Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:The dirty way (Score 1) 695

Spoken like a person who has little practical experience with CONSUMER GRADE small gas engines. Most of these generators have extremely poor oil control, and aren't designed with such long continuous operation in mind. After these gennies have clocked a couple hundred hours, they WILL burn oil, and quite a bit of it. Read your owners manual, and it will probably warn you to check the oil every few hours of operation - this isn't just CYA put in by the lawyers, it's because it will begin burning oil very early in its lifespan.

The little 2 stroke generators, you never have to check the oil on. Premix, and you never have to worry about oil levels.

Comment Re:tips (Score 1) 695

The biggest problem, beyond attempting to power everyone else who is on the same gang of transformers, is that when the power comes back on, it will be out of phase with your generator.

Because your generator's governor is nowhere near precise enough to hold a steady 60hz, even if you're lucky enough to be in phase the instant it switches back on, you're almost guaranteed to be 180 degrees out of phase in seconds.

Hilarity ensues.

Comment Re:Our website got hit by a AV2k9 redirect issue (Score 1) 353

Typically this is done via a vulnerable webapp, rather than an exploit of the underlying webserver.

Old versions of various blogging programs are particularly vulnerable - old Greymatter and MovableType versions come to mind immediately. But I imagine there are many other, smaller, niche products that are just as vulnerable but don't get the same kind of attention, so exploits can fly under the radar.

Comment Re:MS patting themselves on the back (Score 1) 353

IE does NOT completely stop driveby downloads yet. Holes that allow them are being patched regularly, but they are by no means dead. Most of the zero-day exploits found in the wild these days are driveby type holes - all a user has to do is browse a legitimate website with a sketchy ad network, or better yet, a legitimate website that's been compromised to include a hidden iframe. Something is installed silently, typically avoiding UAC through a privilege escalation exploit. Not that anyone has UAC turned on, anyway. And most home machines are so sloppily patched that exploits from 2 months ago will still work. Assuming the autoupdater isn't still stuck prompting the user for SP1, in which case... they're already hosed.

Comment Re:And this is a good outcome? (Score 1) 90

Honda, however, used a ridiculously small number of key cuts through the late 90's.

I had a '94 Acura Integra, which had those wonderful Honda locks. When it was totaled, I bought another Integra (a '96). My old keys were a perfect match for the new car, and also for my roommate's Accord, and with a little jiggling would work on the Prelude that replaced it. That Prelude is broken into nearly every night - not even a case of motor oil is safe in the trunk.

Comment Re:Some Math (Score 3, Insightful) 300

Well, there's three reasons I can see.

This company probably didn't have an international calling plan of any sort, so they were stuck paying whatever obscene rate the local phone company charges for international calls, a la carte.

Also, the phreakers probably had multiple lines in action at any given time, so it wouldn't have taken too terribly long to rack up a large number of minutes.

Lastly, HUB probably didn't notice that anything was going on, until they got the paper bill in the postal mail. With a monthly billing cycle, plus an extra two or three weeks to receive the bill after the end of the cycle (and then a few weeks past that for the accounts payable clerk to bring it to the attention of the owner), I can imagine that this slipped by unnoticed for a long time.

Comment Re:Unions aren't the answer (Score 1) 715

I am good at my job. However, I am not a good bargainer. I am not a good negotiator. I am not good at groveling and begging my boss for a raise/better benefits/better hours.

I would much rather pay union dues to have someone else bargain for me, someone who is good at that sort of thing.

Comment Re:Getting Old (Score 2, Insightful) 443

So you buy a VHS (or beta or Video2000.. 'tis the 80's, after all), get home, and then curse the heavens that The Corporate Man is keeping you down by not allowing you to magically play back that same video on both TVs, just for the pathetic excuse they bring forth that you would need a 2nd VCR? .. probably not. You'd just eventually get another VCR.

Actually, back in those days, it would be trivial to split the video signal coming out of the VCR and run cables across the house to the second TV(or lazier/cheaper yet, use the RF output for 1 tv, and the composite output for the second TV). I know many people who did just this to avoid buying a second VCR, back when they were still expensive enough for it to matter. The major difficulty was that you couldn't control the VCR from the other room, but the FBI warning and previews gave you plenty of time to press play and walk across the house, get some popcorn, etc.

Now, with modern consumer electronics, it is equally trivially possible to copy your entire movie library onto some networked storage, and play them back from a device anywhere on the network, thus only needing 1 Bluray drive for the house. The only thing in the way are the artificial limitations imposed by DRM.

I guess my point is that how we view these things has not truly changed. There is no "changed mindset that came with going digital"; what can be trivially done with inexpensive consumer electronics is all that has changed.

Google

Submission + - A Publisher's Guide to Fighting Google News

NewsCloud writes: "After acquiring the Tribune Company for $8 billion, Sam Zell said:

"If all of the newspapers in America did not allow Google to steal their content for nothing, what would Google do?" he asked. "We have a situation today where effectively the content is being paid for by the newspapers and stolen by Google, etcetera. That can last for a short time, but it can't last forever. I think Google and the boys understand that."
Yet, the newspapers have left the content wide open. Here are nine ways to lock down the content of a Web site to stop Google from sending you all that traffic."
Music

Submission + - iTunes to offer DRM-free music from EMI

grif_mcrenolds writes: "That's right, Apple has stuck a deal with EMI to offer the entire catalog of EMI tracks without DRM, and encoded in high quality 256k AAC. Steve Jobs has expressed his distaste for DRM in the past, and this is something fans have been requesting for a long time. The agreement sent a shockwave throughout the industry, and in response Microsoft is also offering the EMI catalog DRM free in their music store. Will the rest of the industry follow suit?"
Handhelds

Submission + - Palm Fesses up to Linux Treo Plans

An anonymous reader writes: At its Analyst and Investor meeting today, Palm officially acknowledged that it is developing a new smartphone software platform with Linux at its core, and that it plans to introduce Treo smartphones running the new platform as soon as this year. As expected, Palm's new Linux platform will include a Palm OS 5 (aka Garnet) compatibility layer on top of a Linux kernel, thus forming a bridge to enable the thousands of developers — and numerous Palm OS applications — to support the new platform. 'We expect [the new Linux platform] to improve reliability and performance and stability of our Palm-based product and give us much more flexibility from a platform perspective,' CEO Ed Collagan said. 'For example, today it is not possible to do simultaneous voice and data product on Palm; we needed this functionality to be able to modernize the underlying core of that platform,' he added. The company will continue to support Windows Mobile, alongside its new Linux platform.
Operating Systems

Submission + - system i lowers price - try to survive

An anonymous reader writes: IBM is attempting to compete with modern intel based systems by lowering the price of the system i (previously known as AS/400 then renamed iseries). Consider the limited choices of AS400 software, lack of staff who understand how to run AS400 and interface with other systems, and dim future of the platform. Is IBM attempting to catch up on a battle that was lost years ago? http://www.eweek.com/article2/0,1759,2112801,00.as p?kc=EWRSS03119TX1K0000594
Security

Submission + - Video: Hacking the Cisco NAC - NACATTACK

An anonymous reader writes: Two security researchers were able to hack the Cisco NAC solution by exploiting a fundamental design flaw. In this video they illustrate how they worked towards this discovery and give us some exploit details. It is not their intention to simply release a tool, they want the audience to understand how Cisco NAC works and why it is not as secure as Cisco wants us to believe.

Slashdot Top Deals

So you think that money is the root of all evil. Have you ever asked what is the root of money? -- Ayn Rand

Working...