Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment Re: My first program was a text adventure (Score 1) 98

Do you remember what your first text adventure was called and what it was about? I wrote one in high-school in GW-BASIC called "Attack of the Bagels From Outer Space" that featured a comedic alien invasion inspired by the books by Douglas Adams and Daniel M. Pinkwater.

Comment Re: That was typical (Score 1) 98

This too was my early programming experience. Typing code from books or magazines, then debugging it when it doesn't work. Then when I got it working, modifying it and getting it to do new things. Skills, I might add, I still use today especially when downloading and modifying open source code.

Comment Re:Torrents != pirating (Score 3, Informative) 117

If you read the article, the New Statesmen themselves refer to it as "pirated" (in quotes). While one could pay money for the Magazine, those who can read Mandarin can get it for free using pirating methods where the print version will most likely not see the light of day due to state censorship. They are using this technique as its well known "the internet routes around censorship"

Comment Re:BOf in Java? (Score 2) 134

If you took time to read TFA you may have come across this little tidbit.

"One of the oldest techniques in the attacker's virtual arsenal, buffer overflows remain a problem. In December, Microsoft identified 2.6 million possible attacks that could be waged using a stack-based buffer overflow in the JRE (Java Runtime Engine)".

Comment Re:How long? It was several years ago. (Score 1) 406

Well a gentleman's agreement between corporations are lubricated with money. Between a government and a company? I assure you Uncle Sam would appeal to patriotism and expect one to lay back and take it while thinking of their country with nothing more to ease the experience. Probably even given threats as to what would happen if one did not cooperate.

Comment How long will it be? (Score 3, Insightful) 406

Now albeit through anonymous sources that government powers are developing malware, how will it be either through legislation, treaty or "gentleman's agreement" that anti-virus software manufacturers will have to look the other way for certain payloads? Is this already happening? Certainly the Third Amendment tells us we don't have to use our homes to quarter soldiers, but will the government use its citizenry's hard drives and bandwidth to host a weapon?

Comment Is it just me or? (Score 1) 280

Does the line: "car security systems will begin have a real impact to every day use if a thief can simply walk up to your car and drive it away." seem to imply car thievery is a new thing? Thieves have been stealing cars since you had to hand crank the engine. Sure the techniques in 1911 were different from the techniques in 2011 but this is a a bit hysterical isn't it? Criminals are always getting better than security which leads to better security which leads to more cunning thieves, like any living system, it will continue to evolve.
Open Source

Linux 2.6.37 Released 135

diegocg writes "Version 2.6.37 of the Linux kernel has been released. This version includes SMP scalability improvements for Ext4 and XFS, the removal of the Big Kernel Lock, support for per-cgroup IO throttling, a networking block device based on top of the Ceph clustered filesystem, several Btrfs improvements, more efficient static probes, perf support to probe modules, LZO compression in the hibernation image, PPP over IPv4 support, several networking microoptimizations and many other small changes, improvements and new drivers for devices like the Brocade BNA 10GB ethernet, Topcliff PCH gigabit, Atheros CARL9170, Atheros AR6003 and RealTek RTL8712U. The fanotify API has also been enabled. See the full changelog for more details."

Slashdot Top Deals

"Here at the Phone Company, we serve all kinds of people; from Presidents and Kings to the scum of the earth ..."

Working...
OSZAR »