Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Bullshit (Score 1) 843

The article is more than a little disingenuous. A more appropriate title would have been "The F35 multirole strike fighter can't dogfight against one of the greatest air superiority dog fighting planes every designed".

The F22 is the competition for the F16. The F35 is the competition for the F18 Superhornet and the A10.

No shit the F35 can't compete against the F16. It was never designed to.

Comment iOS users feel it (Score 1, Insightful) 311

I currently have a web radio transceiver front panel application that works on Linux, Windows, MacOS, Android, Amazon Kindle Fire, under Chrome, Firefox, or Opera. No porting, no software installation. See blog.algoram.com for details of what I'm writing.

The one unsupported popular platform? iOS, because Safari doesn't have the function used to acquire the microphone in the web audio API (and perhaps doesn't have other parts of that API), and Apple insists on handicapping other browsers by forcing them to use Apple's rendering engine.

I don't have any answer other than "don't buy iOS until they fix it".

Comment Re:Just run your own (Score 1) 147

Whether there's someone sitting on your line and grabbing your traffic or tampering with it is completely irrelevant because that problem exists in any case. By running your own resolver, you don't publish your queries directly to a third party on top of that and that's a good thing.

Comment That's what you get... (Score 1) 65

That's what you get when offering VPN access must include proper client configs because users are clueless and want to be "secure" by hitting a button.

I guarantee you that I could take the credentials of each and every one of these VPN offers, put them into my router and tunnel all my clients properly(!) without any leaks.

It's not the VPN that is flawed, it's the CLIENT SETUP. For people with a clue, that's a distinction.

Comment Bad for Business (Score 1) 33

On Kaspersky:

I have no idea if this was because of a corporate policy about it or what, but I found it singularly amazing that these experts would have so little interest in the [bad] actors who were so clearly operating under their noses.

Put the bad actors out of business, and the threat disappears. No threat, no need for their software. Perhaps they were not openly collusive, but it isn't so difficult to imagine that they look the other way at the hand that indirectly feeds them.

Comment Re:What was the command? (Score 2) 154

Indeed, you definitely do NOT want hundreds-to-thousands of servers doing an update all at the same time, or, worse, rebooting all at the same time. The first has the potential to saturate your network and bring the entire setup to its knees, and the second will blow your rack supplies. I speak from experience on the latter, having been the one who identified the issue with our weekly DB scrubbing procedure once the company I was working for grew to more than a half dozen servers.

You want to stagger things by a few 10s of seconds per server on each rack to avoid power supply issues.

Slashdot Top Deals

You must realize that the computer has it in for you. The irrefutable proof of this is that the computer always does what you tell it to do.

Working...