious entities:

Open Source Software
These organizations are requesting either 501(c)(3) or 501(c)(6) exemption in order to collaboratively develop new software. The members of these organizations are usually the for-profit business or for-profit support technicians of the software.

"

Link to Original Source
top

Storm brewing over Weather Channel's bid for ".weather" TLD

wiredog wiredog writes  |  about a year ago

wiredog (43288) writes "From the Capital Weather Gang blog comes the story of the various people and organizations objecting to the Weather Channel's attempt to grab ".weather" for themselves.

I don't know why they would try, since they don't actually do weather forecasting anymore. Just one reality show after another."

Link to Original Source
top

Tracking Chinese Cyber-Espionage Botnets

wiredog wiredog writes  |  more than 2 years ago

wiredog (43288) writes "From Brian Krebs, reporting on a large scale Chinese cyber-espionage operation:

the infrastructure that frames these these spy machines generally points in one of two directions: one group’s infrastructure points back to Shanghai, the other to Beijing.

“There have to be hundreds of people involved, just to maintain this amount of infrastructure and this much activity and this many spear phishes, collecting so many documents, and writing this much malware,” Stewart said

"

Link to Original Source

Journals

Slashdot Login

Need an Account?

Forgot your password?