Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment 20% (Score 1) 182

Fuck, these days they probably aren't even 50%

Most figure it's even lower than that. M$ market share is only around 20%, old numbers did not include phones. When you count phones, tablets, servers, super computers, and so on, M$ is well on its way to becoming irrelevant. It's only the nasty mess and the legacy of dirty business practices that they leave behind for us.

Comment Re:SIP - Blink and Jitsi (Score 1) 330

Your friends, family and coworkers will only hear about them if you yourself bother to bring them up. Unlike Skype, there's no giant budget for marketing. As far as accepting calls over loopback, you'll have to look into that. Another way to hear your own voice would be to call 4444@sip2sip.info There are other echo services and even call back services if you look around.

Comment SIP - Blink and Jitsi (Score 4, Informative) 330

Developers have already gotten on top of this. There are about a half dozen excellent cross-platform SIP applications out there. Jitsi, IMHO, blows away Skype. There is also Blink, despite the name it's good, too. These are the top two and are cross-platform. Use either to connect to either, they both work well.

Comment missing functionality (Score 2) 165

There is so much essential functionality missing from key management and encrypted e-mail, that it is in a barely usable state. For the Brazilian government, or any government for that matter, to provide end-to-end email encrytption for their own workers, so much more needs to be done.

Name me even one mail client or plug-in that can search encrypted messages, the body not just the metadata. Or how about re-keying stored messages? Federal employees often have an obligation to archive communications, but how will that fit with the recommended practice of re-keying? The list goes on.

E-mail encryption has been rather thoroughly thought through at the protocol level (thanks, Phil!) but when it comes to how it can be made to fit in with normal workflow, practically nothing has been done yet.

Comment Secret APIs (Score 3, Informative) 479

Microsoft used secret APIs to give its programs an advantage over competitors. That had a big effect in the 1990's. It is apparently still going on in some things but we'll have to wait, as usual, a long time before it turns up in court records. And like before, the damage will have been done. The only way to stop it is to stop using M$ products.

You can find more like that if you wade through the material of the Comes V Microsoft case at the now archived Groklaw site. Basically anything bad that has been said about M$ and the people that work there is true.

Comment vpns (Score 1) 477

And that was just a lame excuse. She obviously had other motives for cancelling telecommuting as there is no need for a VPN for real work. SSH does not require a VPN. Nor do version control systems (git, bzr, svn). Nor do HTTPS for the intranet or IMAPS for the mail. Not even SIP or Skype for calls needs a VPN.

VPNs only add an extra layer of complexity and add little to nothing in return. That goes double for PPTP, which is garbage.

So regardless if her telecommuters were productive or unproductive, VPN use is an irelevant metric.

Comment IRC helping to identify users (Score 1) 234

Which makes me wonder why IRC is being pushed so much. It helps very much with the scenario you describe. Being centralized and synchronous, it is practical to pull the virtual plug on a targeted user and then see which name drops out of the channel. That was one thing that Usenet had going for it, it was decentralized and asynchronous, making it all but impossible to censor or even track specific users. Remember, not long ago it was part of the package of Internet access advertised by ISPs, it was a key part "getting on the Internet". Suddenly all that stopped. It would not be surprising if there were a little pressure on the ISPs to phase it out, including especially the text groups and not just from the MAFIAA over the dreaded binary groups.

Comment iptables -m limit (Score 1) 99

Please note that the author did not mention Denyhosts since his servers run OpenBSD, which incorporates DenyHosts functionality through ''pf'', its packet filter/firewall software (see the brute-force configuration of pf for more details).

You can do the same with iptables on Linux using the module "limit". See the manual page for "iptables-extensions" for the details. DenyHosts may have it's good points, but mostly it just complicates things. There is already a lot of functionality in the packet filter that you can use, whether on Linux or BSD.

However, what I see now, in contrast to years ago, are slower paced attacks. These come in steadily but at a rate that just passes under the threshold. One of these days I ought to look at what is blocked to see if it's just the slow ones getting through or if all the probes are now timed that way.

Slashdot Top Deals

The use of money is all the advantage there is to having money. -- B. Franklin

Working...