Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Really? (Score 1) 485

"Many users -- especially on somewhat under-powered systems -- may find Win10 to be a painfully slow experience compared with Win7, irrespective of MS' claims." Big citation needed. There's no evidence that Windows 10 performs worse on low power systems and there's significant evidence that it performs better.

Win8 certainly fits that slow description for many things, most noticably file copying (how did they fuck up so badly?), so unless that has been fixed it makes sense. We need to see benchmarks either way and there seems to be a distinct lack of them from those claiming a faster speed as well.

Comment Ha! (Score 1) 112

From their other link:

With dedicated customer support available by phone or online, and replacements and exchanges whenever Pepper is not working properly, corporate customers will be able to use Pepper with peace of mind at their businesses.

Eat your own dog food.

Staff your support division with Pepper robots. PROVE that they work.

Comment Re:I wonder (Score 1) 207

As an aside there was a direct clone of the Letterman thing in Australia. The presenter (Steve Vizard) would even wander around with an empty coffee cup at the start of the show to copy what Letterman did. The presenter was one of the owners of the network that thought he was funny and decided he would play at being Letterman, but somehow he failed to copy the entertaining bits and made sure that he was not upstaged by any guests with actual talent by frequently interupting them.
I have no idea how he got away with it for four years, but he was a lawyer with a LOT of political connections as well as being a part owner of the network he was broadcasting on.

Comment Re:Industrial network (Score 2) 76

IF the people in charge are asking for it, find and suggest a solution that can do it safely.

I'm with you so far.

If they are not willing to pay for your solution, find another, albeit less safe solution and present it with a list of assumed risks. Rinse and repeat until you have a solution they are willing to pay for with risks they are accepting, then do that.

In my experience, any "solution" that you present will be understood to do everything that they wanted.

Even if you say that they cannot have X at $Y. They will give you $Y and then demand X.

When you cannot do so, a contractor will be brought in to set up a flawed implementation that will reduce your security BUT will provide X at a price point that you said could not be done.

Which is why we see this story pop up over and over and over again.

Comment Re:Urg. (Score 1) 44

Worth adding is that the answers to someone's "security" questions often are easily obtained with just a small bit of social engineering.

Yep. Even easier if the information ("correct" answers) are available via Google.

But also, since you're already using unique passwords ... and the crackers managed to get your password ... how did they do that and would that have also yielded your "security" answers.

Their thinking seems to be:

1. So, one username / password isn't enough.

2. A second password should be enough, but it will use the same username as in #1.

3. And that second password should be SUGGESTED to be based upon something that can be researched / socially engineered / tricked out of the person.

4. And entered using the same channel as #1.

Okay, if you cannot get two factor authentication then at least use a different email address for each bank AND ONLY FOR THAT BANK. Email addresses are free. And always use completely unique passwords. Not bankname1 and bankname2.

The same for the "security" questions. Always completely unique.

If you have to write them down, do so. Just keep the paper in a secure location. It's far less likely that someone will break into your house to look for passwords than it is that someone will crack your computer.

Comment Urg. (Score 4, Informative) 44

Robin Miller: One thing that I think my wife and I are doing right: we don't have a bank anymore, we have a credit union, a local credit union and they do use secondary authorization on everything, you have to not just know the account number and the password, but you also need to know the answers to fairly obscure questions about our past, what year teacher was your favorite in what grade, things like that. Does that help?

NO!!! It does NOT!!!

1. It does not because that information can be collected at other sites controlled by crackers. So unless you enter incorrect information (which is, in effect just another password) then it is useless.

2. It is still on your computer. So if your computer is cracked then the crackers get your username / password / favourite-dog-food / whatever.

3. Find a bank / credit union that uses real two factor authentication.

Comment Mod parent up. (Score 2, Interesting) 608

Read carefully and you'll notice the government said he'd even have to accept the consequences of speaking out and engaging in constructive protest: they decree you can dissent against their rule, and that's well and good, as long as they can punish you for your dissent--which is precisely the situation in North Korea, where you may speak out against Kim Jong-Un, and, importantly, accept the consequences of speaking out against him.

Exactly.

If the end result of civil disobedience is the exact same in the USofA as in North Korea ... then what is the difference?

The politicians demanding martyrdom would be just as comfortable working for North Korea's government as they are working for the USofA's government.

And THAT is a very big problem.

Slashdot Top Deals

To program is to be.

Working...