Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:I doubt that very f**ing much. (Score 3, Insightful) 307

Since large communities and cities are not possible without agriculture, I highly doubt that agriculture sprang up after communities and cities.

I think the OP was trying to argue that the growth of cities and monuments drove the development of agriculture, rather than simply being a nifty aftereffect.

Comment Re:So, what have they found? (Score 1, Interesting) 174

If China isn't capitalistic, no place on earth is. Money is everything in China, you can bribe and do almost anything things with money.

I don't think that fits any reasonable definition of capitalism, unless there's actually a market in the amputation of other people's arms and legs. Capitalism is an economic system. That's just corruption.

Security

Submission + - UK Claims Link Between Child Porn and Terrorism (timesonline.co.uk) 3

Brian Ribbon writes: "The Times reports claims made by government officials and security services, regarding an alleged correlation between the use of indecent images and terrorist activity. According to the article, "secret coded messages are being embedded into child pornographic images, and paedophile websites are being exploited as a secure way of passing information between terrorists" and "it is not clear whether the terrorists were more interested in the material for personal gratification or were drawn to child porn networks as a secure means of sending messages." The correlation is likely to be false; under UK law, nude photographs of all minors — including those who are over the age of consent — are illegal, so it's not surprising that many people (including terrorists) are found to have illegal material when their computers are searched. In reality, this story is probably just a poor attempt to justify the government's proposed big brother database."
Businesses

Submission + - CompUSA to Close All Stores 1

An anonymous reader writes: Mexican telephone and retail magnate Carlos Slim, in a rare defeat, will exit the U.S. consumer electronics market, shutting the last 100 CompUSA Inc. stores after sinking about $2 billion into the business. Gordon Brothers Group, a Boston-based retail store liquidator, will oversee a piecemeal sale of the Dallas-based business, the company said in a statement. Financial terms were not disclosed. Stores will remain open through year-end under the supervision of Gordon Brothers, which will also negotiate the sale of real estate and other assets. Two law firms were hired to represent creditors, CompUSA said.
Wireless Networking

IPhones Flooding Wireless LAN At Duke 441

coondoggie sends us to a Network World story, as is his wont, about network problems at Duke University in Durham, N.C. that seem to be related to the iPhone. "The Wi-Fi connection on Apple's recently released iPhone seems to be the source of a big headache for network administrators at Duke. The built-in 802.11b/g adapters on several iPhones periodically flood sections of the school's wireless LAN with MAC address requests, temporarily knocking out anywhere from a dozen to 30 wireless access points at a time. Campus network staff are talking with Cisco, the main WLAN provider, and have opened a help-desk ticket with Apple. But so far, the precise cause of the problem remains unknown. 'Because of the time of year for us, it's not a severe problem,' says Kevin Miller, assistant director, communications infrastructure, with Duke's Office of Information Technology. 'But from late August through May, our wireless net is critical. My concern is how many students will be coming back in August with iPhones? It's a pretty big annoyance, right now, with 20-30 access points signaling they're down, and then coming back up a few minutes later. But in late August, this would be devastating.'" So far, the communication with Apple has been "one-way."
Windows

Vista Can Run Without Activation for a Year 357

An anonymous reader gave us a heads up on this article for people who like putting things off. It begins: "Windows Vista can be run for at least a year without being activated, a serious end-run around one of Microsoft's key anti-piracy measures, Windows expert Brian Livingston said today. Livingston, who publishes the Windows Secrets newsletter, said that a single change to Vista's registry lets users put off the operating system's product activation requirement an additional eight times beyond the three disclosed last month. With more research, said Livingston, it may even be possible to find a way to postpone activation indefinitely."
Books

Submission + - Book Review: Unix Power Tools, 3rd Edition

Anonymous Coward writes: "O'Reilly is now on their third edition of Unix Power Tools, and they've managed to somehow cram even more into it. A small badge in the upper-right declares it to be updated and expanded, and they aren't kidding: the book weighs in at over 1,000 pages. Clearly meant to sit on one's desk, not in one's pocket, the book covers nearly every Unix-related topic at some point or another.

The book opens with a gentle introduction to Unix concepts, explaining case sensitivity, manpages, the root user, and so forth. Although users with even a slight amount of experience can skip this part entirely, it would serve as a reasonable introduction for a newcomer.

As one might expect, there is an introduction to both Vi and Emacs; curiously, there is also a section on the older line editors. The remainder of the book covers almost all topics relevant to system administration, including process management, devices, printing, and networking. The style is similar (though not always identical) to the "Cookbook" line of O'Reilly products. Other than the introductory parts for each topic, most of the book follows a simple "problem -> solution" format, allowing readers to quickly identify which part is of interest to them.

In addition to the obligatory section on shell programming, there are sections on programming in Perl and Python. These are in no way replacements for books devoted solely to these languages; it simply can't compete with books that cover a small topic in complete detail. However, they are quite acceptable as both tutorials and lightweight references.

The real value in this book comes from the collection of somewhat- obscure tricks and techniques found throughout. Reading it cover-to-cover would be difficult, but skipping past the introductory sections allows you to discover some real gems. Flipping through it will uncover a wealth of Unix arcana whose very existence may be unknown to even relatively-experienced admins. For example:

- What command would you issue to find out which virtual console (or pseudo
terminal) you are using?
- What is the easiest way to add line numbers to the front of each line of text in a file?
- What does ':' mean to Bash, and how can it be used effectively?

Overall, the book is a solid addition to any admin's library, and would make an excellent purchase for someone interested in learning system administration from the basics.

- Dalhousie University ACM Chapter"

Slashdot Top Deals

Overload -- core meltdown sequence initiated.

Working...