Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:It's three letters (Score 1) 96

Well, some shell does. They have had the ability to extend auto-completion for some time. Not to say that it's not needed (I'm part of the peoples that use only 3-4 git commands) but writting scripts that handle git auto completion in existing shell might be more useful in the wide than a git-centric new shell.

Comment Re:Seriously? (Score 2) 243

When you're talking about duplicate content, you can't limit yourself to "just hashes".
In this case, with pictures, just opening one and saving it again might produce a different hash, just by recompression or changing the file format. How does all these "just check the hashes" solution works for that?
Finding duplicates image is not that easy.

Comment Re:That's cute (Score 1) 731

And even if it become really hard, you have to be pretty confident about the appeal of your website.
I can understand why they want their ads to go through, but if some webmaster take aggressive action to force the hand of the user, there's a little side effect called "not going to this site anymore" that might hurt them somehow.

Comment Re:What would EA have to do? (Score 1) 198

Yeah, no.
Is donating a large sum of money to a charity a good thing? Of course!
And the fact that they did it to buy themselves a better public opinion doesn't make it less than a good thing, but it's certainly not helping their reputation: "hey, we screw up big time, so we douse money left and right to fix it" usually don't works by itself.

Comment Re: i hope people with SCADA systems learned. (Score 1) 195

The air gap is not the solution. Proper isolation, firewalling and virus/malware is.

No. Firewalling, virus protection, malware detection... all these techniques can be flawed, either by design, because of oversight...
It is acceptable for most system (because these issues get fixed after a while), but for a SCADA system you don't want a zero-day to be exploitable *at all*. Your system can have a ton of backdoor/vulnerabilities/exploits, if it can't be reached by any other mean than physical access they are not an issue.

Comment Re:Is this news for anyone? (Score 2) 165

Only if your very confident that B will never ever get it's input from anywhere else, or that if it happen, the "anywhere else" will also properly check it's input. Oh, and you should know for sure that A will never change and suddenly spit something that B won't accept. Better document your code, and hope that the future maintainer will actually read what you wrote.
In large, long-lived project, these assumptions are all hard to make.

Slashdot Top Deals

An authority is a person who can tell you more about something than you really care to know.

Working...