Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment How do you know? (Score 1) 275

People always claim that bad beer tastes like piss. And I always wonder how they know! Which reminds me of a childhood memory. We were in the Catskills in what was then called a bungalow colony. One day, for some reasons, the owner had to siphon some gas, which he started by sucking on the hose. My dad asked what it tasted like - it tastes like manure he said. Once we were away, my dad wondered aloud how he knew.

Comment Marketing to cover weakness (Score 1) 153

The story prompted me to look at bing maps. Very first direction request produced a poor route. When dragging the route to change it gives less time and distance, you know it's not the source to use! There is no way to reset a drag! etc. etc. I'll stick with google.

But one wonders how this government agency was co-opted.

Comment Security Questions deemed dangerous (Score 1) 87

It has been pointed out many times that the security question system is dangerous if the user does what he's told. It is in general easier to find out what someone's high school mascot was than to guess his password! My approach it to provide nonsense answers I can retrieve for all such question. No one's going to guess that my mother's maiden name was bottleofbitsofstuff for example. You can use the same answer for all questions if they let you, or use obvious variants otherwise.

Submission + - What do WiFi signal looks like? (openculture.com)

MarcAuslander writes: Have you ever wondered what the WiFi signal looks like around your office, school, or local café? In this video, Timo Arnall, Jørn Knutsen, and Einar Sneve Martinussen show you the invisible. And they pulled this off by building a WiFi measuring rod, measuring four meters in length, that can visualize WiFi signals around Oslo, Norway with the help of long exposure photography.

Comment Assigning new values to constants can be useful! (Score 2) 305

I was amused by the comment "If that incr(0) were allowed either some temporary that nobody ever saw would be incremented or - far worse - the value of 0 would become 1. The latter sounds silly, but there was actually a bug like that in early Fortran compilers that set aside a memory location to hold the value 0. "

Back then, I wrote Fortran subroutines which took computed dimension arrays by declaring the arrays with crazy bounds, numbers I hoped would never be used as constants, and then "assigning" the real bounds to the "constants".

Those were the good old days.

Submission + - Why Phishing stays alive and well.

MarcAuslander writes: I just got an email from paypal. Yes, it's really from paypal. And it tells me to click on an embedded link and log in! The link is legitimate. What are they trying to teach me?

"PayPal recently posted a new Policy Update. You can view this Policy Update by logging in to your PayPal account. To log in to your account, go to https://www.paypal.com/ and enter your member log in information. Once you are logged in, look at the Notifications section on the top right side of the page for the latest Policy Updates."

Comment Chase Letter a perfect phishing template! (Score 1) 180

Got my Chase letter. It warns about not sending information by email. Nothing about not clicking on links. In fact, it contains the lines:

The security of your information is a critical priority to us and we strive to handle it carefully at all times. Please visit our Security Center at chase.com and click on "Fraud Information" under the "How to Report Fraud." It provides additional information on exercising caution when reading e-mails that appear to be sent by us.

chase.com is a link!

All a phisher needs to do is send this exact email, pointing to a dummy Chase page, and encourage the victim to log in when he reaches it.

Clearly they are either very stupid or really just don't care. I'll go for the latter.

Slashdot Top Deals

I've noticed several design suggestions in your code.

Working...