Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Netflix is after $$ (Score 1) 267

Bumping a week-old story here, but... Netflix has done some cost accounting. By dumping/burying the ratings and sort function they ensure that people will watch crappier, less costly content, or watch less. They probably pay more for higher rated movies, and perhaps a bump per view. I think it's a cynical move on Netflix's part; the claim (by a VP) that "the vast, vast majority" of users tested preferred the new interface is risible bullshit.

Comment Re:Growing pangs (Score 1) 642

I think bank-issued digital currency would be worse than government-issued currency

In the U.S. during the 1800's, there were over 8,000 private currencies. Banks, or pretty much anyone, could issue paper notes. This situation undoubtedly led to some interesting travel experiences, exchange rates and collapses, but mostly I imagine it led to a lot of confusion.

Comment Can't any Telcom's track cell phones? (Score 1) 373

I suppose there's a different privacy issue w/ regard to phone manufactures and software developers (and potential hackers) tracking your rough whereabouts, but, technically, isn't locally stored location information redundant? Telcom's have long cooperated with law enforcement in tracking and spying on their customers, and, my understanding anyway, is that provisions of the Patriot Act allow for warrantless taps, searches, etc.

So, what is the difference? Why the outcry and concern? Heck, there's even a case of the FBI activating users' microphones remotely to bug their conversations. Seems scarier to me. http://news.cnet.com/2100-1029_3-6140191.html

Comment What have I learned here? (Score 4, Interesting) 168

If large, well-funded companies, even those that specialize in security (!), or whose business depends upon keeping their proprietary info safe, cannot keep their servers secure, what chance does a Mom and Pop operation like mine have?

This year I spent 4 weeks studying the OS X Server Security Config (400 pp.), and implementing those recommendations. I've looked at best practice guides for all the underlying FOSS tools I use. I monitor logs.

But it's seems never enough to keep out a determined, skilled hacker. Do I despair? Give up? What lessons can I take from this?

Slashdot Top Deals

We are each entitled to our own opinion, but no one is entitled to his own facts. -- Patrick Moynihan

Working...