Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Sounds perfect to me... (Score 1) 181

... some teenagers ... wrote in their diaries some fantasy story about blowing up their school

That's thinking small. I have fantasies of blowing up the entire Ministry of Education with a TTC subway car laden with explosives, on November Fifth, wearing a Guy Fawkes mask, playing the 1812 overture.

This is an entirely original idea, by the way.

Comment Overreaction? (Score 1) 181

As far as I can tell (and correct me if I'm wrong) these systems merely inspect public data on the Internet, as any ISP (or perhaps even individual) could, so the only people who should be affected are those who make false and foolish assumptions of security. Obviously, nothing is safe on the Internet in the clear, but it seems to me that this system could well be thwarted by encryption and proxy.

Comment Re:Wonder when MS, IBM and others will publish? (Score 1) 79

The question of course is "Is 4000 good, average or bad?" can't be answered because closed source companies just aren't going to publish this sort of information.

This is part of the reason that OSS is better than closed-source competitors - the bugs are widely-known, and therefore can be more readily fixed.

This is also part of the reason that the quality of OSS is trending upwards.

Comment Re:What about the "CSI Effect"? (Score 1) 517

It's not the CSI effect, it's the "most Americans are stupid" effect.

Honestly, Most can not tell the difference between Fantasy on TV and reality. this is why a jury in a technical case is not a "jury of your peers" unless the jury is compromised of IT and CS people.

This is late, yes, but I couldn't resist: http://xkcd.com/553/

Comment Re:Difficulty In Using (Score 1) 891

Seconded. I am the hacker type, but I generally need a gentle introduction to any particular program or system, before I can become proficient with it. Good tutorials would be especially helpful - highly in-depth technical documentation is useless if I can't tell a widget from a dongle.

Specifically, this applies to source code documentation - one of the key advantages of open source is serviceability, since the source is, er, open (go figure). However, often one has no idea in which file or directory to find a particular function or piece of code, or how it works, or what it in turn uses, &c. Comments are nice, but real, dedicated documentation (like the Documentation directory in the Linux kernel tree, say) would be nicer.

Comment Where's the Fire? (Score 1) 195

Silence the Alarms, I say.

While I am generally quite wary of anything which may invade my privacy, in this case, I am not terribly concerned. Everyone seems to be working themselves into a righteous frenzy over what amounts essentially to a trifle. With no warrant, this bill only allows the acquisition of specific pieces of general information such as name and address, for which there is no reasonable expectation of confidentiality - indeed, little more than could be expected from a telephone directory. A telephone directory is not a wiretap. Likewise, this bill would not allow the acquisition of content without a court order. That said, I am not completely indifferent as to the passing of this bill - I believe that, as always when privacy is concerned, we should proceed cautiously, but not immediately and indignantly strike this bill down as an affront to our privacy.

If you are worried, try:
- IPsec
- Tor
- SSH
- SSL
- GnuPG
etc, etc.

P.S. Mr. Van Loan: A rotary telephone sits atop my desk. I use it regularly.

Slashdot Top Deals

A morsel of genuine history is a thing so rare as to be always valuable. -- Thomas Jefferson

Working...