Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:MITM legalized at last (Score 1) 294

Except they aren't in the middle

Man in the middle means to dupe both ends of the transaction that they are talking to each other correctly while injecting your own data into it.

What they are doing is a redirect to another page that asks you if you would please answer this question so that, when the deadline arrives, they don't have to restrict/disconnect your service.

Comment Re:Nice (Score 1) 294

Typically, when doing such things, you check the user-agent.

Their aim is to ask people a simple question. If the people had already replied to it they wouldn't get the page. If they select an answer they wont get the page in future. At worst it would be considered using a morally ambiguous technology to accomplish a neutral end.

Comment Re:ROM (Score 2) 163

Pfft, of course they are better screws. They are both more expensive and annoying to operate, just like other Apple Iproducts.

iScrew

Only meant to be used by the special Apple certified screwdriver, the iScrewyou.

Comment Re:uh - by design? (Score 1) 163

The whole point of Thunderbolt (and Firewire before it) was that they didn't put any load on the CPU at all, they would communicate directly to ram, reading and writing data without any load on the very limited resource that is the processor. Of course, there really should have been a boot-time restriction of what memory the bridge has access to, but I guess that would have been too much for the programmers.

Comment Re:Short sighted (Score 1) 230

That is the issue. Windows on a laptop should specifically ask you if you want to install updates, because when you need to grab your laptop and run, you don't want to wait for twenty minutes of updates first.

I would suggest using Hibernate instead since it powers down the machine, when you see the "I am going to delay you" indicator on the shutdown icon.

Comment Re:Hmmmm. (Score 1) 80

Nah, just America. In Australia when they say 'unlimited' by law the connection has to be without any limit. So the only ones that post 'unlimited downloads' are the ones who oversell their back-haul and run like shite during peak times.

Comment Re:Could be solved be VISA, etc. immediately (Score 1) 307

Australia. Basically, if you ever bounce a cheque or make any kind of fee appear as a result of cashing one, they wont approve it.

Reason we started using them was a guy came into one of the other stores (who our owner owned) and had a bank cheque from his own, named, account. Buys a laptop and other stuff with it. Then goes to the bank and cancels the bank cheque. Used to be once issued they were practically legal tender.

Comment Re:Could be solved be VISA, etc. immediately (Score 1) 307

Where I used to work we had a cheque underwriter. Basically, when we got a cheque we would need to call up and feed all the details off it into the phone-service, they would give us an auth number to write on it. If the cheque bounces or is otherwise bad, we still got our money and THEY would undertake the hunting of the person.

Downsides:
3% processing fee
Takes about 10 mins
Customers who pay regularly by cheque are usually arseholes and will complain bitterly about the above two downsides, while holding up other people.

Comment Re:Or just practicing for an actual job (Score 1) 320

Right, but if you were in school, and given the task of writing a program that accepts, stores and evaluates passwords, grabbing such a piece of code would be considered a 'bad thing'.

Saying in your comments that you found a 'method for neatly measuring password strength and reimplemented it' would, however, demonstrate that not only can you find code that you would need but CAN code and implement the solution.

Slashdot Top Deals

"God is a comedian playing to an audience too afraid to laugh." - Voltaire

Working...