Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:*sigh* (Score 5, Informative) 306

The issue with Obama as it has been stated is that his mother was 18 at his birth and had not lived for five years in the US after she turned 18. So If your mother was under 19 you can't be president. For me, that fucking bogus. An obvious bug, written into the US constitution.

No, that is not an issue at all. While you have to be 35 years old to be president of the US, the age of your mother when you were born is irrelevant. The text of the US constitution is readily available online for you to see for yourself: "No Person except a natural born Citizen, or a Citizen of the United States, at the time of the Adoption of this Constitution, shall be eligible to the Office of President; neither shall any Person be eligible to that Office who shall not have attained to the Age of thirty five Years, and been fourteen Years a Resident within the United States."

You seem to be vaguely referencing the requirements for citizenship at birth for someone who was born outside the US, but that's not an issue with Obama because he was born in the US, and is therefore a natural born US citizen.

Comment Re: Personally I like Microsoft hardware (Score 1) 452

Microsoft then screwed up their next natural keyboard called the Microsoft Natural Multimedia. It defaulted to using the specialized keyset MS had introduced (help, undo, redo, new, open, etc) rather than the standard function keys, which were on the same physical keys. Brilliant and forward thinking, right? Because soon everyone will be using those instead of the stodgy old F1-F12 keys. *bzzzt* Wrong! And of course, there was no way to change the default in software, so every time you turn it on or reset the computer, you had to remember to turn on your damned function keys. That keyboard sits on my audio workstation, because apparently I'm too cheap to replace an otherwise perfectly good keyboard that has just one irritating flaw.

I currently use the MS Natural 4000 model on my main workstation, and really love it. Hopefully they'll continue selling it for a long time to come. If not, I'll probably buy a dozen of them and hoard them for the rest of my life.

I also like and use the MS Natural 4000, but it has the same "F lock" behavior that you dislike about the MS Natural Multimedia. The F keys default to being Help, Undo, etc... and you have to press the F lock key for them to work as regular F keys. And apparently F lock always defaults to off and can't be changed through software (though apparently you can kludge something up with the Intellitype software that remaps MS's special keys back to F keys--but it doesn't work for programs that use the raw scancodes, e.g., games that use DirectInput).

Comment Re:No Clinton No Bush (Score 1) 315

How many primaries are closed? I remember when I first voted in Texas, the primaries were open, then the Republicans closed theirs. I left before the Democrats closed theirs, and don't know if the Republicans ever un-closed theirs. And they weren't "closed". They were closed to registered democrats, but not closed to undeclared/undecided.

Texas has never had closed primaries, at least not as long as I've been voting (which is over 20 years)--and neoritter's wikipedia link lists Texas as an open primary state. There's also no official party registration in Texas. Sure, you can send some money to the Republicans or the Democrats and they'll send you a card so you can be a card-carrying [whatever], but at voting time, the state doesn't know or care. There is a restriction during the primaries: if you've voted in one party's primary during the election cycle, you may not also vote in the other party's primary during that same election cycle. But during the next election cycle, you're again free to choose which primary you want to vote in.

Comment Re: this is malarky. (Score 1) 132

The subject is their washing machines, not HVAC systems. While Nortek may use the Maytag brand name on air conditioners, Whirlpool owns Maytag the washing machine/home appliance company. See, for example, their About page which has a link to Whirlpool captioned "Find out more about our parent company."

It's not uncommon for large companies to split off a division and sell it to another company.

Feed Techdirt: The World's Email Encryption Software Relies On One Guy, Who Is Going Broke (google.com)

The man who built the free email encryption software used by whistleblower Edward Snowden, as well as hundreds of thousands of journalists, dissidents and security-minded people around the world, is running out of money to keep his project alive.

Werner Koch wrote the software, known as Gnu Privacy Guard, in 1997, and since then has been almost single-handedly keeping it alive with patches and updates from his home in Erkrath, Germany. Now 53, he is running out of money and patience with being underfunded.

"I'm too idealistic," he told me in an interview at a hacker convention in Germany in December. "In early 2013 I was really about to give it all up and take a straight job." But then the Snowden news broke, and "I realized this was not the time to cancel."

Like many people who build security software, Koch believes that offering the underlying software code for free is the best way to demonstrate that there are no hidden backdoors in it giving access to spy agencies or others. However, this means that many important computer security tools are built and maintained by volunteers.

Now, more than a year after Snowden's revelations, Koch is still struggling to raise enough money to pay himself and to fulfill his dream of hiring a full-time programmer. He says he's made about $25,000 per year since 2001 — a fraction of what he could earn in private industry. In December, he launched a fundraising campaign that has garnered about $43,000 to date — far short of his goal of $137,000 — which would allow him to pay himself a decent salary and hire a full-time developer.

The fact that so much of the Internet's security software is underfunded is becoming increasingly problematic. Last year, in the wake of the Heartbleed bug, I wrote that while the U.S. spends more than $50 billion per year on spying and intelligence, pennies go to Internet security. The bug revealed that an encryption program used by everybody from Amazon to Twitter was maintained by just four programmers, only one of whom called it his full-time job. A group of tech companies stepped in to fund it.

Koch's code powers most of the popular email encryption programs GPGTools, Enigmail, and GPG4Win. "If there is one nightmare that we fear, then it's the fact that Werner Koch is no longer available," said Enigmail developer Nicolai Josuttis. "It's a shame that he is alone and that he has such a bad financial situation."

The programs are also underfunded. Enigmail is maintained by two developers in their spare time. Both have other full-time jobs. Enigmail's lead developer, Patrick Brunschwig, told me that Enigmail receives about $1,000 a year in donations — just enough to keep the website online.

GPGTools, which allows users to encrypt email from Apple Mail, announced in October that it would start charging users a small fee. The other popular program, GPG4Win, is run by Koch himself.

Email encryption first became available to the public in 1991, when Phil Zimmermann released a free program called Pretty Good Privacy, or PGP, on the Internet. Prior to that, powerful computer-enabled encryption was only available to the government and large companies that could pay licensing fees. The U.S. government subsequently investigated Zimmermann for violating arms trafficking laws because high-powered encryption was subject to export restrictions.

In 1997, Koch attended a talk by free software evangelist Richard Stallman, who was visiting Germany. Stallman urged the crowd to write their own version of PGP. "We can't export it, but if you write it, we can import it," he said.

Inspired, Koch decided to try. "I figured I can do it," he recalled. He had some time between consulting projects. Within a few months, he released an initial version of the software he called Gnu Privacy Guard, a play on PGP and an homage to Stallman's free Gnu operating system.

Koch's software was a hit even though it only ran on the Unix operating system. It was free, the underlying software code was open for developers to inspect and improve, and it wasn't subject to U.S. export restrictions.

Koch continued to work on GPG in between consulting projects until 1999, when the German government gave him a grant to make GPG compatible with the Microsoft Windows operating system. The money allowed him to hire a programmer to maintain the software while also building the Windows version, which became GPG4Win. This remains the primary free encryption program for Windows machines.

In 2005, Koch won another contract from the German government to support the development of another email encryption method. But in 2010, the funding ran out.

For almost two years, Koch continued to pay his programmer in the hope that he could find more funding. "But nothing came," Koch recalled. So, in August 2012, he had to let the programmer go. By summer 2013, Koch was himself ready to quit.

But after the Snowden news broke, Koch decided to launch a fundraising campaign. He set up an appeal at a crowdsourcing website, made t-shirts and stickers to give to donors, and advertised it on his website. In the end, he earned just $21,000.

The campaign gave Koch, who has an 8-year-old daughter and a wife who isn't working, some breathing room. But when I asked him what he will do when the current batch of money runs out, he shrugged and said he prefers not to think about it. "I'm very glad that there is money for the next three months," Koch said. "Really I am better at programming than this business stuff."

Related stories: For more coverage, read our previous reporting on the Heartbleed bug, how to encrypt what you can and a ranking of the best encryption tools.

Republished from ProPublica. ProPublica is a Pulitzer Prize-winning investigative newsroom. Sign up for their newsletter .



Permalink | Comments | Email This Story








Comment Re: Good and Bad Outcomes (Score 1) 265

Workers who are in positions where they are 'tipped' earn a minimum wage of a little over $2/hour, plus those tips. They pay taxes on those earnings plus an IRS-calculated percentage based on the receipts from their tables, whether they were tipped or not. Tips are an excuse to underpay staff.

The minimum direct wage is about $2/hour; however, the minimum total wage is still $7.25/hour. If direct wages + tips end up less than $7.25/hour, the employer pays the difference so that the employee makes $7.25/hour. See http://www.dol.gov/elaws/faq/esa/flsa/002.htm

Comment Re:Yes, point is to keep adversary out. It fails. (Score 1) 375

When you come back from the bathroom, you want to regain access to your own computer. Think about exactly how you do that. Do you press the power button and reboot, and then enter your authentication credentials into a dialog that you know is your login screen, because you know that every step from boot to login, is intended to protect your interests?

You're stuck there anyways because you can never be sure someone didn't reboot the system, run a keylogger designed to act like the lock screen, and then send your password and reboot the machine.

As the guy you're replying to said, "you know that every step from boot to login, is intended to protect your interests." If you're concerned about someone rebooting the system and running some malware, you should make use of the various features designed to mitigate against that. All PCs these days let you password-protect the BIOS settings, so if you've configured it to only boot from the HD, it's not as simple as an attacker putting in a CD or plugging in a USB flash drive with their keylogger. And for even more protection, you can get a computer with more "enterprisey" features, such as a physical case lock and a chassis intrusion detection switch. If the attacker thinks they'll just open the box up and do a quick hard drive swap or something like that, that's not gonna work. And these days, there's also UEFI Secure Boot. Sure, there are ways to attack all of this, but a BIOS password plus case lock is sufficient for the vast majority of people. If you need more than that, you should probably focus on keeping intruders from getting access to your computer in the first place.

Whether it's user mode per se or not, there are tools to change the behavior of ctrl-alt-delete.

As far as I can tell, that's just a utility that changes the options that are already available in Windows--they're normally controlled via Group Policy. It's not actually running any new code, it's just changing behavior in a way that MS has already allowed. It actually is possible to write your own code that runs when the user presses Ctrl+Alt+Del though; it's called a custom GINA DLL. Of course, if an intruder already has Admin access to install their GINA DLL, it's already too late... The point of Ctrl+Alt+Del is to thwart malware running as an unprivileged user.

PS - The other major thing is that Ctrl-Alt-Delete was originally a DOS-ism that had more to do with dealing with misbehaving, yet not malicious, programs and trying to regain some level of control.

That key combo was selected because no application uses it. Other than that, there's no relation to its use in DOS. Bill Gates has said that he (or Microsoft in general) had wanted a dedicated key for it, but IBM (which was a major keyboard manufacturer at the time) didn't want to add a key for MS. I guess MS eventually had enough clout to get everyone to add the Windows and Context Menu keys, but it wasn't worth changing Ctrl+Alt+Del to use the new keys.

Comment Re:There is more than NYC (Score 1) 397

And? This is about a blizzard that was supposed to hit the US northeast and ... didn't really happen. It was hyped as "Snowmageddon 2015" and instead of dropping a couple of feet of snow it's dropping inches. The weather reports were completely wrong yet again.

Uh, what? It most certainly did happen. Multiple feet of snow. In the US northeast. Where did you hear that it didn't happen?

Communications

Your High School Wants You To Install Snapchat 157

Bennett Haselton writes: They would never admit it, but your high school admins would probably breathe a sigh of relief if all of their sexting-mad students would go ahead and install Snapchat so that evidence of (sometimes) illegal sexting would disappear into the ether. They can't recommend that you do this, because it would sound like an implicit endorsement, just like they can't recommend designated drivers for teen drinking parties -- but it's a good bet they would be grateful. Read on for the rest.
Transportation

Why Didn't Sidecar's Flex Pricing Work? 190

Bennett Haselton writes Sidecar is a little-known alternative to Lyft and Uber, deployed in only ten cities so far, which lets drivers set their own prices to undercut other ride-sharing services. Given that most amateur drivers would be willing to give someone a ride for far less than the rider would be willing to pay, why didn't the flex-pricing option take off? Keep reading to see what Bennet has to say.
Education

2014 Geek Gift Guide 113

With the holidays coming up, Bennett Haselton has updated his geek-oriented gift guide for 2014. He says: Some of my favorite gifts to give are still the ones that were listed in several different previously written posts, while a few new cool gift ideas emerged in 2014. Here are all my current best recommendations, listed in one place. Read on for the list, or to share any suggestions of your own.
Twitter

An Algorithm To Prevent Twitter Hashtag Degeneration 162

Bennett Haselton writes The corruption of the #Ferguson and #Gamergate hashtags demonstrates how vulnerable the hashtag system is to being swamped by an "angry mob". An alternative algorithm could be created that would allow users to post tweets and browse the ones that had been rated "thoughtful" by other users participating in the same discussion. This would still allow anyone to contribute, even average users lacking a large follower base, while keeping the most stupid and offensive tweets out of most people's feeds. Keep reading to see what Bennett has to say.
Cloud

Clarificiation on the IP Address Security in Dropbox Case 152

Bennett Haselton writes A judge rules that a county has to turn over the IP addresses that were used to access a county mayor's Dropbox account, stating that there is no valid security-related reason why the IP addresses should be exempt from a public records request. I think the judge's conclusion about IP addresses was right, but the reasoning was flawed; here is a technically more correct argument that would have led to the same answer. Keep Reading to see what Bennett has to say about the case.

Comment Re:Of course there will be... (Score 1) 171

But that's not a Windows program. That's a Java program and that is the coder's issue not MS. The Windows API that returns the Marketing Name have been deprecated as far as I know.

I don't what distinction you're trying to make between a Windows program and a Java program. Windows is an OS, Java is a programming language. Java programs can run on Windows. And sure, it's a problem with the code, but Java programs are popular in big "enterprise" apps, so MS is especially interested in keeping those apps running. The last thing they want is for some company to not upgrade thousands of copies of Windows because a program that company needs won't run on the new version. "DOS ain't done until Lotus won't run" is a myth; MS jumps through a lot of hoops to make sure that almost all programs that run on an older version of Windows will continue running on the new version, even when the coder did something stupid.

Slashdot Top Deals

Solutions are obvious if one only has the optical power to observe them over the horizon. -- K.A. Arsdall

Working...