Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Loved Descent (Score 1) 251

I played so much Descent 1/2/3 back in the day. My first LAN parties were all descent. We took over the school computer lab in the evenings and played there too. For Descent3, I participated in the Descent3 $50,000 contest, won a bunch of smaller prizes but not the big one (flew to San Jose from Canada). I'd love another official entry in the series. The fan made ones are OK but don't quite feel right. I'll have to bring my old Sidewinder 3dpro or Precision pro out of mothballs.

Comment My Oma did this too (Score 3, Interesting) 158

Several years back a new hotel opened in Niagara falls. Their phone number was 1 digit off my grand parents number. They started getting several calls a day, all hours of the day, looking to book rooms. They called the hotel several times and asked them to change their number but they refused and told my grandparents they should change theirs. My grandparents had that number for over 30 years so they refused. Eventually they got sick of being polite and telling people they had the wrong number, so they started "taking bookings". The situation was then quickly resolved when the hotel started having people showing up expecting a room. Hotel changed it's number and life went on. I know it sucked for the people who expected rooms, but they tried to be nice and polite for a few months.

Comment It does happen (Score 3, Interesting) 532

We have a user here who got a new laptop last summer, it had a LED backlit LCD. Within 20 minutes she was calling saying it was making her feel sick/headache. We tried adjusting refresh rate, brightness, no help. Put a CFL backlit LED laptop in front of her and she was fine. Tried LED standalone monitor, it also bugged her though not as much. So, we had to find a laptop that had a CFL backlit screen, wasn't junk,and met our other requirements (docking connector mostly). Ended up getting a previous year model Toshiba Tecra with a Core2Duo.All the rest of the laptops we bought had i5's in them by that point.
Java

Why You Can't Dump Java (Even Though You Want To) 402

snydeq writes "Since so many recent exploits have used Java as their attack vector, you might conclude Java should be shown the exit, but the reality is that Java is not the problem, writes Security Advisor's Roger Grimes. 'Sure, I could opt not to use those Java-enabled services or install Java and uninstall when I'm finished. But the core problem isn't necessarily Java's exploitability; nearly all software is exploitable. It's unpatched Java. Few successful Java-related attacks are related to zero-day exploits. Almost all are related to Java security bugs that have been patched for months (or longer),' Grimes writes. 'The bottom line is that we aren't addressing the real problems. It isn't a security bug here and there in a particular piece of software; that's a problem we'll never get rid of. Instead, we allow almost all cyber criminals to get away with their Internet crime without any penalty. They almost never get caught and punished. Until we solve the problem of accountability, we will never get rid of the underlying problem.'"

Comment Re:too much hassle (Score 1) 78

They say on their literature bags may be searched, but I've been walking around with my big vmworld 2011 backpack all week, never searched once. To the original question, I am a network admin at a non-profit religious denomination, not really in "the industry". I registered online, worked on my cover story, but in the end I didn't need it. They didn't even ask for my business card when I picked up my badge, just drivers license.

Comment Veeam and Equallogic (Score 1) 403

We do Veeam backups of our virtual infrastructure nightly. Once a week, a copy of that is taken offsite. Also, every night our Equallogic SAN's replicate with eachother. They are in three separate offices in North America. In the event one building burns down, is blown up by a nuke, or similar, we can fire up our entire virtual infrastructure in the failback location within a couple of hours (minutes really). Since we only have 3-4 non-virtualized servers, and none of them store important data, we're pretty well protected I think.

Comment Incorrect (Score 2) 117

I believe you are wrong there. It says for their wholesale customers, they are allowed to bill based on connection speed, but not total monthly bandwidth usage. This means a small ISP would pay for a 100Mbit link, or 2 Gbit link, etc... It is billed in 100Mbit increments. ISP can use as much as they want, but they will only get that amount per second they paid for. This makes sense to me, you pay for the size of the pipe you need, doesn't matter how much data you put through the pipe.

Comment Re:Root Cause (Score 1) 433

I got a call from Bell the other day asking me to switch back to them. I said no. The guy asked why, and I said it was because Bell was an evil greedy company that didn't care about customers and I would never use one of their products ever again. After about 10 seconds of dead air, I said goodbye :) Bell is a horrid company. At work I switched all our cell phones off them to the slightly less evil Rogers, and our internet off them too (though our fiber connection does go through their network, couldn't avoid that, but at least they just get a fraction of the money, not all of it. Soon our phone lines will all be switched to VOIP too at work, no more Bell.

Slashdot Top Deals

With your bare hands?!?

Working...