Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Terrorists are forcing us to use insecure software (Score 3, Insightful) 123

Once again Terrorists are forcing companies to use operating systems and other software well-known to be insecure on critical servers! You will know these Terrorists because of their distinctive clothing: Ties and Business Suits, which are never worn by software and security specialists. Alas, there may be nothing we can do to counter this Terrorist Threat as the Terrorists seem to have taken over our Corporate Boardrooms.

But there's no cause for alarm: everyone knows that the more you pay for software the more secure it is, right? And we can always retaliate against any Cyberattacks, unless of course they come from Botnets installed on our own citizens' computers.

Comment Re:tcl/tk (Score 1) 411

Yes! tcl (with or without tk or expect) is much simpler to learn than bash or ksh for scripting and also more powerful. The other scripting languages are much more complex yet not significantly more powerful. I still use bash or ksh when what I'm doing is a simple generalization of what I'd do at the command line.

Comment What will be left after a global cyber war? (Score 1) 177

It's difficult to attack well-designed and maintained computer systems and it's impossible to secure poorly designed systems connected to the Internet.

When the insecure junk we call our county's critical information infrastructure gets seriously attacked, the attack comes from botnets operating in every country including our own. To "fight back" we must destroy every insecure computer on the internet!

What will be left standing? Oh, most OpenBSD systems. Quite a number of well administered Unix and GNU/Linux systems. But will we still have electricity to run them? How much of the infrastructure of the Internet itself will still be left after the war has taken out insecure routers, switches and the DNS system?

My critical resources run on OpenBSD servers behind ghost firewalls. My less critical resources are run under GNU/Linux with liberal use of virtualization and sandboxing. There are a few ways I can still be attacked but then, I'm only securing one geek's home office!

There's nothing to be gained from fighting a cyber war. There's no sane alternative but to secure our infrastructure properly right away.

Comment Not the same stuff - much worse! (Score 5, Insightful) 276

Yes, I DO remember the early days of Gnome and how much better it was than now:
    - automatic save and restore of multi-workspace sessions
    - handy window operations like maximize-vertically and maximize-horizontally
    - easy to change settings like which app to handle movies, etc.
I remember when clicking on a menu button gave an instant response,
not a several second delay for the first time in a session.

Gnome has become bloated and slower while becoming less stable and less powerful.
It is neither easier nor harder for beginners. It has more eye candy.

Gnome clients have also gone downhill: Evolution used to support my mh mail folders.
Now it uses a database that crashes when I try to load my old mail and fails to work
with my rules. It still doesn't integrate the contact manager with the mail rules.

I'd switch to KDE but they've been destroying themselves even faster!

Comment Special headphones needed for pointy head (Score 1) 1019

Perhaps if you could find some "special" orthopedic headphones for his pointy head he could see if music could help him!

Unfortunately, this is classic PHB behavior. "I don't like the look of what you're doing so I'm going to make up a spurious reason to forbid it, and if you challenge my spurious reason I'll perceive it as a personal attack."

_the happy geek

Comment O/S Permissions Model Broken - try plash (Score 1) 611

The idea that software that I have no opportunity to audit runs with my privileges when I run it is fundamentally broken. There is no way to clean malware that had a network connection long enough to hide a trojan anywhere and then overwrite itself to appear relatively innocuous. While a complete redesign of the way permissions and permission-delegation would be ideal, it is not practical in the short term. Using systems like http://plash.beasts.org/ can help.

Comment Lots of similar languages create a rut (Score 1) 537

The languages mentioned in the article are all fairly similar procedural languages. Choosing such similar languages makes it difficult to convey the breadth of powerful programming practices and paradigms. A good programming curriculum teaches all of the major programming paradigms, first using languages which emphasize those paradigms, then multi-paradigm languages, then making sure that the student can use any paradigm in any language. Along with learning one or two procedural languages, one of which should be C, I would recommend Squeak, Clojure, Haskell, Mozart/Oz, Curry and Flora2.

_Greg

Comment Tax Intellectual "Property" (Score 1) 263

If non-defensive Copyrights and Patents are a form of property, then let's tax them. When the holder no longer expects to make money from them, they can be sold or given back to the public domain. Heinlein suggested a great way to set property taxes: Let anyone state the taxable value of their property, then that's what it can be purchased for. See his novel "Number of the Beast" for details.

_Greg

Comment 1 2 3 ... infinity by George Gamow (Score 2, Interesting) 630

Gamow's book covers some of the most interesting areas of mathematics without excessive simplification or condescension.

Another good book is

The "Language of Mathematics: Making the invisible visible" by Keith Devlin. This is an expansion of his earlier book for Scientific American Library.

Finally, consider mathematics which involves interactive projects with a computer. Turtle Geometry is a great starting place. Advanced students can tackle a professional book on computer graphics and will learn a massive amount of projective geometry and mathematical thinking while having a blast doing it.

_Greg

Slashdot Top Deals

An Ada exception is when a routine gets in trouble and says 'Beam me up, Scotty'.

Working...