Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:accesibility standard: no javascript (Score 1) 287

I'm currently working on a couple of government projects that must adhere to the latest accessibility standards, and they include this little doozy: no javascript.

Completely, and utterly false. WCAG 2.0 (i.e., the latest accessibility standard for Web technologies) does enlist Javascript as a supported technology, and provides several techniques to successfully meet the criteria.

Comment Re:HTML *was* simple (Score 5, Informative) 298

Remember when it was ok to use a "b" tag, and no one scoffed? How about table layouts? It's funny, the new standards aren't always better.

  1. 1) Download the NVDA screenreader
  2. 2) Learn about the problems induced with your comment
  3. 3) Spread the word!

If you still think it's actually not better, sorry, but you should have 10 blind persons hit you with their canes...

Comment This is just wrong (Score 1) 1260

E.g., if you take basic set theory and the set of real numbers to analyse the problem:

0.99999... is the last element of ]-infinity, 1[
where as 1 is the first element of [1, +infinity[

and ]-infinity, 1[ intersected with [1, +infinity[ is the empty set...

Comment Re:Online Apps Suck (Score 1) 350

Who has been asking for all these electrical applications? I keep reading about the freakin' "ELECTRICITY!!!" and am just not impressed. I wouldn't trust anyone's electrical platform with my company's tasks.

As many people have mentioned, once the electricity goes down, no more electric anything. I want my apps, my tasks and my work all under my control on my local manpower. There are uses for electrical applications but to rely on them for business, private tasks or to store anything that lack of access to would cause a work stoppage is a bad idea.

Now... get off my lawn!

Security

Submission + - Damn Vulnerable Linux

Scott Ainslie Sutton writes: "Enterprise GNU/Linux Resource Linux.com have highlighted a newly created GNU/Linux distribution named Damn Vulnerable Linux, built upon Damn Small Linux. The distribution, headed by Thorsten Schneider, aims to deliver the Operating System in such a way that it allows Security Students first hand insight and hands on experience with Security issues within GNU/Linux in order to teach them protection and mitigation techniques The project's website describes the distribution as 'the most vulnerable, exploitable Operating System ever' and it's true, the developers have ensured that it contains outdated, ill-configured, flawed code and contains GNU/Linux 2.4 Kernel which is known to have many exploitable avenues in itself. Damn Vulnerable Linux's website can be viewed here."
Programming

When a CGI Script is the Most Elegant Solution 256

An anonymous reader writes "Writing local Web applications can be quick, easy, and efficient for solving specific Intranet problems. Learn why a Web browser is sometimes a better interface than a GUI application and why experienced Web developers find themselves struggling to learn a GUI toolkit, and descover that a simple CGI script would serve their needs perfectly well, if not better."
Security

Hacker Defeats Hardware-based Rootkit Detection 126

Manequintet writes "Joanna Rutkowska's latest bit of rootkit-related research shatters the myth that hardware-based (PCI cards or FireWire bus) RAM acquisition is the most reliable and secure way to do forensics. At this year's Black Hat Federal conference, she demonstrated three different attacks against AMD64 based systems, showing how the image of volatile memory (RAM) can be made different from the real contents of the physical memory as seen by the CPU. The overall problem, Rutkowska explained, is the design of the system that makes it impossible to reliably read memory from computers. "Maybe we should rethink the design of our computer systems so they they are somehow verifiable," she said."

Slashdot Top Deals

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...