Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Censorship

Google Stops Ads For "Cougar" Sites 319

teh31337one writes "Google is refusing to advertise CougarLife, a dating site for mature women looking for younger men. However, they continue to accept sites for mature men seeking young women. According to the New York Times, CougarLife.com had been paying Google $100,000 a month since October. The Mountain View company has now cancelled the contract, saying that the dating site is 'nonfamily safe.'"

Comment Re:4th Amendment (Score 2, Informative) 352

As far as I know, you can refuse to walk through the scanner, they will pull you to the side for extra security scanning.

If you're lucky, they are not understaffed that day and you get a good TSA employee and can get through the extra process with only a minumum of hassle.

Or, you can get some TSA employee having a really bad day who is pissed of that (s)he now has to deal with you and it will could forever and be a pain in the ass.

Comment Re:Desktop access. Really? (Score 1) 180

which is awesome until you need to launch that one single GUI app and due to enterprise level policies you can't run an Xserver of some type on your Windows desktop in order to tunnel the display back to your PC.

Personally, I think remote admin cards on the servers (ala Dell DRAC) or KVM consoles you can hit remotely via a browser are a better choice since it is just like you are the physical keyboard/monitor and can access BIOS, your RAID cards, etc.

Comment Re:Anti-Union (Score 1) 178

State is paying the contractor company $120/hr for IT employees....the employee is not making $120/hour (unless said employee is a self-employed consultant under contract as opposed to being a W-2 employee w/ a contractor agency).

My company charges around $96/hr to the government for my services. I am definitely not making that much per hour.

Comment Re:Del Toro (Score 1) 325

two huge reasons I loved the 1st movie: the Balrog scene, and the scene where Borimir becomes a human pin cushion. I liked the book version of Borimir's death better, but the way it was modified for the screen worked. Oh, and Gandalf.

My only major complaint is they let the elves speak native and used subtitles but had all the other non-humans speaking English. They should have had the other races speaking native as well.

Comment Re:Show of hands not self-enforcing (Score 1) 207

He wasn't referring to how people vote, but the fact that the # of votes is verifiable without the use of a 3rd party.

e.g. I just saw 14 hands go in the air for Proposition #15. It doesn't matter whether that was 14 people who actually want Prop #15 to pass, or whether it was 7 people who wanted it to pass who were holding a gun to the other 7, just that Prop #15 got 14 verifiable votes.

Comment Re:Rolling Distrobution (Score 2, Informative) 211

Because only the major vendors have been approved for use within the DOD?

Been there done that for 9+ years...it all really depends on how much common sense your IT security group has and how tech savvy they are. My favorite place was where the head IT security guy was an avid computer geek, so when the new vulnerability lists came out, as long as we could provide a memo for the record explaining how we mitigated the vulnerability (backporting the fix, upgrading to the next version, removing the software, etc.), he signed off on it.

Contrast that to another DOD job where no one wanted to put their signature on anything, so no one would sign a waiver for anything that had a vulnerability. This included running NIS/NIS+/or LDAP on the unix network. So as a result, we had over 200 servers supporting about 100 different projects, each with their own passwd/shadow/group files. Yet the same people allowed a Windows Active Directory domain to be ran on the network (and no, we weren't allowed to use AD as an LDAP server for the unix systems, because the unix ldap client had a vulnerability.)

If you've ever had to work with the DISA STIGs, you'll know how much of a piece of crap most of their scripts are w/r/t checking that you've performed the required lockdowns per the guides. One example for Solaris 10, one of the checks was to see if a certain service was running (I forget which at the moment). It performed the check by grep'ing for the service in inetd.conf, and seeing if it was commented out. Well, for Solaris 10, management of that service was moved to the SMF facility, so the line didn't exist in inetd.conf. The script wasn't updated for Solaris 10, and since the script wasn't written to handle the case where the line didn't exist, it would give a false positive hit and say you were running the vulnerability. We had to spend 30 minutes explaining this to very non-techy auditor, and finally after still not getting it he basically threw his hands in the air and said "fuck it, I believe you" and let us pass on that ONE lockdown. Multiply that by a couple dozen. Makes for a long week during your annual inspections.

Comment Re:really? (Score 1) 901

So how exactly would a simple BASH script convert the title block on multiple proprietary, binary formatted files?

I seriously want to know how you would do that, since it would be very useful for when management arbitrarily decides to change the company letterhead and people need to go back and update all of the documents, manuals, publications, etc that go outside the company.

Slashdot Top Deals

According to the latest official figures, 43% of all statistics are totally worthless.

Working...