Slashback: OSX Security, DoD Filtering, Anonymous Posting 211
University of Wisconsin's Mac OS X Challenge. HABITcky writes "The University of Wisconsin Security Challenge has ended after 38 hours, intermittent DoS attacks, 4000 ssh login attempts, a bandwidth spike of 30 Mbps, and 6 million logged ipfw events. During this time there were 'no successful access attempts, nor any claims of a successful attempt.' You may remember this challenge was proposed in response to the 'woefully misleading' ZDnet article, Mac OS X hacked under 30 minutes, which was previously discussed here on Slashdot."
Skeptics investigate cold fusion.smooth wombat writes "As a follow-up to a previous Slashdot posting, Purdue University is investigating the claims of Rusi Taleyarkhan who claimed in 2004 to have created nuclear fusion at room temperature. The investigation came about from complaints from colleagues who suspect something is amiss. Taleyarkhan, who used to work at Oak Ridge National Laboratory, has, since working at Perdue, removed the equipment the co-workers were using to try and replicate the results, claimed results for experimental runs were positive for fusion despite the co-workers never seeing the raw data and opposed the publication of results which contradicted his findings."
More on DoD web filtering. timetrap writes "I work in a mobile combat communications unit, while I'm not in the sandbox right now, I can attest to the DoD policy on blocking web access. First of all when you are down range don't expect to even get DSL speeds from a satellite, we usually roll with about 256kbs for the data side of our trunk. So blocking sites is very important, otherwise 4 or 5 people could start streaming audio and pretty much knock down any legitimate use of the network. We filter websites with smartfilter and yes the military system admins in the IPO office will unblock any web site that isn't blocked by local policy (no pr0n, no streaming audio, no civilian web mail: both the hot and the g varieties, and no chat programs; although irc is used by the DoD) This is no Orwellian conspiracy, but quick and easy system administration; apply smartfilter: check! If you want to check the current smartfilter blocked sites goto: securecomputing and submit some sites to check." Slashdot's own Jamie took a look at Smartfilter back in '99 as a part of the Censorware project and it still remains a mysterious black box to this day. While some would advocate full disclosure using censorware still appears to be merely passing the buck.
AT&T cuts 10,000 jobs after BellSouth merger. mytrip writes to tell us that immediately following their $67 billion acquisition of BellSouth, AT&T plans on cutting about 10,000 jobs.
More child-proofing efforts for MySpace. conq writes "BusinessWeek has an interview with Connecticut Attorney General Richard Blumenthalin in which he describes measures MySpace and other similar sites should take to protect children. From the article: 'We're going to be suggesting some very specific measures that MySpace can take based on our conversations with MySpace as well as with other law enforcement authorities at the state and local levels. We've received hundreds of complaints from parents who are concerned about these issues, and we want to be sure that the measures we propose are technologically feasible and financially viable.'"
Why Windows Vista will Suck: a rebuttal. shrapnull writes "Hot on the heels of Extreme Tech's 'Why Windows Vista Won't Suck', Steven J. Vaughan-Nichols has an alternate position posted on DesktopLinux, and sent to subscribers of Novell's 'Suse Linux Cool Solutions' newsletter."
Harvard researcher punished for reporting bugs. Guillermito writes "A story previously discussed came to a sad conclusion two weeks ago. The bottom line is this means that it is forbidden to use reverse engineering tools to find bugs in a software. You also have to prove that you own a valid license for each version of the tested software. To publish a proof of concept that contains a few dozens of copyrighted bytes is also forbidden. It's a nice precedent for any company selling a defective product."
Assemblyman Biondi backpedals on NJ anonymous posting bill. Quadraginta writes "Earlier, denizens of Slashdot reacted to a story about a bill to be introduced to the New Jersey legislature that would require hosts of forums, bulletin boards and the like to keep track of the real identity of anonymous posters. Seems like there was a strong reaction all over. Assemblyman Biondi now appears to be backpedalling furiously. From a letter quoted after the link: 'I am getting inundated with responses which I will review and use to better educate myself on the implications of this bill. If, after reviewing all of the correspondence and the opinion of OLS, it turns out that the bill is, in fact, unworkable, I will certainly reconsider and withdraw it.'"
A followup on Chinese TLDs. nqz writes "In this story on ComputerWorld, ICANN and the China Internet Network Information Center (CNNIC) both dispute a previous story discussing China's new top-level domains containing Chinese characters."
OSX security (Score:2, Interesting)
Re:OSX security (Score:4, Insightful)
More like the campus IT head went ape shit regarding the amount of bandwidth eaten up by this contest.
Re:OSX security (Score:5, Insightful)
Re:OSX security (Score:2)
Sufficiently so [slashdot.org], apparently:
Re:OSX security (Score:2)
Now back to your regularly scheduled programming...
Re:OSX security (Score:3, Insightful)
Oops! (Score:5, Informative)
CIO = Chief Information Officer
Re:Oops! (Score:5, Insightful)
I think it is woefully misleading to not mention that the challenge was ended early!
It was, but... (Score:3, Funny)
Re:Oops! (Score:3, Informative)
And how come we don't have a link to the information contained in the Slashback? I'm not questioning the veracity of the information, cause Schroeder is on the up and up, but where'd HABITcky read about it?
P.S. Google cache of the site before the contest was ended.
http://64.233.179.104/search?q=cache:test.doit.wi
Re:Oops! (Score:5, Interesting)
^BUMP^ (Score:2)
Re:Oops! (Score:5, Interesting)
Re:Oops! (Score:4, Funny)
Re:Oops! (Score:2)
-Eric
Re:Oops! (Score:2)
Re:Oops! (Score:2)
Maybe he can get a job at Apple when UW fires him for this stupid stunt.
-Eric
OS X security competition "ends" (Score:5, Interesting)
Yesterday we discovered the Mac OSX "challenge" was not an activity authorized by the UW-Madison. Once the test came to the attention of our CIO, she ended it. The site, test.doit.wisc.edu, will be removed from the network tonight.
Our primary concern is for security and network access for UW services. We are sorry for any inconvenience this has caused to the community.
Still, shut down or 'ended,' not being hacked is a good show. Congrats to OS X.
I think Apple would be well-served by having a continously running OS X security challenge, for both OS X and OS X Server. Offer a reward every time you demonstrate a hole, and fix them fast.
Re:OS X security competition "ends" (Score:5, Interesting)
Would be nice to see something like this for all platforms. The only question is how valid is the test, since the security of computer depends as much on the network security around it, as the machine itself. Firewalls can help filter out much of the bad traffic, reducing the final impact on the host. I would not like to say that any system is invunerable, since vunerability also depends on the configuration of the machine and the people managing the installation. A well patched windows installation might be as good as a well patched OS X installation.
Re:OS X security competition "ends" (Score:4, Insightful)
Well, if it's ever done by Apple, it would best be done as a tool to actually help find security vulnerabilities, rather than as a marketing effort. To that end, I'd suggest whatever configuration would best expose those vulnerabilities.
A similar test for local vulnerabilites would also, obviously, be quite valuable (as the ZDNet test showed).
Re:OS X security competition "ends" (Score:2)
Things I've noticed that can cause security risks on a web server:
a) allows write access under the document root - many CMS (Content management systems) [opensourcecms.com] have such a mechanism to cache images like avatars (which honestly should go in the d
Re:OS X security competition "ends" (Score:2)
Re:OS X security competition "ends" (Score:5, Informative)
Well it's not exactly identical, but one of the people who works on SELinux has been running a test machine on and off since Fedora Core 2. Details are here [coker.com.au]. Similar to the OS X box that was hacked in 30 minutes he does have SSH open and provides you with local account access, the local account being root. I wouls suggest that that shows a certain amount of confidence in its security. Also note that SELinux is coming to Ubuntu soon [ubuntu.com].
Jedidiah.
Re:OS X security competition "ends" (Score:4, Insightful)
Yes, but what happens when someone cracks the Windows box sitting next to IT. If you want to say your box is secure, you better not be adding the caveat "behind a firewall with the network cable unplugged".
Re:OS X security competition "ends" (Score:2)
I'll confirm this. Not that long ago, I reinstalled Windows XP Pro on one of my machines and the first time I logged in there were dozens of viruses and other malware already runn
Re:OS X security competition "ends" (Score:2)
minimac vs. SUN Fire! LOL!!
Re: Mac Challenge (Score:5, Insightful)
I guess it all just depends on exactly what you want to do.
Re: Mac Challenge (Score:5, Interesting)
Looks like every hacker and their uncle had a go at this one. I wonder how many unique IP addresses were used to access the challenge.
Parent is right. (Score:4, Interesting)
I completely agree with you. a 4,5% share seems low but many hackers would get a terrific ego boost by being able to shut up once for all the mac fanboys. Also some attacks on windows rely on unpatched machines with this and that service running and reachable through firewalls, which could well mean an attack on the 10% or less of the total of windows machines which in turns makes like an 8-6% or even less share. Crackers still take time to engineer them, though.
Mod parent up, please.
Re: Mac Challenge (Score:4, Funny)
Oh yes, and: "The challenge is as follows: simply alter the web page on this machine, test.doit.wisc.edu (128.104.16.150)." Not DOS it or other machines around it.
Re: Mac Challenge (Score:2)
So isn't that a success? They've basically proven that DoSsing a site that's administered by someone else is a quick way of taking it down.
chinese tld's (Score:2, Interesting)
Does it matter what they say? Any Chinese portal with enough heft can just start handing out Chinese TLDs whenever they like. (For that matter, so could I, but noone would know). Does anyone know the current state of international tld support in browsers? And what encoding is/would it support?
For that matter, if China (mainland) blazes the path for Chinese TLDs, would they go with gb2312 and thus sort of make China (mainland
UTF (Score:2)
Having said that, if we're going to use UTF, we might as well use it right. Otherwise, it is going to be an agonizing pain every time we have to step up a version. DNS issues, alone, will preclude frequent updates from a half-hearted update. For this reason, it would seem stu
Re:UTF (Score:3, Interesting)
Based on the current definitions, we should be looking at UTF-32...
The Unicode FAQ talks a lot about how nobody needs more character sets than UTF-16 can support, but (a) they don't represent all languages, or even a reasonable set, because UTF-16 can't handle that many...
With due respect, you clearly don't know what you're talking about.
UTF-8, UT
Re:chinese tld's (Score:2)
Re:chinese tld's (Score:2)
No, if the Chinese would go their own way and make everything Chinese, which they won't btw, they would use the Chinese encoding GB18030. Note that this is neither a simplified Chinese encoding nor a traditional Chinese encoding, it is just a *Chinese* encoding, compatible with Unicode and able to
Re:chinese tld's (Score:2)
"For that matter, if China (mainland) blazes the path for Chinese TLDs, would they go with gb2312 and thus sort of make China (mainland)'s TLD scheme the default for the world as opposed to Taiwan's Big5?"
Thus you referred implicitly to a simplified character encoding (GB2312) and a traditional (Big5). The mistake is that China doesn't endore any simplified encoding at all, but only a genuinely Chinese encoding, GB18030. Since this set is compatible with Unicode, it also incorporates al
Thai TLDs (Score:2)
Windows no longer uses BSD network stack (Score:5, Informative)
Re:Windows no longer uses BSD network stack (Score:2, Interesting)
$cat ftp.exe|grep california
You should get the "Copyright blah-blah regents of the universty of california, berkley" or something similar, I can't quite remember
Re:Windows no longer uses BSD network stack (Score:4, Informative)
@(#) Copyright (c) 1983 The Regents of the University of California.
That's from the Windows XP 64-bit Edition ftp.exe, but keep in mind that this is just the text based ftp client, and not the TCP/IP stack we're looking at here. Anyone know which file(s) contains the Windows TCP/IP stack?
Re:Windows no longer uses BSD network stack (Score:2, Informative)
DoD filtering (Score:5, Funny)
And that's why when it says on your military ID "Property of the U.S. Government" they're not just talking about the ID card ... =)
Re:DoD filtering (Score:2)
Re:DoD filtering (Score:3, Insightful)
(On Vulnerabilities) Idiots. (Score:2)
Nice move, smartasses.
I am very bothered... (Score:5, Interesting)
Software researchers are the most impacted by this, as it's hard for a PhD to claim natural stupidity as a defense. It's expected of most end-users (even when that is unfair) so they can get away with it.
Re:I am very bothered... (Score:3, Interesting)
Actually.... If you publish a flaw and don't back it up and then get sued, you can have the pleasure of proving (in a court of law) that their software is teh sux.
After you've embarrased them (and gotten it into the public record) you can counter-sue them for wasting your time and money. If you're lucky, you can get some punative damages too.
Unless France is like England, where truth is not a defense against defama
Re:I am very bothered... (Score:2)
Re:I am very bothered... (Score:2)
IANAL but I believe (at least here in Australia) that truth by itself is not a defence against defamation. In addition to being true, what you say must also be in the public interest.
In this case I'm sure you'd find plenty of people willing to argue both sides of that. Should keep some lawyers busy for a while...
Re:I am very bothered... (Score:2)
Luckily for him, people have been donating [zdnet.com.au] to help him pay for his fine.
Solution to security research problem (Score:5, Funny)
"Some companies object to our legitimate research, even though we report our findings responsibly. So be it. We resolve to continue to locate defects in these irresponsible vendor's products. However since they now make it a crime to do the right thing, we resolve to anonymously publish our results for these products to the most vile and wicked cracking gangs we can contact as ready to use fully weaponized exploits. We further assert that we do not fear any legal reprecussions on the grounds that if any Fed can tag us we aren't worthy to continue in this line of research."
Let the business press cogitate on that announcement a day or two and see how fast vendors start backpeddling.
Re:Solution to security research problem (Score:3, Insightful)
But as much as I love your idea, it will not happen due to the Sheeple, who are either too clueless, too apathetic, or both, to ma
Re:Solution to security research problem (Score:5, Insightful)
No - the best thing to do IMHO is to just say that you have found a problem with their product but that due to the litigious nature of the company(ies) you can not explain how the problem comes about nor will you provide any details because you have destroyed all evidence in accordance with the company's wishes that all problems remain just that - unresolved problems. Further, since you have found these problems and could verify that they existed if the company would allow you to do so; you must - in the future - deny any request from the company for information (since you had to destroy it and it is illegal to have such information in your possession) and - you must also, from that day forwards, recommend that this company's products be barred from consideration in future purchases for the university and/or any companies with which you are going to be working with until the problem has been fixed.
Remember - hit them in their pocketbook. If everyone gangs up against the company and refuses to buy their products and boycotts them, they will go out of business and you won't have to deal with them anymore - or - they will stop trying to enforce rules and regulations which are detrimental to the overall health of the (and their) economy.
The alternative is for the person to send the information out to every other university in the United States and all of them declare the same findings at the same time so there isn't just one person the company can sue. They would have to sue everyone which makes them a persona non grata in the academic world. The great thing about this idea is that it would definitely draw the attention of the press if such a thing occurred. Which, I believe, is not something any company wants to do. (Be on TV across the nation in a bad light.)
Just my $0.02 worth.
PS: Remember - they can't make you perjure yourself in court. So when they ask what you did you just say "I can not answer that under the rules and regulations of the 5th admendment." And if asked to explain you just look at the judge and say it is a catch-22 situation. You are damned if you answer and damned if you do not. Sort of like the Spanish Inquisition where they'd ask questions like "Did you enjoy consorting with the devil the last time you did it?" and then only allow you to answer yes or no. Either answer makes it look as if you enjoyed consorting with the devil at some point.
Why Windows Vista Will Suck (Score:5, Funny)
I understand operating systems and am very smart and I have 20 computers and a dog named spot.
linux power.
Vista will suck because it won't be free.
linux power.
The graphics will suck because it takes an expensive computer to run Aeroglass.
linux power.
Memory management will suck because linux has had good memory management for years.
linux power.
Superfetch will suck because GCC has had it for years, and your dog can run off with your USB card. (Never mind that it's just a *cache*, and it won't do anything but slow your computer down again after your dog starts chewing on it)
linux power.
TCP/IP improvements will suck because it's been in other OS's for years.
linux power.
Security will be bad because they found a bug in vista.
linux power.
Re:Why Windows Vista Will Suck (Score:5, Insightful)
Seriously though, I would like Microsoft to improve their caching abbilities using the system's RAM. For now, Windows only has two setting. To cache minimally, or maximally. So what do I do when I got 2GB of RAM, want a run a 300mb application and cache the rest? According to Microsoft, they recommend not to cache because Windows will store that application in the paging file. Talk about stupidity.
Seriously, if mainstream applications would be ported to Linux, more people would switch.
Re:Why Windows Vista Will Suck (Score:2, Insightful)
Everyone sure that guy didnt just make that up.
I mean if the system lets you point Superfetch to any drive on the system and you happen to point it to a USB drive then fine, but does it have to be on the USB drive?
using a USB drive for that seems like a bad really bad idea agreed. But i havent read anything saying that but this guys article, and maybe he set his system up for that or something? but no body told h
USB and SuperFetch (Score:2, Informative)
"Windows Vista introduces a new concept in adding memory to a system. USB flash drives can be used as External Memory Devices (EMDs) to extend system memory and improve performance without opening the box. Your computer is able to access memory from an EMD device much more quickly than it can access data on the hard drive, boosting system performance. When combined with SuperFetch technology, this can help drive impress
A better summary. (Score:2)
I really don't see a thing, not one single thing, that will make the still undelivered Vista significantly better than the Linux or the Mac OS X desktops I have in front of me today.
Message: you can pay more to get less.
This is a surprising message from anyone at Ziff Davis, much less a senior editor. It's the first sensible thing I've read from them in years.
He's run Vista and thinks it sucks because it has all the old crufty problems M$ is inf
What a @$#%#$ idiot... (Score:3, Insightful)
I think you missed the point. (Score:2, Interesting)
Let me get his point across for you:
I really don't see a thing, not one single thing, that will make the still undelivered Vista significantly better than the Linux or the Mac OS X desktops I have in front of me today.
You know they want to give him the best they have,
Re:I think you missed the point. (Score:2)
He forgot one thing. Perhaps Vista will be significantly better than Windows XP adn this may be reason enough for some to upgrade. He never said it was worse than those OSes (other than his comments about a beta version of an OS). However, does it have to be significantly better than Linux or OS X? What if it's marginally
DoD policy=depends on who ya ask! (Score:4, Informative)
"I work in a mobile combat communications unit, while I'm not in the sandbox right now, I can attest to the DoD policy on blocking web access.
There are several levels of DoD blocking. First, the DoD policy on web access, policy, and security in general, very broad, next is the Departments level, i.e. Army, Navy, etc, then there is the base policy and then the command policy and unit policy all the way down to the company. The "general rule" is that no one can have policy rules lower then that of above. This means a platoons policy can not be more lax then the base policy. This sort of transitive policy based appliance leaves much room for interpretation at all levels of policy implementation. Every service is different, every level is different and every network right down to the hardware is different. So, when you talk about blocking you have to be very specific as it is nearly impossible to just nail down an exact, cut and dry policy. Web content filtering, ACL's and the likes are different from service to service and mission to mission.
First of all when you are down range don't expect to even get DSL speeds from a satellite, we usually roll with about 256kbs for the data side of our trunk.
This is too far from the truth depending on the environment. The Ku band in Iraq is quite substantial in fact the smallest direct BGP Sat link might be a T-1 up to 8 and 32Meg or so via a Sat package called the DKET. This is speaking for the Marine side by the way. Also lateral links are about 3Meg at the smallest level via another Ku Sat package. This of course has its caveats. At this level we are talking about a non-mobile infrastructure were as a mobile infrastructure would be a Microware shot thru a TSR or MUX link at anywhere from 96k to 512k or more depending on voice needs and breakdown of classified to unclassified network needs. (Data bandwidth is shared between the two types of DoD networks when multiplexed, voice generally rides its own trunk card thru the multiplexer, typically a Promina node does this multiplexing or at lower levels in the unit they have what is called an FCC multiplexer)
So blocking sites is very important, otherwise 4 or 5 people could start streaming audio and pretty much knock down any legitimate use of the network. We filter websites with smartfilter and yes the military system admins in the IPO office will unblock any web site that isn't blocked by local policy (no pr0n, no streaming audio, no civilian web mail: both the hot and the g varieties, and no chat programs; although irc is used by the DoD)
This is somewhat accurate. From the Corps standpoint, when I first went to Iraq this was not the case. We could chat all day long until it was "locked down". This is done at the BGP point via the highest headquarters out there, CentCom etc. Even then it isn't full proof, I found ways around it, i.e. bypass or just good ole bribing the E-3 at the terminal.
This is no Orwellian conspiracy, but quick and easy system administration; apply smartfilter: check! If you want to check the current smartfilter blocked sites goto: securecomputing and submit some sites to check."
Once again, take this with a grain of salt. Though this seems like it applies to all agencies and to all services at all times it really doesn't. The mobile and deployed units are in constant flex so nothing is really ever solidified when it comes to policy. The ONLY real way to know for sure is to go out there and site down behind their network and try it yourself, or ask someone you know out there to do it. I have a couple dozen friends out there right now on the Net Admin side so if you have a specific inquiry post it and I will see what I can come up with.
Re:DoD policy=depends on who ya ask! (Score:2)
Where I was stationed, the official network's content filters changed over time (at about the time the COSCOM running the base changed) the internet cafes would get you to everything but pr0n for the entire year. Though I understand that different locations have different vendors for the internet cafes - all the way f
myspace (Score:4, Insightful)
Not sure what the point of this article is, he doesn't even say what his "specific measures" are. Probably just some political move.
I don't know what the big deal is about myspace, just politician noise, I guess. What kind of 14 year old girl is going to go out with a 30 year old man? If they do, there is probably some other problem (like they are starved for affection). I remember here on slashdot a few years ago there was a story about a girl who got seduced by a predator, but her mother was encouraging it!
So yeah, there is a problem here, but making laws about myspace isn't going to help anything.
Re:myspace (Score:2)
You've about summed up Richard Blumenthal.
I'm not entirely sure what his game is. He doesn't do a horrible job as AG, but his statements to the media sound like total BS gloryhounding, saying it to make people love him rather than that he actually intends to do something about it.
I'm pretty sure he's targeting a run for some office in the near future. Exactly what I'm not sure. Probably either Congress or the Governors office. He'll have a fight on his hands if he takes on Mama Rell th
Shhhh! (Score:2, Interesting)
"Why Windows Vista won't be known to suck."
There is no AT&T (Score:4, Interesting)
The "real" AT&T, pathetic as it was in the last couple of decades of its existence, had a long and interesting history, dating to the 1870s. There's something profoundly phony about a company like SBC claiming to be a continuation of that.
Re:There is no AT&T (Score:2)
Re:There is no AT&T (Score:2)
To be fair, a lot of the vertical integration in the phone system is history. You no longer are forced to lease your premises equipment (even at home!) from the phone company. Plus AT&T's former hardware operation, Lucent, is forced to compete for Central Office equipment sales. Ironically, their biggest competitor is Nortel, which u
Re:There is no AT&T (Score:2)
fucking hell (Score:2)
Well, to anyone reading this not familiar with the state AG, he's basically glory hound. I am pretty skeptical of anything he says... things just look like he wants his name mentioned everywhere.
Granted, he does an ok job as AG, but that often seems to be secondary to the blatant glory hounding that infects everything he says to the media.
Reporting bugs illegal? (Score:2)
But that's a subject for another post. In the meantime, I think it's preposterous to stop people from reporting bugs. It's
Vista will suck, really? (Score:4, Informative)
However, I had to go WTH when I read the article. How can anyone here in the
#1) The person writing the article doesn't even have a video card that does Vista Glass, that means, they don't have a video Card made in the last 4 years, all it takes is a Pixel Shader 2.0 on the card, that NVidia debuted years ago at Comdex with the GeforceFX 5200 for 80 bucks.
#2) Did anyone else catch this line about his reference to the Vista video requirements, " would only add that if you expect to see the fancy desktop, you need to invest in, say, an ATI Radeon XPress 200, an Nvidia nForce4, or a high-end graphics card."
Ok, hold your hand up if you know the difference between Video and Mainboard chipsets? nForce/Geforce anyone? I know 10 year olds that would laugh at this. And the ATI Radeon Xpress 200 as a base line? An integrated ATI Chipset that debuted last year? That is even crazy.
How about an NVidia PCI 5200 Graphics card made several years ago as the baseline, and Vista does Glass quite well on it even. Even generic notebooks baseline for Video anymore is ATI or Nvidia chipsets that include Pixel Shader 2.0 technology or basically hardware DirectX 9 support as others would call it.
I don't fully disagree with this person's article either, but really, is this
Make your own judgements on this, even as the article says, Vista seems to be better than XP, and who knows for sure how it will turn out...
not an OSX test (Score:2)
Re:Are Slashdot Editors embarrassed yet? (Score:2, Insightful)
I really hope a lot of people leave Slashdot for Digg because the only people that read Digg are complete and utter morons. The intelligent people have already realized that Digg is complete garbage and the idiots that are to stupid to understand that can flock to the idiocy that is Digg. It only makes the community here better b
Re:Are Slashdot Editors embarrassed yet? (Score:2, Informative)
The fact that this piece of flamebait trolling got modded up shows exactly the one way Digg is superior to /. - no idiot mods. On Digg, the moderation now works by voting so the registered readers as a whole mod, not just a select few.
Don't think I'm bitching because I don't have mod points; I used my last earlier today and I've lost count of how many times I've received mod points. I meta-mod almost every day too. Yes, someone who mods is saying how much the mod system sucks! But I see this kind of crap h
Re:Are Slashdot Editors embarrassed yet? (Score:3, Informative)
Recently, I *did* click through to something sufficiently enticing, and started reading. Woah.
They suddenly have nesting discussions (ok, only 2-level), comment rating, *and* filtering based on aggregate rating. As far as I can tell, they're only a few weeks away from the full-grown trolling ecology that is slashdot.
Don't t
Re:If it's not a conspiracy... (Score:4, Insightful)
Re:If it's not a conspiracy... (Score:5, Informative)
AFAIK, there are no voices giving out any other viewpoint(s).
You can read an in-depth review of the matter here:
http://www.petitiononline.com/mmfa2/petition.html [petitiononline.com]
The petition was created by the people at Media Matters
Re:If it's not a conspiracy... (Score:3, Informative)
00:00 AP Newscast
03:00 Sporting News Radio Sports
06:00 The Al Franken Show
Re:If it's not a conspiracy... (Score:2)
Looks like the noise over Rush made a difference
http://myafn.dodmedia.osd.mil/radio/afn/schedule.a sp [osd.mil]
If you want to check for yourself.
However, if you go back to the articles that started it all http://wonkette.com/politics/wonkette/our-boys-nee d-gossip-158687.php [wonkette.com] You'll see
I guess
Rush uses Akamai (Score:2)
That's correct. Rush's audio is streamed from akamai.com's servers which are blocked.
Re:If it's not a conspiracy... (Score:2)
Re:If it's not a conspiracy... (Score:2)
Don't ask. Just do it :)
Re:If it's not a conspiracy... (Score:2)
Re:Are Slashdot Editors embarrassed yet? (Score:5, Interesting)
It's not about left-wing or right-wing or centrist or any of that. It's about money and power just as it has always been. Play the follow-the-money game (and hone some research skills too, woohoo!) more often and you will come to see this.
Left, right today. God, Satan yesterday. You notice it's always two, and only two, diametrically opposed ideas that can be compromised but cannot be reconciled (with other ideas existing only in an extremely marginalized form that is unlikely to be implemented, such as libertarianism). Your basic divide-and-conquer strategy. The left-wing vs. right-wing is an idealistic clash that does a great job of distracting people from basic critical thinking skills and a willingness to stick to the facts as determined by evidence when making decisions. It's a distraction, and it's a deliberate and effective one.
I'll give an example. Generally a left-winger is for greater personal freedom and more economic restrictions (particularly income redistribution, but there are others). Generally a right-winger is for greater economic freedom (tax cuts and the like) but more restrictions on personal freedom. Well, guess what? Both require a rather large government to properly realize their stated goals. So you have everyone squabbling over which set of restrictions they prefer, meanwhile, the elected officials continue to enjoy an ever-increasing national budget and more and more laws to appease their campaign contributors (recent changes to copyright law, anyone?). No matter how you carry out the left vs. right debate, a minimal government will never be the result. As stated above, a very effective distraction. For the people who stand to gain from less real freedom, and this subset of the population includes the major media outlets, it has served its purpose well. You don't need a conspiracy of any sort either; all that is required is that those who desire power act in their own interests while no one does anything to check them because they're too concerned about who will win the next American Idol.
It has always amazed me how so many people would agree that throughout history, religion has been used to control people by keeping them ignorant and willing to obey, but the same folks who will agree with that find it absurd that media and propaganda and creature comforts and an overemphasis on work/business can be used the same way.
Re:Are Slashdot Editors embarrassed yet? (Score:2)
Re:What kind of sentence (Score:3, Informative)
Part 1: Taleyarkhan, who used to work at Oak Ridge National Laboratory, has, since working at Perdue, removed the equipment the co-workers were using to try and replicate the results
, (comma)
Part 2: claimed results for experimental runs were positive for fusion despite the co-workers never seeing the raw data
and (Proper use of a conjunction in a sentence containing a list of verb phrases)
Part 3: opposed the publication of results which contradicted his findings.
Each part of this s
Re:What kind of sentence (Score:2)
In this case it was me and not ScuttleMonkey who wrote the sentence. For once the editors are not to blame.
Re:What kind of sentence (Score:2)
He should have noticed you misspelled "Purdue". (Just joking, I'd be disappointed if my 8-year-old daughter's English skills were as poor as his.)
Re:What kind of sentence (Score:2)
Re:What kind of sentence (Score:2, Interesting)
I could go on at great length about the iniquity of PowerPointisation of the English language, but I won't. Suffice to say that we should not have to assume that our audience has the attention span of a flea.
Re:DesktopLinux? (Score:2)
Plus, Windows XP is already painfully slow to interact with already, I don't need it to be any worse.
Oh, also those nice lovely aero glass windows? It makes it REALLY hard to just at a glance spot which window is active, and which is not.
So, I don't care about reviews. At some point, I'll have to use
Re:DesktopLinux? (Score:4, Insightful)
But even earlier in the article he blasts windows for supporting peripherals that do not yet exist. DirectX10 graphic cards and CableCard support both get dismissed because you can't buy them yet (just as you can't buy Vista). Once again, how can Microsoft possibly fix this; by not providing support for this hardware?
Finally, now that Microsoft can't win by adding software or hardware support, Microsoft can't win by adding features. The guy has dug deep to find a little-advertised networking feature that lets you use ipsec for internal communications. He declares this to be bad. He fails to tell you that you are neither required, nor coerced to use this feature. He fails to mention that you will probably not even know it exists unless A) you run a corporate network and B) you dig deep into the OS to find it. My mind is completely numb trying to comprehend how MS is screwing the customer here. Once again, should they have just left the option out?
This guy hasn't merely set the bar too high for Vista, he's replaced the bar with a sign that says, "still too low." This is only worth reading as a reminder that people who support the right thing are more than capable of doing it in the wrong way.
TW
Re:DesktopLinux? (Score:2)
No conspiracy theory neccessary here... (Score:3, Informative)
The guy just cannot write.
Seriously, check out Linux Desktop [linuxdesktop.com] or Linux Watch [linux-watch.com] and check out other articles by this guy (his name is Steven J. Vaughan-Nichols). It's all the same story: flawed, simpleton logic; egregious typos (he must hate copy editors, because he's obviously never let one near one of his articles); sentences so poorly constructed that although you know you're r
Re:Vista will be expensive...? (Score:3, Insightful)
Re:Vista will be expensive...? YES (Score:2)
Re:smartfilter (Score:2, Informative)
Like someone else said above, the policies are applied differently across the services and down to the different levels. rushlimbaugh.com proabably isn't blocked because NO ONE F'N GOES THERE and no bandwidth is being wasted on it. If a flood of users went there and started eating up / wasting bandwidth, then it's be blocked for operation reasons because the site is not mission essential.
You know, just _maybe_ there is