Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Sass/less (Score 1) 60

And we'll continue to have it until we know this is actually implemented correctly in most web browsers.

But it's possible that people would move over to this once that happens, to reduce bandwidth

Of course, looking source HTML & CSS these days, most people stopped caring a long time ago, and just rely on the server to compress the file in transit, like apache's mod_deflate.

Comment Re:Does it even matter anymore? (Score 1) 26

My former boss gave me an even easier technique:

All of the answers for a given company are the same. So when I'd call up the company's "Enterprise Service Desk", all of the security answers were "blue". I didn't even have to wait for them to ask the question.

If they had a "what's your favorite color" question, I would've chosen a non-color answer, so that the answers make no sense given what the questions are.

Then you just need to match up the company to your (single) answers, rather than have to keep track of lots of answers for each company

Comment Macs used to have some great games. (Score 1) 41

Marathon ... made by Bungie, which was bought by Microsoft so they could have an exclusive for the Xbox (Halo). The first and third (Marathon Infinity) were Mac exclusives for many years ... Marathon 2 was released on Windows, too.

Dark Castle ... made by Silicon Beach Software (makers of SuperPaint and SuperCard), which was bought by Aldus. It was a side-scrolling puzzle game (mostly timing related); you moved with the keyboard, while you aimed with your mouse. It's believed to be responsible for WASD movement. There was a sequel made for MacOSX (Return to Dark Castle)

OrbQuest ... an adventure game in the style of zelda, but with randomization in the replay. (I don't know if it would quite qualify as rogue-like).

And there were some that were just strange ... like Citadel. It had a strange combat system where you looked at the room from above, and your characters had rings around them to show their attack distance, and you dragged them around to attack the monsters. Character creation was strange, too -- you picked the occupation of the parents, and then what to do as you grew up, and that affected your stats by the time that you were adventuring age.

And there were games that started on the Mac, and then got ported to Windows, such as Myst.

And there was MacSoft, a copy that specialized in porting games to the Mac. There used to be lots of games that were released shortly after the Windows versions (Warcraft 2, Civilization, SimCity, etc.)

Maybe I'm imagining it, but it seemed me that it was around the time of MacOS X that companies stopped developing many games for the Mac ... although that was also about the time when the XBox and PS2 were out, so maybe they took the attention.

Comment webserver logs? (Score 4, Informative) 139

If they got his IP address from the webserver logs, they should have:

1. what the username was that they authenticated as
2. What security realm they authenticated to
3. What the referring document was[1]

The first two are part of your standard 'common' weblog. It's possible to encode the credentials into the link ( protocol://user:password@server/filepath ), which unfortunately won't show up in the logs, as the client will separate it.

But if the system had asked them to authenticate, they should have log entry asking for the file from that same IP address, with a 401 status (authentication required) just before the successful retrieval.

If they tried to use some other sort of homebrew auth, I suspect that it's not as secure as they think, and it didn't bother logging anything useful.

[1] The HTTP_REFERER *might* not be there. The basic 'common' log format doesn't include it, but it's also something that the client doesn't have to send -- and if he was browsing in some sort of 'private' mode, many clients won't send the referrer unless it's within the same domain.

Comment Re:Its a clone of party lines (Score 1) 25

Are there hot women waiting for me to call?

That's what they told us on commercials in the middle of the night ... and only $.99/minute!

I haven't really looked into Clubhouse, although a friend offered me an invite a while back. So I'm not sure if it's an internet party line / public Discord / voice IRC / internet CB radio, or something even worse .... like voice chat on Xbox with a bunch of 12 year olds who haven't learned any social skills but at scale.

I do hope they stick with the invite system though. I would love to see a social network do mass bans when they can go back to the problem user that let them all on, and just prune from there.

Comment Section 230 (Score 1) 108

The thing is, Section 230 was intended for the old fashioned ISPs. You didn't have GeoCities trying to make their website 'sticky' and promote 'engagement' by trying to direct people to "AD0LF'5 SUP3R K3WL NA21 PAG3" after they visited some other random site they were hosting.

Section 230 protects against "service providers" being considered "publishers" or "speakers". But it specifically defined in the 230(b)(3) that one of the underlying policies was: "to encourage the development of technologies which maximize user control over what information is received by individuals, families, and schools who use the Internet and other interactive computer services;"

YouTube automatically pushes me to the next video that I hadn't actually asked for. Facebook inserts crap into your newsfeed from people you aren't following (or so I've been told; I haven't used it in ~15 years).

Does this qualify as "publishing" or is it something else? I'd say it's promotion of the content. If an individual were to be promoting some content, then the company is just publishing that as content ... but if the company has algorithms to select things automatically? Even if they've hired people to do the promotion manually ... is that still covered by Section 230?

I don't think it is. Because that link to push you to some other 'stickier' page is itself information that is being generated by the company, and therefore it's not from "another information service provider".

But I don't know who'd have standing to sue. Maybe someone who got sucked into Q and came back out? Someone whose kid got sucked into some cult? Someone who was injured by a mob that was indoctrinated by Facebook? Maybe States Attorneys could claim there was some sort of a general harm. I'm not a lawyer, so I don't know exactly how States Attorneys work.

Lots of internet companies can still exist, but this attempt to try to keep people inside their ecosystem can't just claim unlimited immunity for their actions.

And hopefully, it would also push some responsibility onto ad networks, too.

Comment Re:Ok, but what about all the other consumer ICE? (Score 1) 713

There are some things that make sense as electric (string trimmers and other things with lower power two stroke engines, if just for the noise alone), but I see the big sticking point being long-haul trucking. Maybe we can go to hydrogen or CNG, but it's never going to be fully electric even if we have clear skies and we get a breakthrough for higher efficiency solar panel.

I'll agree with most of your other cases -- farming can't wait for long refueling/recharging times, and chainsaws have higher power demands. (electric chain saws are great for pruning jobs, but they're not so great for larger models and/or when you're trying to clearing downed trees after a hurricane that's cut out power to the area).

Some people can get by with electric mowers, and there are the newer robotic ones that can cut a portion of the yard each time so you don't need it to be able to hold a charge enough to clear a half acre in one pass ... but that doesn't work for lawn service companies who are running their mowers for multiple hours each day. (and yes, their string trimmers, I know)

Some things might be able to convert ... but it's going to be slow. Gas stations will still continue to exist. They might reduce the number of pumps and become charging places and/or battery swap stations so long as they can get the necessary power, and it's possible that some will close. But that has a cost associated with it, too ... digging up the tanks so it doesn't become an environmental hazard and such.

And we also still have the question about how do we fund our roads in an all EV world. It's been bad enough with fixed cents-per-gallon taxes instead of a percentage, so as cars become more fuel efficient, we have less money for transportation infrastructure from the gas tax. Do we go with a per-vehicle surcharge, toll roads, or some other usage based tax such as on miles driven? (and then how to enforce it ... especially for rental fleet vehicles that might end up out of state)

Comment Re:Nobody wants to stick their neck out (Score 3, Insightful) 340

"the likelihood of death is greater without the vaccine than it is with the vaccine"

There was some reporting last night on PBS (PBS Newshour?). They interviewed someone who said that the incidence of blood clots should actually be *higher* than what was reported due to the number of people who had been vaccinated so far.

And if there had only been 35 incidents, for the number of people vaccinated so far that it actually meant that the incidence of blood clots was reduced by taking the vaccine. I think she said/suggested she would've expected 10x that number.

But she also said that not all data is public, so maybe there's something else that the countries were making their decisions on that she wasn't privy to.

I don't know how she normalized the data (you wouldn't want to use the annual rate if all of the clotting was within a week of the shot), nor if they compared it to the rate at which people who got COVID experienced blood clots, as there were reports that it was one of the complications.

Comment Re:Why does anyone care? (Score 1) 118

Camgirls, live streamers, and the like

The only reason that I see that a larger aperture would be important is if it means that you don't need a good lighting rig, as I hate it when friends FaceTime me when I'm getting ready to go to sleep, and I have to turn on some lights so they can actually see me. (a friend 3 timezones away does it so I can distract her son while she cooks dinner)

But overall, my take on the article was basically that "webcams" went the same ways as modems -- they stripped down the hardware to make 'em cheaper to produce, and pushed all of the work to software.

But given his methodology, he left out another possibility -- you can get older model GoPros for under $200, and run it in webcam mode. (I've looked into it, but haven't done it, so I'd be interested to know how they compare)

Comment Based on profile photos, not "only" faces (Score 1) 275

The study was done with what images people selected for their *profile photos*, not their veryday faces.

So they're likely posed pictures, possibly with some coaching by a photographer, and/or lighting to adjust characteristics.

And then people selected for the personality that they want to present -- maybe it's cheerful. Maybe aggressive. Did they style their hair or beard in some elaborate way that they don't do every day?

I think it's a stretch to say it's "based only on their face" unless at the very least you're using candid photos that the person being analyzed hasn't filtered

Comment Re:A scary thought (Score 1) 333

I suspect this is part of the reason why there's the push for impeachment. The constitution states that the president "shall have Power to Grant Reprieves and Pardons for Offences against the United States, except in Cases of Impeachment."

It's never come up in court, but a good lawyer could try to argue that it's related to the impeachment, and so can't be undone. (other people are going to argue that he simply can't undo the impeachment itself)

But they'd have start the impeachment process first, I would think, as it would be more difficult to argue that impeachment allows them to undo a pardon, too.

Comment Uses (Score 1) 225

I can think of a few companies that had either stickers that you placed on the keys until you had memorized their application shortcuts, where you swapped out the keys, or even bought custom keyboards. And that might be useful for dedicated Quark or Avid rigs, but what do you do when you want to run multiple complex programs from the same machine? Keep multiple keyboards around?

For decades, Apple also had the "Key Caps" program that would show you what was going to be printed based on what the font was and the modifier keys used. So you could find that greek character, dingbat, etc. It's now called 'Keyboard Viewer', and you can access it via the Keyboard Preferences menu which shows up if you've enabled more than one keyboard layout in MacOS.

This is useful for people who have to type strange characters (mathematical symbols, dingbats, etc.), who use languages that don't fit on a standard keyboard (chinese, japanese, etc.), those who switch between multiple keyboard layouts (for those who work in multiple languages), or even just those who want to try out dvorak or move the damned escape key to somewhere else.

For Apple, it would mean that they don't have to stock as many parts or make as many models -- they don't need to produce a specific Norwegian, German, or Dutch keyboard if it uses the same number of keys. And people from foreign countries could buy the American models of laptops.

Comment Intrusion Detection Systems (Score 1) 117

It used to be that there were multiple layers. You had intrusion detection systems at the firewalls, so that the security office could watch for abnormal traffic flows.

But then someone at the GSA thought it was a good idea to encrypt everything, and so we had to move away from HTTP, FTP, and other protocols where we could easily monitor the traffic.

HTTPS-Only might not've been so bad if they had used proxies to decrypt the traffic, then inspected the data between the proxy and actual endpoint. But that basically broke the IDSes, as you just can't monitor anything any more.

(I worked at NASA from 2004-2017, part of that time as a sysadmin, and had a whole lot of 'incidents' that got investigated. Some were actual real problems (someone tunneled in through hacked systems at a contractor ... twice.), but we also spent a lot of time looking into things like when the security auditor insisted that we had a machine that was randomly talking to the outside world because he had a filter that stripped out that it talked to us first)

And of course, the IDS is COTS, so there's the question of if you can really trust it. Someone could hack that so it ignores their other traffic.

Comment Truth in Lending laws (Score 1) 94

Although more people are probably familiar with nutrition labels, as they've been around for decades, there are other regulations that are even more similar to what's being proposed.

Such as the documents that banks are required to give prospective borrowers for mortgages under the Truth in Lending Act: https://www.consumerfinance.go...

Slashdot Top Deals

Two can Live as Cheaply as One for Half as Long. -- Howard Kandel

Working...