Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Protect users from themselves? (Score 1) 455

I don't think Mac users are smug. I think they state a known fact. There are fewer exploits to Macs. That doesn't mean there are fewer vulnerabilities. Yes OS X and Windows share many of the same vulnerabilities. Yes Windows has implemented some great security features. But all of that has done little to stem the large number of exploits to Windows because it has a much larger market share.

Someone (I think it was Charlie Miller) put it best (paraphrased): You can stand in a war zone or you can be thousand of miles away. Running Windows is standing in a war zone. Running a Mac is being thousand of miles away.

You seem to be unhappy about this asymmetry. Even despite Microsoft doing all that work it remains. The real interesting question will be if Apple can respond to being a popular target better than Microsoft?

Comment Re:Agreed, it's a matter of economics (Score 1) 455

OS X has used sudo since the beginning. It's long been suggested practice not to setup your day to day user with Admin rights. There's no real problem there because anything you need admin rights to do prompts and you can put in the admin username/password, basically GUI sudo.

Example of the long standing suggestion to not use accounts with admin access dating back to 2006. I could probably find older ones if I felt like going past the first result on google:

http://www.macgeekery.com/tips/security/basic_mac_os_x_security

Idle

Submission + - Best. Geek. Wedding. Invitation. Ever. (createdigitalmusic.com)

kfogel writes: "Karen Sandler (a lawyer at the Software Freedom Law Center) and Mike Tarantino (a professional musician) are getting married in May. They've sent out the coolest wedding invitation ever: a beautifully packaged flexidisc record where the invitation itself is the record player. That's right: It's paper! And it plays a record! The song itself was written by Mike, is performed by Karen and Mike together, and FTW is released under a Creative Commons Attribution-ShareAlike license. The person who designed the invitations — a friend of the couple's — has blogged about it. It's also made Make Magazine, Mashable, and Geek.com."

Submission + - France Outlaws Hashed Passwords (bbc.co.uk) 3

An anonymous reader writes: Storing passwords as hashes instead of plain text is now illegal in France, according to a draconian new data retention law. According to the BBC, "[t]he law obliges a range of e-commerce sites, video and music services and webmail providers to keep a host of data on customers. This includes users' full names, postal addresses, telephone numbers and passwords. The data must be handed over to the authorities if demanded." If the law survives a pending legal challenge by Google, Ebay and others, it may well keep some major services out of the country entirely.

Comment Re:Just use the hardware you have (Score 1) 898

There's a certain amount of learning with every keyboard. Pretty much every keyboard is slightly different. My statement could have been just as true with "I think if you actually learned how to use your Thinkpad's keyboard you'd like it better." But sure trot out the fanboy argument. Pretty sure if you look into my posting history it's clear that I'm far from a fanboy of anything.

Comment Re:Just use the hardware you have (Score 1) 898

I can guess why they didn't put those keys in. Possibly so that people don't hit them on accident. I know on some laptops I've had with them I've hit them on accident from time to time.

I'm primarily a vim user so I don't miss the insert key or delete, though I have used Fn+delete to get forward delete a handful of times.

The eject button works for me before the OS boots. It takes a bit before it's active but then it usually takes a bit before a hardware eject button works unless it's purely mechanical as a lot of laptop eject keys are.

Not sure about how the volume keys work. I haven't tried it and don't feel like rebooting right now to muck with it.

Comment Re:Just use the hardware you have (Score 3, Informative) 898

The newer Mac laptops replaced that second Enter with another alt key.
Fn + up arrow = page up, Fn + down arrow = page down
The swapping of the meta keys makes sense because the primary meta key you use is Command on the Mac.
Don't really see what's wrong with more meta keys on the opposite side of the keyboard. My think pad has more than one Ctrl and Alt. Considering that Command is the Mac equivalent of Ctrl it's exactly equivalent. Except my thinkpad has that silly menu key.
And virtually every PC has a hard eject button on the drive. So what?
Yup Delete is Backspace and if you want forward delete hold Fn+Delete.

I think if you actually bothered to learn how to use your Mac laptops keyboard you'd like it a lot better.

Comment Re:TFA? (Score 1) 129

What long history of advertising on Slashdot? The guy opened the account yesterday as far as I can tell. Apparently I missed the memo, people used to measure their egos with uptimes, no it seems to be the smaller your UID is the bigger your ego.

Comment Re:I'd be open to it, but good luck with everyone (Score 3, Informative) 430

The ash from coal plants is radioactive. Coal has low concentrations of radioactive elements in it. When you burn the coal the radioactive elements are among the ash and are at a higher concentration of the ash than they are of the source coal.

http://www.epa.gov/rpdweb00/tenorm/coalandcoalash.html
http://pubs.usgs.gov/fs/1997/fs163-97/FS-163-97.html

A lot of the commentary about radioactivity and coal plants come from this Scientific American article:
http://www.scientificamerican.com/article.cfm?id=coal-ash-is-more-radioactive-than-nuclear-waste

Many people read the headline of that article and didn't really bother to read the article. The argument that Scientific American makes is that a coal plant puts more radiation into the surrounding environment than a nuclear plant. The nuclear waste is still obviously more radioactive than the ash. However, the nuclear plant carefully controls their waste and materials.

In both cases the radiation released is low and not a health risk.

Comment Re:I run IPv6 at Home (Score 5, Informative) 174

I don't know about the person you're responding too but I actually routinely get better latency via IPv6 tunneled via Hurricane Electric than IPv4 through my own ISP.

Fact of the matter is that IPv6 should be slightly faster since the routers don't have to recalculate a CRC for every hop. HE has multiple tunnel broker servers around the world. So you can pick one close to your network and the only CRC latency you'll eat will be the hops between you and the tunnel broker site.

Example:

--- leguin.freenode.net ping6 statistics ---
10 packets transmitted, 10 packets received, 0.0% packet loss
round-trip min/avg/max/std-dev = 205.932/215.147/262.156/16.624 ms

--- leguin.freenode.net ping statistics ---
10 packets transmitted, 10 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 280.228/329.908/374.605/31.503 ms

And I just picked a random IPv6 host that I knew I could target the same machine via either network. I didn't dig around to find a machine that gave me better latency via IPv6 than IPv4.

Comment Re:And it's fucking irritating (Score 0) 321

Your analogy is nonsense. I deplore Apple's policies with respect to the iOS machines. So I choose not to use them. However, I do like my Macs. Apple has done absolutely nothing to stop me from using my Android devices. There are no bouncers trying to stop you from using your legitimate purchases from other vendors.

Slashdot Top Deals

When it is incorrect, it is, at least *authoritatively* incorrect. -- Hitchiker's Guide To The Galaxy

Working...