Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Ugh (Score 1) 564

PC's have a totally different tool set than mobile devices. This is what's making mobile devices so popular. If you could incorporate a touch screen and a camera into PC's, then load Android onto them in a way that makes sense (it would take some real work), that would go a long way to making desktops more appealing to the average user. As a hacker, though, I think I still prefer my Ubuntu desktop for the time being. But that could change. We'll see.

Comment Just one note (Score 2) 132

This is not a problem unique to cryptocurrencies. This particular incident is one that can be chocked up to kids not using php properly. Bad website implementation is not the fault of any cryptocurrency, be it one for pomeranians, or human beings.

Comment Re:I am ... (Score 1) 186

Actually, I have it on good authority that Bitcoin was written by time traveling aliens from Sirius 2. The same people that built the pyramids, and gave mankind astrology. The block chain was first implemented by the Inkas, and passed down for generations on tree bark. There were millions of copies of the ledger, and mining was done with toothpicks and lasers. If you look at the numerological value of the name Satoshi Nakamoto, you get 9. Osiris was also 9. Coincidence? I think not. I think all you non believers just need to wake up and realize that the alien gods are now among us, and they're terraforming our financial system! Make no mistake my friends, they're in with the Illuminati, and they know where Lora Palmer is buried, because Satoshi Nakamoto is an alien who knows everything! Why do you think the NSA need to spy on us like that? Why do you think Alex Jones is buying evil death robots, and keeping them in his basement? Seriously. I don't know how people can look at the overwhelming evidence for all of this, and come to the conclusion that we're not like, totally, in serious trouble.

Comment Here's what I did (Score 1) 408

My father is brilliant, but he's not a computer person. So the last time a virus took out his system, I treated him like any other non technical user on my network. I limited his ability to do damage to himself and others. NT user permissions in Windows 7 are useful for this. You can adjust anyone's group permissions, be they on a single PC or an Active Directory. It's not difficult to learn how to use these things, if you're not a systems administrator; and my dad hasn't had a single problem with viruses since I set it up for him. Remember, when you're running any PC, a virus needs admin permissions to do real damage. Deprive your users of admin rights, and (while you may still have issues with viruses) you're not going to fry your PC.

Comment Re:Not accurate information (Score 1) 195

I don't really see where the problem is. You shouldn't be using horrible kluges to track your campaigns anyway. Even if it did kill your ability to track who is opening what... who fucking cares? The fact that a person opens an email has absolutely no bearing on whether or not they're going to buy it. Email marketing is still interruption marketing, for the most part. It's flawed in its basic premise. Innovation is the only way to stay in business long term. Stay ahead of the curve, it's more profitable. Adapt, or die.

Slashdot Top Deals

"No matter where you go, there you are..." -- Buckaroo Banzai

Working...