Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Fucking Hell, Harper needs to go! (Score 1) 122

Ya. Fucking neocons... I say bring back the stripper visas that the Liberals put in place!

Seriously, you should try removing your head from your ass. All politicians are criminals. The Conservatives want more foreign techs, the Liberals want more foreign strippers. That's the way the world works -- try not to get so polarized about it.

Comment Re:Wikr (Score 1) 93

Re: FBI. That may be true (albeit difficult to do). However, that would be the end of their business, so it would be somewhat pointless to ever agree to that (they have already declined such a request). For reference here is their guidelines for law enforcement requests:

https://wickr.com/wp-content/u...

And the report of them denying an FBI request:

http://www.slashgear.com/wickr...

Submission + - Apple Swaps "Get" Button for "Free" To Avoid Confusion Over In-App Purchases

lazarus writes: Apple is falling in line with the European Commission's request that app sellers do more to stop inadvertent in-app purchases.
Following Google's lead, Cupertino has removed all instances of the word "free" within its iOS and Mac app stores (with the exception of its own apps, like iMovie), and replaced them with the term "Get."
The new label clarifies what users can expect when downloading an app. Apps previously labeled as "Free" will now have a "Get" label. If those apps include in-app purchases, a small gray "In-App Purchase" label will appear below the "Get" button.

Comment Wikr (Score 1) 93

Wikr is what I use. Right now it's only available as an iOS and Android app. You specify how long you want your messages to exist for and the countdown starts when the receiving party views the message. Slightly clunky, but very very secure:

From the website:

App:
  ID and device info are cryptographically hashed with multiple rounds of salted cryptographic hashing using SHA256.
  Data at rest and in transit is encrypted with AES256.
  No password or Password hashes leave device.
  Messages and media are forensically wiped after they expire.

Server:
  In contact with encrypted messages/media only.
  Never in contact with passwords of private encryption keys.
  Deletes messages on delivery.
  Interacts with only hashed ID and device info.

Comment And Everything Just Get's More Inconvenient (Score 3, Insightful) 193

So they didn't get payment information, but they got everything they needed to apply for credit in your name. Perfect. It took me an hour to buy my last laptop in a retail store with my credit card in my hand because my card company was so totally paranoid about fraud that they put me through the third degree to ensure I was who I said I was. And it's just going to get worse.

At this rate cash will be king again. Oh no, wait, that can be fraudulent too. Essentially, it is getting impossible to spend your own money.

Comment You're Asking the Wrong Question (Score 2) 125

What you need are good processes and a common way of expressing how these processes are adhered to. Get yourself ITIL certified and make sure that either the person you hire is certified or that is the first thing you have them do. You don't have to be a big shop for this to be relevant.

On a day-to-day level you need to be the person who is accountable for any and all changes, which mean you must approve them. Yes, you are handing over the keys, but not permission to run roughshod over the environment.

Also, a good manager "inspects" but does not "micromanage". If you keep this principle in mind and establish some good processes, you will be golden.

Slashdot Top Deals

For God's sake, stop researching for a while and begin to think!

Working...