Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Is this legal? (Score 0) 700

You know, it may be the case that the Jews in government do look out for each other, but that doesn't necessarily extend to all Jews; in fact, it's just as likely that all members of the government cover each others' asses equally, Jew or not.

Likewise, gang members looking out for each other doesn't extend to them looking out for members of other gangs. The implication you're making is akin to saying black people can't be racist, or that all white people are.

Comment Re:Why (Score 2) 529

Time and time again, posters on Slashdot talk about the 'fictitious' threat of terrorism that government uses as the excuse for encroachments on perceived liberties.

How many people died in terrorist attacks last year? How many died in the hands of various authoritarian regimes?

I think even the most cursory review of history shows which threat deserves more attention.

You, the posters are the reason why an actual coordinated attack within a 'safe' democratic country is news on Slashdot.

We're the reason why coordinated attacks are rare enough to be newsworthy and why rushing in with a gun now counts as a coordinated attack? I think you give us too much credit.

Comment Re:DOS version? (Score 3, Informative) 101

The current firmware update ships as a bootable ISO. Burn it to a CD/DVD (or a flash drive if you can work it out), hold down "option" at boot, and you'll be looking at a DOS prompt in no time. I verified this two days ago when I misread the firmware version on the website and downloaded an updater for the version I already had.

Comment Re:symptom of dumbing down computing (Score 0) 113

No, it's not. Dragging the icon for the image into the icon for the image viewer is exactly the same, in that you're specifying "open this file with that application". Doublie-clicking is most certainly not the same, especially when Windows defaults to "hide known file extenstions" and your malicious application is named "bigboobies.jpg.exe" with an icon that looks like a thumbnail of some boobs. The user sees "bigboobies.jpg", thoughtlessly ignores that no other legitimate images on their system show a file extension, and double clicks it; the malicious application now executes. Hell, if known extensions are hidden, simply naming it bigboobies.exe and giving it a titillating icon would fool 99% of users, even power users.

Here's why:

Typing "image_viewer.exe bigboobies.jpg" would launch image_viewer.exe, which would then tell you the file was not found. Dragging the icon of the "image" to the icon for "image_viewer.exe" or typing "image_viewer.exe bigboobies.jpg.exe", were you not to notice the ".exe" at the end, would launch image_viewer.exe, which would then complain that the file you fed it was not an image. Double-clicking an icon triggers the default action for the file type of the file the icon belongs to; in other words, if it's a sneakily-named executable, it executes it.

Slashdot Top Deals

"Gravitation cannot be held responsible for people falling in love." -- Albert Einstein

Working...