Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Burned once (Score 1) 194

The 30-pin connector was in use for about a decade, and you can get an adapter to use Lighting connector devices with 30-pin connector accessories. This is a non-issue.

The adapter, when used with the car head units designed for 5 - 6 gen iPods, does not supply power, and that IS a MAJOR issue!

The solution is NOT a $30 adapter, it's a $250 iPod classic!!

Comment Re:Burned once (Score 1) 194

Uh, Apple does make an adapter for it... I know it's $30, but it's at least a solution. (Our car has a USB port, so it's just a matter of changing the cable for us.)

Except that unlike the old cable, with the adapter it doesn't provide a charge, only the connection. So it drains the battery as it's used, then I have to charge it by connecting it to the car charger. There doesn't seem to be a way to connect it to the stereo and charger at the same time, at least with the adapter.

Really renders the whole thing useless. The cheapest fix is to return this iPod, and buy an iPod classic for about $250. Way more capacity than I need, and more money than I wanted to spend, but it does have the 30-pin connector like my old (!!) 5th gen, so hopefully it would work the same...

Comment Burned once (Score 1) 194

Car stereo salesmen and installers around the country are hoping Apple's CarPlay in-car infotainment system will have a big presence in the aftermarket car stereo industry.

Well, it could have, but after investing in a head unit with the expensive licensed connector for my iPod, then finding when my out-of-warranty iPod died that my new one would not work with the very expensive head unit any more because they changed the connector ... well.

As the saying goes: "Screw me once, shame on me, screw me twice, Fuck you Apple - NEVER AGAIN!!"

Comment Re:Over 18 (Score 1) 632

If a business fails to show profits for more than five consecutive years, it is classified by the IRS as a hobby. In other words, you are indulging in this particular activity even if money is being collected. There are of course exceptions to every rule and of course piles of common law precedence to consider as well.

Comment Ok, ok, I bite (Score 2) 582

After a lot of soul searching whether or not I should actually honor this obvious attempt at trolling with a comment, I think I should, lest someone actually take it serious and believe it.

Allow me to take you on an excursion into the world of security. Before you get your hopes up, it's not as glamorous or kinda-sorta-shady-sinister-blackhat as you might think. But I'll try to make it as interesting as it can be.

Part of security are audits. Audits are, in a nutshell, attempts to find out whether there are weaknesses in the surface you're auditing. For example, you prod at a server, check its ports, make sure that everything that answers does so in a way that cannot be exploited, and so on.

Those that at least dabbled in security will know about the various "boxes" used to describe the "rules of engagement" in such an audit. Most commonly known, I'd guess, are "black" and "white" box tests. In a "black box" test, you get no or very little information about your target and your task is to find out whatever you can find about it. A "white box" test is the exact opposite, where you get full disclosure of your target's makeup, e.g. what services are running, at what patch level, often even what purpose they serve and what department they belong to, and so on.

One might now think that the more "normal", more "useful" test is a black box test. Because, hey, if I tell you everything, what the hell would you test? But, know what? A black box tests is something that you'd do to test the tester's ability, not that of your target. With a black box test you can rather find out just how much the guy you hired to do your audit actually knows about the whole shit.

If you actually want to test the target, you disclose about any information there is. That might sound odd now, but when you think about it, it starts to make a lot of sense. This information can be available to a potential attacker. A disgruntled ex-employee could have that information. Or someone who spends a lot of time social engineering and prodding can gain it somehow. Assuming that you could increase your security by withholding information from a potential attacker is at best giving you a false sense of security because you can NEVER actually say with at least a semblance of certainty that a potential attacker CAN NOT have that information. Like I said before, all it takes is a pissed off ex admin and this attacker would have ALL the information.

And it's rather trivial to sell information these days...

Now, what does this have to do with the question open vs. closed source?

It means that just because YOU do not have the information does not mean that your attacker does not have it. Closed source is akin to the black box in the aforementioned example, open source the white box. When you audit closed source, you will learn more about the abilities of your auditor rather than about the security level of the software you audit.

Comment The language being the problem? Seriously? (Score 1) 189

Yes, of course the security of your language (as well as the rest of your environment) matters. But what's way more important is what kind of devs you have. No matter how secure anything is, if the person supposed to use it does not know about its security pitfalls, do you think that's increasing the security?

Security is by definition the minimum of the security your technology offers and the security your personnel offers. The minimum. Not the average. The same applies to OSs, too. You can have the most secure OS in the world, if you lack the admin to secure it, you're no better off than with an OS that has shabby security itself.

Your security is way more dependent on the personnel you have, and the ability and expertise they have with the different technologies. Simple scenario: Take an admin that knows OS-A like the back of his hand and can somehow kinda-sorta get OS-B to run. OS-A has a few security holes (that the admin all knows about, including their workarounds) while OS-B is absolutely tight but our admin doesn't know it too well.

Which one do you think will, administered by said admin, be more secure?

It's the same with programming languages. C does have its security issues, but a good C programmer knows why he should not put input on the stack and why he should include sanity checks on every input, especially if is of variable length. Some other language might not have that possibly dangerous pit, but there are very, very few languages (outside those fields where security matters and money doesn't) that have none.

What would you prefer your devs to develop in? A language they know, including all its slings and errors, or a potentially more secure one the pits of which your devs don't know?

Comment Re:It kind of makes sense...but it doesn't (Score 1) 632

Or is this one of those cases where some judges have already decided that their preferences and policies are more important than what the Constitution says?

Oh, judges decided long ago that due process does not mean "having your day in court." A bureaucracy simply has to publish their administrative procedure, which includes some provision where they are supposed to read any letter sent in by the defendant, and the administrative procedure is automatically considered to be all the "due process" required.

Comment Re:Ex Post Facto Law (Score 1) 632

BTW, can you be jailed for failing to pay the IRS? Makes me wonder how 'civil' that infraction is then...

Actually, no you can't. They can seize all of your bank accounts and assets (including your home, if you owe more than $5,000), but they cannot jail you.

But, they can jail you for tax evasion and tax fraud. Those are both felonies.

From Title 26:

  1. Willful failure to file a tax return is a misdemeanor pursuant to IRC 7203. In cases where an overt act of evasion occurred, willful failure to file may be elevated to a felony under IRC 7201, Tax Evasion.
  2. If failure to file a return is fraudulent, a civil penalty known as the "fraudulent failure to file (FFTF) penalty" may apply under IRC 6651(f). This penalty may apply to all returns due after 12/31/1989 (determined without regard to extensions).
  3. The civil fraud penalty may be applied to all returns required to be filed on or before 12/31/1989.

Comment Re:Bush Vetoed this, apparently (Score 1) 632

It does not really make any more difference whether a candidate is a Democrat or Republican. What is really important in the next election is to vote against whoever is in office currently and vote for their opponent most likely to throw them out.

Hear, hear! This is always my default position - vote for the non-incumbent. There are over a dozen senators and more congressmen that have held office for at least 30 years! Way past time for a clean up.

Comment Re:Over 18 (Score 1) 632

The only matter that was stopping the IRS from going after long-forgotten debts was its policy.

Obviously not true, or they would not have needed legislation to start doing it.

The fact that inheritors are responsible for the civil damages, including ones from future lawsuits, is nothing new.

It certainly is in the United States. You cannot go after an heir for their ancestors debts. Ever. You can sue based on property owner liability issues, based on ownership at the time, but that still has nothing to do with "inheritors" or relatives, just the current property owner.

Slashdot Top Deals

"May your future be limited only by your dreams." -- Christa McAuliffe

Working...