Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:Internet activation (Score 1) 547

I have an installer, I have the game files

The installer requires a connection to a server that Activision Blizzard can shut down at any time.

Not really. You can install and play SCII without any internet connection at all. You simply lose the ability to gain 'achievements' and you can't play multiplayer (obviously). The solo campaign is completely playable off-line. IMHO, the achievements are a multi-player feature anyway. Why would I care about them if not to brag about them? ;) Blizz might be tightening the reins a bit more than I'd like, but they are FAR from the worst offender.

Comment Re:Raiders of the Lost Ark (Score 3, Interesting) 455

Time, Distance, and Size are a bit wonky in Star Wars, but if you'll recall, Han does say "It's a bit far, but I think we can make it."
And the Falcon is a Cargo Ship, chances are they had a few supplies on board, as far as food and fuel.

[geek-version]In the West End Games version of the Star Wars RPG, YT-1300s have storage for 2 months 'consumables' (I always assume fuel and food, etc) standard, in addition to the Cargo Space. [/geek version] (I don't have the distance charts memorized, I'm not quite 'that' geeky.)

So, in theory, the Falcon could have been on the way to Bespin for the better part of 8 weeks, which you'd think would still not be enough to get trained as a Jedi (considering they start them out as toddlers), but certainly a lot better than 2 days.
Security

Submission + - Malware Self-Defense Technologies Evolution (net-security.org)

An anonymous reader writes: This article explores how malware has developed self-defense techniques and how these techniques have evolved as it has become more difficult for viruses to survive. It also provides an overview of the current situation. In order to avoid confusion about what is considered a self-defense technology and what is not, it examines only the most popular and obvious means of malware self-defense. First and foremost this includes various means of modifying and packing code, in order to conceal the presence of malicious code in the system and to disrupt the functionality of antivirus solutions.
Security

Submission + - Recognizing Your Own Handwriting As A Password

Gary writes: "A new online authentication system called Dynahand could make logging in to websites a little easier. With Dynahand, users simply identify their own handwriting, instead of entering a cryptic password or buying a biometric device to scan their fingerprints. The user's handwriting samples contain only digits, since numerals are harder for an outside party to recognize than letters are. The digits displayed are random, so the handwriting is the only clue to the correct answer."
Microsoft

Submission + - Microsoft Doesn't Care About Destroying Linux (madpenguin.org)

techie writes: A latest column on MadPenguin.org suggests that Microsoft may not be really interested in killing Linux for mainstream users. It's after something else, and it's getting its way already. Read on to find out what it is. The author states, "Love it or hate it, Microsoft's IP attacks will continue, Linux user numbers will continue to grow and broad spectrum adoption throughout the rest of the world will grow and flourish. Microsoft's not interested in destroying Linux in the slightest. Why would they? it's been a fantastic vehicle for them to land a firmer grip on the corporations throughout the US.

Slashdot Top Deals

All the simple programs have been written.

Working...