Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Oh Boy! (Score 1) 120

Given the current state of internet-focused writing, with the brutal drive to churn out as much clickbait 'content' as possible as fast as possible, with a side of SEO fuckery, I suspect that adding analytics capabilities to books will... perhaps not... be the most helpful development in literature.

ONE CLEVER TRICK TO SHOW HOW SHALL I LOVE THEE, NEW PARADIGM; LET ME COUNT THE 5 WAYS

1. I can think of no way in which this could possibly compromise the quality of the TITS literary experience.
2. Let us not forget that we are at the forefront BREASTS of a new publishing paradigm.
3. Electronic distribution promises to free BOOBS authors from the shackles of the traditional publishing industry.
4. It's an agile and disruptive way of making JUGS money through the process of creative destruction.

(below the jump)

5. The end.

Submission + - Whatever happened to Sanford "Spamford" Wallace? (arstechnica.com)

Tackhead writes: People of a certain age — the age before email filters were effective, may remember a few mid-90s buzzwords like "bulletproof hosting" and "double opt-in." People may remember that Hormel itself conceded that although "SPAM" referred to their potted meat product, the term "spam" could refer to unsolicited commercial email. People may also remember AGIS, Cyberpromo, Sanford "Spam King" Wallace and Walt Rines. Ten years after a 2003 retrospective on Rines and Wallace, Ars Technica reminds us that the more things change, the more they stay the same.

Comment Re:Offshore hosting. Game, set, and match. (Score 4, Insightful) 208

er, that's why they are getting ISPs to block the routes to the sites, rather than taking the sites down.

They already forced ISPs to do it for child porn, then the courts enforced blocks on "pirate" sites because the child porn filters proved that it was technically possible, next step (previously announced, due to come in soon) they are forcing every UK ISP to implement porn (_legal_ porn) filters.

And now it's "block stuff that isn't porn/child-porn/illegal-under-copyright-law, but we don't like it anyway". No surprise.

Whenever a controversial law is proposed, and its supporters, when confronted with an egregious abuse it would permit, use a phrase along the lines of 'Perhaps in theory, but the law would never be applied in that way' - they're lying. They intend to use the law that way as early and as often as possible.

http://yro.slashdot.org/comments.pl?sid=169254&cid=14107454

And the punchline is we're still surprised every time the ratchet turns tighter. Every. Fucking. Time.

Comment Re:Donkey Kong Anyone? (Score 1) 283

The third annual Kong Off will run this Friday through Monday.

Lots of places to play even if you're not competing.

Denver, CO: The 1-Up (official Kong-off location)
New Hampshire: Funspot
Portland, OR: Ground Kontrol
Vegas: Pinball Hall of Fame (might not have Donkey Kong, but it sure is fun.)
SF Bay Area: Pacific Pinball and High Scores, and many more smaller spots.

Who's missing from this list? Where's your town's reboot of the vintage arcade?

Comment Re:They printed off assembler (Score 1) 211

I remember that. For whatever reason 3d0g would get me out of it. I was just a kid and had no idea what to do with the gibberish that the assembler would spit out at me. I just knew how to get out and back to my prompt.

CALL -151: Think "65536-151" - jump to $FF69, which was the monitor ROM entry point.

3D0G: 0x3D0, "Go": Run the code that DOS put at location $03D0. I believe it was a 4C BF 9D, as in, JMP $9DBF, which was the DOS 3.3 entry point/warm start routine.

Damn, I'm old. After a long and convoluted ride through the IT world, I got to retire early because I spent my early teenage years messing around with that sort of thing. It was pure luck that I got my hands on the right machine at the right time, developed a love of computing at a time when home computers were regarded as nothing more than means to store recipes (mom), do taxes (dad), or play games (kids).

Anyways. Thanks, Apple guyz, for putting a disassembler into ROM. It's only been in the past few years that I realized just how much of an impact that comparatively minor technical decision had on my life.

Comment Re:Age Discrimination? (Score 1) 173

Xest,

I really thought the same thing, but found out that
life doesn't always turn out how you think.

I excelled and prospered, for 20 years. From dev to Senior,
to team lead, Architect, Dept lead, division leader and CTO.
Including sw dev, it ops and heavy, heavy doses of security.

And then ... 40.

And it is really like your life-gem has expired.

"You're really great, but we just don't hire anybody over 40,
  and certainly no techs over 35 ...".

There is not even anyone to argue with, just flat rejection.

So I wish you luck with your career. Hope it works out for you.

Cellphones

Leaked Manual Reveals Details On Google's Nexus 5 177

Features of Google's next Nexus phone have finally been outed, along with confirmation that the phone will be built by LG, as a result of a leaked service manual draft; here are some of the details as described at TechCrunch: "The new Nexus will likely be available in 16 or 32GB variants, and will feature an LTE radio and an 8-megapixel rear camera with optical image stabilization (there’s no mention of that crazy Nikon tech, though). NFC, wireless charging, and that lovely little notification light are back, too, but don’t expect a huge boost in longevity — it’s going to pack a sealed 2,300mAh battery, up slightly from the 2100mAh cell that powered last year’s Nexus 4. That spec sheet should sound familiar to people who took notice of what happened with the Nexus 4. Just as that device was built from the foundation laid by the LG Optimus G, the Nexus 5 (or whatever it’s going to be called) seems like a mildly revamped version of LG’s G2."

Submission + - (Ex-)CIA analyst writes insider study of Counterterrorism Center

guanxi writes: (Spoiler: It turns our their jobs are even more bureaucratic as most of ours; in fact, some ask if the U.S. Intelligence Community (IC) is too large to function efffectively.) CIA analyst and sociology Ph.D. candidate Bridget Nolan suggested to her superiors that she write her dissertation on her workplace. They said no; she said yes; Bridget won. She had to quit the CIA, but now her study is in the public domain. Imagine a workplace where "ordinary conversations ... involve a kind of competitive one-upsmanship, "in which intelligence officers ‘out-correct’ and ‘out-logic’ each other in the course of routine conversation to the point where any increased accuracy in what has been said no longer seems meaningful." Maybe that doesn't take much imagination.

Comment Re:2015: Terminator2 robots created to kill previo (Score 1) 149

This reminds me of SF short story, where people came up with idea of robotic doves (birds) acting as police and paralysing people who wanted to commit murder. But they had to adapt to do the job properly - to detect intent even in most ruthless killers. Soon they started to prevent people killing insects. After that, it was not possible to switch off TV set. And solution for that was to create self-evolving robotic killer hawks to catch the doves... anybody knows what was the name of the story, cannot find it now?

You're looking for Robert Sheckley's 1953 short story Watchbird , via Project Gutenberg. There was a TV adaptation in 2007's Season 1, Episode 6, Masters of Science Fiction.

Great read.

Comment Re:Maybe, but . . . (Score 1) 174

You should treasure the fact that you work in an org. where people care enough to even try!
If you are smart, cynical and cunning, (strongly recommended for security professionals!),
you can channel this into a benefit for you, your group and the whole company.

If you "Deputize" the eager-beavers, then it gives you a lot more eyes and ears.
Yes, sadly, you will have the annoying "I Just Read ...." know-it-alls, but even if
the involvement is in reality, an illusion, you still get more back than you invest.

With, of course, the concept of responsibility, focus, and "handover" ...

"Thank you for bringing this to our attention, you are, indeed, so-cool,
and now we can take it further, leaving you to get on with the things the
company actually pays you for ..."

The best example I've ever seen of this, is the Starling speech to the
troopers in the Silence of the Lambs.

A small barrier to entry, to keep out the assholes, is also advised.
A monthly, unpaid, evening meeting for the "security" associates,
with some feedback, news, updates and a doughnut, keeps things
running well.

In the end, as Corporate Security, you can either act like an occupying army,
or a police force that operates with the support of your users.
Treat your users like shit, and they will notice, and they will not have your back.

Of course, this is no guarantee that if you treat them well, they won't
stab you in the back anyway, but ... as a security person, you already know
that you will get to see the worst that people have to offer, ... anyway.

The really cynical would point out that if you really were, an occupying army,
then you should be smart enough to build up your "cadre" of supporters,
without visible points-of-protest, and for "counter-intel" usage ...

Comment Re:No Shit, Sherlock (Score 5, Insightful) 174

Actually Man-in-the-Middle transparent proxies, which intercept
and monitor SSL/TLS traffic, are now standard in most corps.
You don't get a browser alert since the corporate "fake" CA
is pre-installed as trusted in your browsers by the corp's IT.

So, yes, basically ... there *is* no encryption and they look
at everything.

Oh! And using Cisco "policy based routing", or WCCP2 or
other networking mojo, you cannot decide to skip the proxy,
from your client.

And ... using Deep Packet Inspection, the protocol will not
just be matched versus the destination port, so your genius
attempts to ssh to your external server running on tcp/443,
will not only be blocked, you will be flagged and tagged.

Solution? Just use your own equipment with either built
in 3/4G connections, or just tether across your personal
phone.

Caesar and Rome ...

Slashdot Top Deals

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...