Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:so, the key to amnesty... (Score 1) 322

I run XP Pro in a Xen DomU, which I can access over RDP using a VPN or a SSH tunnel. It is, by far, the most stable XP installation I ever had and I only use it when necessary. Test a website for work from XP? No problem! The oddball software I can't get for Linux? Same thing.

The best part: It is "Gold" as in , I have a perfect installation. Something goes wrong, and I got back to the LVM snapshot where it was pristine. This never happened, but sometimes, instead of uninstalling stuff I need to test, I just rollback any way. It runs wonderfully on one E3-1260L core and 512MB RAM.

This is exactly how Windows XP should be used these days, and it works perfectly fine. XP for Win32 functionality, the rest on Linux.

Comment Not the right way (Score 5, Insightful) 260

The right way is to talk to your kids about these things. Give examples of scams, tell them there is porn, there is violence, and always, always if they feel unsure about something they should talk to you (Mostly for scams, I'm pretty sure they'll handle porn. Hell, even weird porn isn't as bad as seeing ISIS chop someones head off). Software protection is just a crutch, the real protection is education and vigilance.The right way is to talk to your kids about these things. Give examples of scams, tell them there is porn, there is violence, and always, always if they feel unsure about something they should talk to you (Mostly for scams, I'm pretty sure they'll handle porn. Hell, even weird porn isn't as bad as seeing ISIS chop someones head off). Software protection is just a crutch, the real protection is education and vigilance.

Comment Re:It's a vast field.... (Score 5, Informative) 809

There are also a plethora of "technically correct" answers. You could say: "I scp the file to your server", where you presume the server is secure, and ssh is secure, so the documents confidentiality is guaranteed. (Upload the file using https works as an answer too). Hey, just connect to the companies VPN and copy the file to a Samba share. Valid too!
The question of what kind of file it was, isn't even that dumb. I'm not familiar with PDF, but I could -for example- imagine there is a standard for encryption within PDF. Someone from with a document management background would most likely think of such solutions.

Comment It's a vast field.... (Score 5, Informative) 809

It's a vast field, and expertise of people is usually just a subset. I'm not even sure what the answer you you expected was, but I'd say: I'd use your public key to encrypt the file to you and then send it to you. Personally, I wouldn't know which commands to invoke to do this, but I know that's the theory.

So, should any developer know this? That is debatable. I've had very competent developers who had next to no clue about how DNS works. They could do their job just fine with that. Me? Personally, I'm not up to snuff with the finer points of SQL queries and all the joins that exists and when it makes sense to create an index, etc. Could I find out? Most likely, but I haven't had the need to recently.

The problem is, that you are mapping your knowlegde to "what people must know". I used to do that too, and I probably still do often enough. The DNS example above didn't come from nowhere: I had the case, and I was really thinking "how could such a competent person not know this", but then this person could probably enlighten me about dozens of things I don't know well enough.

It all comes down to what you define as "general knowgledge" for a developer should be and that is highly subjective.

TL;DR Hiring people is hard. Especially, technical people.

Comment Re:minimal? (Score 1) 3

I tried the following. On the affected machine, I created a DomU (Virtual Machine), assigned it 4CPUs, 4GB RAM and two disks. A root disk on which I installed a minimal debootstrapped wheezy, and an empty disk for the dd test. I made sure the VM boots from the affected kernel.

The bug doesn't happen in that context:

root@minimal:~# ssh root@othermachine "dd if=/dev/vg0/remote-lv" | dd of=/dev/xvdb1
root@hammerhead's password:
31457280+0 records in
31457280+0 records out
16106127360 bytes (16 GB) copied, 2156,62 s, 7,5 MB/s
31457280+0 records in
31457280+0 records out
16106127360 bytes (16 GB) copied, 2164.91 s, 7.4 MB/s
root@minimal:~# uname -a
Linux minimal 3.2.0-4-amd64 #1 SMP Debian 3.2.65-1+deb7u1 x86_64 GNU/Linux

Of course, the situation is not exactly the same in a virtualized environment.

Slashdot Top Deals

"Protozoa are small, and bacteria are small, but viruses are smaller than the both put together."

Working...