Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:They can keep th em (Score 1) 191

You mean that a well maintained citroen 2cv or a fiat 500 pollute more than a suv because of their no-electronics tech? The measure is not pollutants per gallon of fuel, but pollutants per mile, after all. Someone should do the math, under real conditions (because there are lies, damned lies and spec sheets).

I have no electronics in my car (mechanical distributor, carburetors, and the car radio is disconnected). But I am not averse to it, as long as it is documented, and replaceable. This is not going to happen because the point of electronics in the car is control, not performance or pollution.

Comment Re:Speculation (Score 0, Flamebait) 475

Is it a fact that they said "use bitlocker instead, it's safe"?
If it is, your BS detector should be blaring at full volume.

What you call speculation is only the most obvious explanation. It might not be the correct one, and the bloggers you refer to could all be al qaeda operatives on russian mafia hardware, but it still is the most obvious explanation, with a string of documented precedents. So you should come up with some other interpretation, or your doubt is not very productive, IMHO.

Comment Re:what's wrong with public transportation? (Score 1) 190

No, you have to stay in your bubble and swear at those human drivers and check yahoo email with android phone to get ahead in your insane work schedule designed to keep other people unemployed so they can lower your salary. With public transport you might have conversations with real people and those usually lead to some truth. Stay in your bubble.

Comment At a different level (Score 1) 125

This seems to me the wrong level for software diversity, too low. A bug in the source will be executed in all variants (think sql injection), while an exploit that depends on particular bytes in particular locations can already be made difficult by ASLR.

What about having higher level protocols that the software of a given category must adhere to, and various programs that treat data according to those protocols? You know, like that internet thing before the prevalence of web2.0 megasites, or like posix. Then every piece of malware cannot do universal damage and every botnet has to deal with a different host configuration.

Comment Re:Where does 7 feet of water come from? (Score 1) 323

If you think about it a seven-foot rise in water is not very reasonable to predict

This reminds me of an usenet post circa 1996, which talked about chernobyl and the Bible.

"And the third angel sounded, and there fell a great star from heaven, burning as it were a lamp, and it fell upon the third part of the rivers, and upon the fountains of waters; And the name of the star is called Wormwood: and the third part of the waters became wormwood; and many men died of the waters, because they were made bitter."

In the post it was remarked that Chernobyl is linked to Wormwood, and that a star is essentally a nuclear reactor, and it thought the bible might predict the collapse of the sarcophagus built around reactor 4 in the river, *or a nuclear accident involving water*. It exactly describes Fukushima if the catastrophists are right.

Now, before you steer this into a religious debate consider that the abilities of making predictions are obvious consequence of an hypothetical god, but are not proof of it. In fact IIRC in the Bible, possibly to prove that God > Destiny, God's predictions are not fulfilled (except the one in Genesis: Adam indeed dies because with the knowledge of good and evil he made himself responsible, able to sin instead of driven by instinct).

Slashdot Top Deals

I think there's a world market for about five computers. -- attr. Thomas J. Watson (Chairman of the Board, IBM), 1943

Working...