Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Changing a hash function... (Score 1) 156

The problem with this approach is that the next target will be XML based services, JSON services, and whatever else that is out there that accepts user input and turns it into a map. Feels like yet another pointless rule that developers will have to remember till the end of days (and will probably keep ignoring in 99% of the cases). Processing input from users? Use String objects with a cryptographically strong hash. Pay the price, keep track of them all the way downstream.

Comment Re:You're a virgin! (Score 1) 735

Actually, there is absolutely something "they can do to eliminate your commute" - they can pay him (her?) more money to make up for the (likely) difference in rent or inconvenience of relocation expenses. This argument in general is highly unreasonable and perpetuates the "fuck everyone" attitude. Meanwhile, even in very big cities individual industries in IT have a relatively small pool of people, and a good % of jobs are found via former coworkers. So while the company might not think twice before fucking you, you should think twice before fucking your colleagues - in a few months, when you interview in some other company, your resume might be on their desks.

Comment Should be easy to find them (Score 1) 371

Seems like the website required to have *some* authenticated sessions. Even though they probably used some stolen credentials (at least one would hope), they must have used their own when they *discovered* it. So the way to find them is to look at the logs and find people who accessed diff acct urls under the same auth token prior to this massive theft. I bet there are not going to be that many of them.

Comment 1 year?! (Score 0) 157

Seriously, they offer credit protection for 1 year??? Like the your personal information that they had stolen from them EXPIRES in one year or something? With all those millions of records at hand, chances are whoever has their hands on this data will not even get to you until 3-5 years from now (good luck proving then that sony had something to do with it:( )

Comment Re:Parasitic class overtaking STEM (Score 0) 791

Anyone implying that science is harder than law is probably neither well equipped to do science now knows what law involves. Unless you have an Ivy MBA and are willing to work 100 hours a week for several years, you will NOT be making anywhere close to what junior it personnel makes, "financial mumbo-jumbo" or not.
Input Devices

BlindType — the Amazing Keyboard of the Future 125

kkleiner writes "BlindType has created a new touchscreen keyboard program of the same name that changes size, orientation, and position to match your wandering fingers as they type. BlindType also features some of the most impressive typing correction software I've ever seen. The result is a practical touchscreen interface that knows what you meant to type, even if you make mistakes. Lots of them. In fact, you can type without looking at the screen at all."

Comment Re:Hardware (Score 1) 468

This is not true, flash was doing much more than mouseovers, and doing it very well on my 1Ghz Pentium 3. The only thing that it was not doing back then is decoding video - ppl were actually publishing vector animations back then. Of course youtube has killed it, and now we get to watch them in low quality.

Comment Re:Who exactly is fighting back? (Score 1) 641

No one goes into climate science to make tons of money, so I would guess majority of climate scientists value other things, like making a difference and being right. I do not see how such motivation would make people less inclined to cheat (just a bit!) than one to make more money? especially if the perceived enemy has $$ interests, something that poor grad students do not.

Slashdot Top Deals

"May your future be limited only by your dreams." -- Christa McAuliffe

Working...