Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment What some call malware (Score 1) 149

others call a utility.

MSE doesn't give a damn about Produkey. Every other antivirus I've ran wants to erase it.

I have a program called vfat.com, which was a disk defragmenter for MS-DOS, working only on FAT formatted disks. I have used it hundreds of times for years back in the days of dial-up 2400bps BBS. Now, everybody screams that it's some kind of virus. The damn file predates the Morris worm, and you're telling me that it's a virus, the VFAT virus?

Another program, pskill seems to be on most other antivirus lists. I think it got corrected, but I remember when mIRC was considered a virus because somebody was using it (surreptitiously) for command and control.

Comment There are ads on Sourceforge? (Score 1) 336

Who knew?

Ad Block Plus FTW!

Installers that install much more than what I asked for, on the other hand...

Speaking of bittorrent, I updated Utorrent recently and found out that it really wanted to install Search Protection.

No thanks!

Not that utorrent can't seem to remember where it installed itself last time, (didn't it used to be truly portable???!), but to be installing crap like that without even asking?

Comment My great grandchildren... (Score 1) 662

will most likely never learn to drive.

Fuck freedom.

Look at why we are now required to wear seatbelts despite the fact that air bags are the better reason why we don't get hurt in accidents as much as we used to. The 55 speed limit was all about saving oil. Now the speed limits are all about the safety.

It's all about the safety.

Comment WTF? (Score 1) 124

Flash works. No Script works. Adblock Plus works.

Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:22.0) Gecko/20130329 Firefox/22.0 ID:20130329030904 CSet: 8693d1d4c86d

Now, if you want to crash 64-bit Nightly, this is the way to do it.

http://deshommesetdeschatons.tumblr.com/

Keep scrolling. And it's nice that the crash reports are null and invalid.

Comment Re:I have a Galaxy Note (Score 1) 320

4) can you dial easily with one hand?
5) does it fit in your pants pocket comfortably?

On #4, I use my Note two handed. Which isn't that big a deal. I use Swype, so I'm not tapping out individual keys, and I would still have trouble using Swype with a smaller phone, as my digits aren't wired that way to hold and try to Swype with my thumb. And the previous device I used, a Palm TX, was certainly used two handed, so I really don't have an issue of using it two handed. Even my daughter's GS 2, I have to use two handed, and that's a fairly small phone.

On #5, it fits in all of my pants pockets comfortably, at least the front ones. I'd probably break the Gorilla Glass front if I kept it in any of my back pockets. I tend to break the unbreakable combs somehow, already.

Comment I have a popular name on Gmail myself. (Score 1) 239

I've had Bryan Prices from Canada, Hong Kong, and the various states (including a person in mine!) that forget that they don't own that particular gmail.com address. I have gotten things to do with Juniper, Apple, business loan applications, cable TV and Internet appointments set (it took them over two weeks, but I think they finally realized that they were using the wrong email on that one), frat brothers that think I'm part of their frat (wrong frat, I'm afraid), people sending me pictures of their Jeeps as if I'm in the market. The automated stuff like the Juniper stuff, I just mark as spam. I have called them, but because I'm not a customer, they refuse to do anything about it. Meanwhile, that guarantees that I will never use them for anything. Notifying the mistaken parties can still be an issue, because they don't change their address book, and the next email arrives to me!

Comment Really? (Score 1) 173

'As we move toward the cloud and technology gets easier to use...'

And who is going to administrate the "cloud"? Yeah, it's nicely removed, there is still quite a bit of manual work to be involved even with cloud solutions.

And just who is going to fix his shit when the cloud decides to do a Nemo, or it just evaporates? He really doesn't have a clue.

Comment Ran into this on an Acer laptop. (Score 1) 467

I upgraded the BIOS, I think it had to do with turning on a virtual mode.

Bricked it like nobody's business. Nothing like a blank screen when you turn it on.

My previous desktop was easy to flash, and had a large enough flash chip that it actually kept the old image, and you could boot it so that it would recover. Unless, I'm guessing, that it was so bad that it couldn't do much. Makes me wonder. But it never bricked, and I never had an issue.

Comment 8 character? (Score 1) 538

My 9 character password has been busted for two years now. I now have a system that gives me 13 character passwords that are now different for each site. Unfortunately, not every account, something I've been thinking about. That seems adequate for now, my wife was bitching about how she had to go with the new system when I was trying out Win 8 Consumer Preview since I was using my Hotmail account.

Maybe using 4 "symbols" as it were, but I wouldn't limit myself to seven characters, I'm thinking about adding in a number sequence that not many people would actually know (phone number from the '60/'70s, my first work data entry machine (029 and 129 would NOT be the numbers! :), possibly the now current address of a former home that was only a RR number back then, actually, quite a few of those...), and finally adding something to identify the site to identify the account.

Of course, I always had to deal with the sites that only allowed 8 characters way back then. Some would take more, but the actual password was limited to 8. Sad actually.

Passwords are on their way to being dead. It really is only a matter of time.

I was one of the lucky 250K+ of Twitter that had to reset their passwords.

Comment Re:Simples! (Score 3) 314

No, to be truly secure, you put it in a room with no windows, make sure the computer is unplugged, lock the door with a lock that has no key, and you're done.

This sounds harsh, but when you consider that the biggest problem of securing computers is the user that uses it, accidentally or purposely, just say no to the user.

Slashdot Top Deals

Always draw your curves, then plot your reading.

Working...