Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Dan 'I'm not a paid shill' Lyons? (Score 5, Interesting) 336

I was thinking the same thing. "Dan Lyons," where did I hear that name before? Oh yes! He's that shill. He irreparably damaged his reputation in the SCO fiasco, and anything he says now, or writes, will be forever tarnished. The only reason I read this Slashdot story was to see if anyone else recalled his involvement. I certainly won't be reading his actual article, or even participating in the "debate" over it's contents, as that is actually what he wants to foster. I'd say let this story die.

Comment Re:Cringely points out... (Score 5, Interesting) 222

I would have to agree. Having obtained my CCIE Security this year (no I wasn't the one that passed the new 3.0 blueprint), and having a CISSP for a few years, I can say from my experience that there are likely well over 1000 experts in the country. Heck, we have quite a few experts in the company I work for now, and no it's not Cisco. In fact, Cisco calls us in to fix problems they can't from time to time. I doubt that any of them would want to work directly for the government though; I certainly would not. Consulting work for the government, sure, but not a government employee. His point seems to be that he doesn't know that many security experts, so they must not be out there. From his article, it appears that he knows a few subject matter experts, but he points out himself that they are not all-around experts. To quote "I was an expert in AV, IDS, and other areas. But I was not the all knowing security guru." That's two listed technologies and one all-encompassing "other" category. And apparently this expert "was," no longer "is." Now, I'm not calling them out, and I'm not going to compare resumes in a public forum. I'm just saying, when his own experts say they were an expert, maybe he's not talking to the right experts...

Comment Re:Not a problem (Score 1) 205

You're not thinking out of the box. Sure SecurID is a one-time password system, but that doesn't mean it still can't be exploited. If the keylogger is sophisticated enough to be able to pick out the username, pin, and tokencode, it is sophisticated enough to send the real tokencode to the hacker, in real time, while fudging it up for the user. Passwords are usually masked anyway, so the user would never know that the keylogger changed the tokencode. The hacker logs in, and the user tries again, possibly waiting for the next tokencode.

Comment Re:this seems like the "TiVo" situation to me (Score 1) 782

While you make some cogent arguments they are all misplaced. The fee part is about charging a fee for the source, not the binaries. Apple doesn't distribute the source, so your points on that topic are nonsensical.

Your comments about not being able to make the sources runnable are also not accurate. You can make the binaries runnable by using the developer kit, which I believe is free (for non-commercial use). You would need a Mac, just as you would need a Windows license to compile any Windows GPL software. Again, it sounds good, but your arguments just fall flat.

There is much misunderstanding about source distribution requirements. Much like the fact that you CAN use a GPL software in-house, with custom changes, and never have to share those changes with anyone else, as long as you don't distribute it outside of your organization, the finer points of the making the source available if you do distribute are often lost on many people.

They are not in legal trouble, and they are not in any sort of "spirit" trouble either. Stop spreading FUD and misunderstanding. The binary is sold, which is perfectly legal. The source is available, and can be compiled and run by anyone who takes the time to build it.

If you didn't know there IS a free app called Beta Helper that will tell you the unique identifier for your iPod/iPhone. Here's a description:

iPhone an iPod touch applications can be installed without the App Store for prototyping and enterprise use. For this AdHoc installation you have to give the device ID (unique identifier) to the programmer or administrator. By now, you can only read it with a Mac, which has the iPhone SDK installed. BetaHelper changes that! This program reads the device ID directily on the device and can send it to any email recipient. It's that easy!

So please, stop spreading FUD, and someone mod the parent down.

Comment Re:Environmentally sound... hehehe. (Score 2, Informative) 133

While technically correct, a subsidy is more commonly used to describe an outright grant of money, with no requirement to pay it back. Such as the government subsidizing PBS, or the Arts programs, or giving grants for medical research. A loan guarantee, which is what the article is talking about, is not what most people would call a subsidy.

You could also say that solar technology is highly subsidized by the government, and otherwise isn't profitable.

Solar Financing, Subsidies, and Incentives

Some of them are financing, which if just a loan guarantee is what people are talking about for the nuclear industry in the future, but some are outright tax breaks (grants, or real subsidies).

Slashdot Top Deals

Many people write memos to tell you they have nothing to say.

Working...