Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Try and make an OS that viruses couldn't target (Score 1) 484

Can you explain how a keylogger in Windows gets access to user input in another application without a security approval by the user when it was installed?

If I remember correctly there's a system-wide hook chain for keyboard events, and you add the logger to the chain with a system call. SetWindowsHookEx or something like that. I'm not really sure what the purpose of that function is except to install key loggers, but perhaps someone has a legitimate need for it.

As far as getting an application to run after rebooting, there are (unfortunately) a myriad of ways to go about that too.

Caveat: it's been a number of years since I used Windows so this may have changed in more recent versions.

Comment Re:I wonder... (Score 4, Interesting) 377

How many people will refrain from posting because the statute of limitations hasn't run out yet?

Well, I'm certainly not going to admit to the most costly mistake as it appears no one realizes it was me and what I had done. So I'm not gonna do it; wouldn't be prudent.

The most embarrassing mistake was I inadvertently brought down the clients' network (a major hospital) during the middle of the day. Didn't realize what I had done until about three minutes later when about a dozen IT guys flooded the computer room paying particular attention to the area I was just working in. It appears I made an error. To this day I am likely persona non grata in that computer room.

Comment Re:At least he included warrants (Score 2) 260

The warrant provisions are there to ensure the the political elite can continue to communicate without surveillance. You won't get a warrant for their communications.

We don't need one. Nearly everyone has a recording device in their pocket now. Record politicians, whenever they are in your view, and post it online.

The politicians I'm familiar with have more to hide than the average citizen. If they want to do away with privacy, then so be it. That's what they wanted, right?

Comment Re:How does that compare to desktops? (Score 1) 195

Similar statements could be made for desktops, where tray icon pop-ups for updates, email and chat notifications distract and interrupt workflows.

Popups and notifications are high on my list of things we can do without. If I am sitting at my computer it means that I am there to accomplish a specific task. I do not welcome interruptions on my computer any more than I appreciate robo-calls when I sit down to dinner.

Highest on my list are those dialog boxes that pop up after selecting an option that say "Are you sure you really want to do that?" Yes, I am you fucking retard that's why I clicked the button in the first place and to think that someone had to program this functionality in means you are probably trying to see how far my blood pressure will rise today and I will tell you this, programmer, you are playing a dangerous game thinking I am sane and rational but I'm not, really, deep down, I have it in me to track you down....

Anyways you get the point. I am not a big fan of interruptions to my workflow.

Comment Re: Hate to be that guy, but Linux (Score 1) 517

SSD masks the problem, but the problem still exists. Linux distributions assume you really want to give priority to server applications and it manifests in a crappy UI experience for Desktop users. Yes, you can tune the settings to your hearts content and hopefully find something you can live with, but not everyone will go to the trouble of doing so.

That being said, this is not an anti-linux on the desktop post. I use LXDE/Openbox every day as my default environment. Just saying, I wish it were easier to defend :).

Comment Re:Amazing and dreadful, simultaneously (Score 1) 381

you fail to understand what a modern silicon valley 'contractor' is...you don't bid on jobs. you get offered whatever the company is willing to pay. take it or leave it. you call that 'bidding' ? I don't.

I don't either. A contractor offers services that he alone is qualified to offer. If a company could meet their needs by using their employees, then they have no need for a contractor.

If you are not famous, have brand name recognition, and are not uniquely qualified to meet a customers needs then calling yourself a contractor is just delusional thinking.

Comment Re:Prime Scalia (Score 2, Informative) 591

If the trouble lies with the wording of one part of the law, surely Congress should amend it so it clearly reflects their intent. That's what a functional legislative body would do. And it could happen easily were it not for one party that insists upon acting like petulant children instead of rational and responsible leaders.

At the very least shouldn't Congress act in the best interests of the people they were elected to represent?

Comment Re:No Organizations (Score 2) 268

We are going to die within +/-75 years of being born, and most of us are simply experiments in the gene pool.

How many people die 75 years before they are born? Not arguing with your statistics, but the thing that most people have in their heads that act as a central repository of thoughts and ideas seems to be malfunctioning in your case.

Comment Re:The vast majority still don't care (Score 3, Interesting) 69

Because no one else would need to use weapons-grade encryption.

True, I don't need to use encryption everywhere, but I do just because I can. It amuses me that if anyone wants to snoop on my communications that they see the digital equivalent of an upraised middle finger, and not my plaintext.

I also enjoy the fantasy of someone spending an inordinate amount of resources to decrypt my emails only to discover that all I'm doing is sending LOLcat photos to my friends.

Comment Re:Oh Bullshit! (Score 5, Interesting) 157

Give up on the conspiracy bullshit. He is just trying to excuse what Snowden did. Snowden had physical access to the network and still had to social engineer passwords.

It's a bit naive to think that professional foreign intelligence spies don't have the same access a low level NSA contractor does. There are clearly no safeguards against copying anything you want and walking away with it. That's not conjecture; we have direct evidence how easy it is. The only difference is actual spies know enough to keep their mouths shut about how ineffectual and incompetent US security is.

Slashdot Top Deals

It's a naive, domestic operating system without any breeding, but I think you'll be amused by its presumption.

Working...