Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment New Licensing Doesn't Work for Me (Score 2) 74

Somewhat related, but I had been using Dropbox for years and had been very happy with it. At first I used it just to backup pictures I took, but over time I was using it more and more. Recently I rebuilt a PC and installed dropbox and it told me I couldn't link it because the new terms were free = only three devices. Sure, I understand, but I am not going to pay for this. I had already been running my own, er, owncloud server and have spent the past day cutting over everything to it. Just a few hours ago I disabled the camera upload on my phone for dropbox and enabled it for owncloud. Steve Jobs described dropbox as a feature, not an app. I loved dropbox back when it was a feature, but I will not pay for it as an app. I'll keep my own files on my own server going forward. RIP dropbox.

Comment Re:Easy fix (Score 2) 490

Firstly, anything that starts off with 'Use gpedit' isn't simple. Secondly, if you cannot provide more specific advice than "turn off all cloud content settings," it's not simple. Lastly, gpedit does not come with home edition, which is what most users have.

  C:\WINDOWS\system32>gpedit.msc
  'gpedit.msc' is not recognized as an internal or external command,
  operable program or batch file.

Security

PUBG Ransomware Decrypts Your Files If You Play PlayerUnknown's Battlegrounds (bleepingcomputer.com) 51

An anonymous reader quotes Bleeping Computer: In what could only be a joke, a new ransomware has been discovered called "PUBG Ransomware" that will decrypt your files if you play the game called PlayerUnknown's Battlegrounds... When the PUBG Ransomware is launched it will encrypt a user's files and folders on the user's desktop and append the .PUBG extension to them. When it has finished encrypting the files, it will display a screen giving you two methods that you can use to decrypt the encrypted files.
Users can unlock it either by entering a secret unlock code displayed on the screen -- or by playing PlayerUnknown's Battlegrounds. The ransomware checks to see if you played PlayerUnknown's Battlegrounds by monitoring the running processes for one named "TslGame"... Once a user plays the game and the process is detected, the ransomware will automatically decrypt the victim's files. This ransomware is not too advanced as it only looks for the process name and does not check for other information to confirm that the game is actually being played. That means you can simply run any executable called TslGame.exe and it will decrypt the files.

Comment Re:Gonna need some hollywood magic (Score 1) 39

Agreed, I think if anyone is expecting the science of "The Martian" meets the made-for-tv drama of "Game of Thrones", they'll be disappointed. The books certainly had some very interesting concepts and, in the case of Arkady, interesting characters and motivation. However, as OP hinted at, there were dozens or hundreds of pages of boring to go in between the fun parts.
Data Storage

Encrypted But Searchable Online Storage? 266

An anonymous reader asks "Is there a solution for online storage of encrypted data providing encrypted search and similar functions over the encrypted data? Is there an API/software/solution or even some online storage company providing this? I don't like Google understanding all my unencrypted data, but I like that Google can search them when they are unencrypted. So I would like to have both: the online storage provider does not understand my data, but he can still help me with searching in them, and doing other useful stuff. I mean: I send to the remote server encrypted data and later an encrypted query (the server cannot decipher them), and the server sends me back a chunk of my encrypted data stored there — the result of my encrypted query. Or I ask for the directory structure of my encrypted data (somehow stored in my data too — like in a tar archive), and the server sends it back, without knowing that this encrypted chunk is the directory structure. I googled for this and found some papers, however no software and no online service providing this yet." Can anyone point to an available implementation?
The Courts

RIAA To Stop Prosecuting Individual File Sharers 619

debatem1 writes "According to the Wall Street Journal, the RIAA has decided to abandon its current tactic of suing individuals for sharing copyrighted music. Ongoing lawsuits will be pursued to completion, but no new ones will be filed. The RIAA is going to try working with the ISPs to limit file-sharing services and cut off repeated users. This very surprising development apparently comes as a result of public distaste for the campaign." An RIAA spokesman is quoted as saying that the litigation campaign has been "successful in raising the public's awareness that file-sharing is illegal."

Recession Pushes IT To Find New Value In Old Gear 206

buzzardsbay writes "Trying to put a bright spin on a gloomy subject, the folks at eWEEK unearth an emerging trend: There's a booming cottage industry of dealers in refurbished computer and networking gear serving folks on the hunt for 'slightly used' and 'new to you' equipment. The dealers selling the stuff tell eWEEK the equipment is practically new, most of it less than a year old, and that the prices for things like servers and routers are lower than they have been since the post dot-com / Sept. 11 days in 2001. Used gear isn't for everybody, obviously. The story points out that while many of these used IT dealers offer configuration services, they don't do installs, and most are not authorized resellers. They do, however, offer decent warranties, so if you can do some of the work yourself, you'll probably be OK."

Comment Sound quality has an effect, yes/no? (Score 5, Interesting) 418

I wonder if the quality of speech coming from the cell phone has anything to do with the amount of processing required. When people can't hear things very well, they start piecing together the dropped parts of the conversation by using some sort of contextual implication. You know what the subject is, so you have a good chance of surmising the dropped words due to context. I would think something similar could be possible for talk radio as well. I think if you listen to one talk show host consistently enough, you develop a better ability to understand what is being said, but a new talk show host can take some getting used to. Just some thoughts.

Comment Re:Amazing... (Score 1) 259

Makes sense. Does it also make sense to police what your customers put (or don't put) on the network? Not everybody plays nice. Call centers send blank or no idenitfying info so their targets can't find out who they are. What if they started sending invalid numbers to make their targets more likely to answer?

Of course, if the provider decides to start preventing the bad guys are sending crappy data, the bad guys will find a new provider. That's why it's intentional, because it helps the bottom line :)

We see the same thing in the IP world with spammers.

Slashdot Top Deals

But it does move! -- Galileo Galilei

Working...