Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Businesses

The Languages of "The Office" 147

Venkat Rao has followed up his analysis of office dynamics as reflected in The Office, which we discussed last month, with one titled Posturetalk, Powertalk, Babytalk and Gametalk. The Office is running a little thin of meaty examples to make his points in delineating the ways of PowerTalk — the language of the Sociopaths — so Rao reaches out to Goodfellas, Wall Street, The Boiler Room, and Making Jack Falcone. The entire analysis illuminates and is illuminated by a diagram of the disparate languages that Sociopaths, the Clueless, and Losers speak to each other and among themselves.
Data Storage

A Short History of Btrfs 241

diegocgteleline.es writes "Valerie Aurora, a Linux file system developer and ex-ZFS designer, has posted an article with great insight on how Btrfs, the file system that will replace Ext4, was created and how it works. Quoting: 'When it comes to file systems, it's hard to tell truth from rumor from vile slander: the code is so complex, the personalities are so exaggerated, and the users are so angry when they lose their data. You can't even settle things with a battle of the benchmarks: file system workloads vary so wildly that you can make a plausible argument for why any benchmark is either totally irrelevant or crucially important. ... we'll take a behind-the-scenes look at the design and development of Btrfs on many levels — technical, political, personal — and trace it from its origins at a workshop to its current position as Linus's root file system.'"
Security

Hackers Get Free Parking In San Francisco 221

Hugh Pickens writes "PC World reports that at the Black Hat security conference this week, security researchers say that it is pretty easy for a technically savvy hacker to make a fake payment card that gives them unlimited free parking on San Francisco's smart parking meter system. 'It wasn't technically complicated and the fact that I can do it in three days means that other people are probably already doing it and probably taking advantage of it,' says Joe Grand. 'It seems like the system wasn't analyzed at all.' To figure out how the payment system worked, Grand hooked up an oscilloscope to a parking meter and monitored what happened when he used a genuine payment card. Grand discovered the cards aren't digitally signed, and the only authentication between the meter and card is a password sent from the former to the latter. Examining the meters themselves could yield additional vulnerabilities that might allow someone to conduct other kinds of attacks, such as propagating a virus from meter to meter via the smart cards or a meter minder's PDA."
Debian

Submission + - Building and Running Debian User-Mode-Linux

An anonymous reader writes: Patrick McFarland, the famous Free Software Magazine author, has written a short guide on how to build a Debian User-Mode-Linux image from inside Debian, and also how to connect it to your LAN and the Internet securely. Now, all we need is a beowulf cluster of UML virtual machines.

Slashdot Top Deals

Work is the crab grass in the lawn of life. -- Schulz

Working...