Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment hoping that Windows 8 is like Vista,.... (Score 2) 294

Windows 3.1 -> worked
Windows 98 -> crashed but worked sometimes
Windows ME -> just crashed
Windows XP -> worked, but has it's drawbacks (64bit version was better, but never really useful due to missing drivers)
Windows Vista -> too much trouble to use
Windows 7 -> useful, but not as customizable as XP
Windows 8.x -> not so useful if you don't have a touch screen, less and less accessible customizations possible
Windows 9 -> hoping that Windows 8 is like Vista and Windows 9 will be useful like Windows 7

Comment Why use Word unless forced to do so? (Score 1) 409

Thinking more about it: Not asking "why use X instead of Word", but asking "Why would you use Word instead of anything else?"

Only reason I use Word is because I from time to time get some strange formated and macro filled document from a client who lives Word and I need to use Word to properly read the document. -> so the only reason I'm using it from time to time is because I'm forced to do

Most of my stuff I write in a normal text editor (and save it inside a git repository ;)).
I only use Word/LibreOffice/GoogleDocs/... for formating and to meet a clients needs.

For personal stuff, which needs formating I normally use LibreOffice.
For publishing stuff I use latex.

-----
Bottom line is, I see no reason to use Word over any other tool.
Even if LibreOffice, GoogleDocs, Office 365 and Word would all satisfy my needs, there is nothing that Word offers to me that separates it from the rest.
-> Why use Word?

Submission + - NSA Has Been Hijacking the Botnets of Other Hackers (wired.com)

An anonymous reader writes: The NSA doesn’t just hack foreign computers. It also piggybacks on the work of professional for-profit hackers, taking over entire networks of already-hacked machines and using them for their own purposes.
That’s one of the surprising details to emerge from the latest Edward Snowden leaks.
The big disclosure in today’s story from The Intercept is that the NSA, by July 2010, had built a system called TURBINE designed to scale up its sophisticated computer-hacking operations. The NSA has infected between 85,000 and 100,000 machines with “implants,” according to previous Snowden stories. With TURBINE as its new command-and-control platform, the NSA can potentially boost that to handle “millions of implants” at once.

Submission + - Russia Blocks Internet Sites Of Putin Critics (reuters.com)

An anonymous reader writes: Reuters reports, "Russia blocked access to the internet sites of prominent Kremlin foes Alexei Navalny and Garry Kasparov on Thursday under a new law critics say is designed to silence dissent in President Vladimir Putin's third term. The prosecutor general's office ordered Russian internet providers to block Navalny's blog, chess champion and Putin critic Kasparov's internet newspaper and two other sites, grani.ru and ej.ru, state regulator Roskomnadzor said. The move was the latest evidence of what government opponents see as a crackdown on independent media and particularly the internet, a platform for dissenting views in a nation where state channels dominate the airwaves. Ej.ru editor Alexander Ryklin called it "monstrous" and a "direct violation of all the principles of freedom of speech,"..." — More at EFF, and in earlier stories at the The Huffington Post , and Deutsche Welle, which notes, "This year's report by Reporters Without Borders on World Day against Cyber Censorship condemns Russia as one of the " Enemies of the Internet." "Russia has adopted dangerous legislation governing the flow of news and information and freedom of expression online," it concludes."

Submission + - One time pad encryption for smartphones (indiegogo.com) 2

An anonymous reader writes: One time pads are the only encryption technique that "cannot be cracked if used correctly". A guy from Germany claims he has written a smartphone app that uses one times pads for the whole communication. He even wrapped the phones into tin foil in his video on Youtube. The project is currently crowdfunded on Indiegogo. So dust your fancy hats and use them to hide your phones while exchanging keys.

Submission + - Does lab equipment take on a mind of its own to trick scientists? (scienceblog.com)

An anonymous reader writes: In a newly published paper, MIT researchers propose an experiment that may close the last major loophole of Bell’s inequality. The test is to see whether, as far-fetched as it sounds, a particle detector’s settings conspire with events in the shared past to determine which properties of a particle to measure — a scenario that implies that a physicist running the experiment does not have complete free will in choosing each detector’s setting. The test involves quasars, telescopes and lots of deep, deep space, and was published this week in the journal Physical Review Letters.

Slashdot Top Deals

If all else fails, lower your standards.

Working...