Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Yes but no (Score 1) 284

I think I understand his point, and I agree in part, but I also disagree. I think security awareness is good, but I think relying on it is bad.

First of all, I think there will always be situations where the security technology fails - social engineering is an obvious example - and ultimately the final barrier is the security smarts of the target. Anything which raises that barrier, even a little, is a good thing. The question, obviously, is whether the benefit is worth the cost of the training.

And secondly, I think in general that making people more aware is always good. People are way too trusting, and that covers the gamut from clicking dodgy attachments to falling for Ponzi schemes. I think it's good to teach people to question more, to think critically, and to be risk-aware. And by "teach people" I mean "starting in primary school".

Comment Re:No (Score 1) 388

Easy, tiger. That's talking about Samba 4.0. NOT Samba4. Confusing, no? AFAICT: Samba 4.0 includes the Samba 3.x functionality AND the Samba4 work (ie: it's a bundled file/print server and AD controller).

From that page you linked to: "Samba 4.0 will be the next version of the Samba suite and incorporates all the technology found in both the Samba4 series and the stable 3.x series."

Comment Re:2012 (Score 2) 414

30 seconds on Google turned up this article

Good grief, that's hilarious. Not the article, the comments. I love the whole thread about "lol so your book is wrong and so are everyone else's but it's a fact that the quran is flawless so you must believe its every word".

I love the faithful. They are the source of endless amusement. I'm convinced if they'd just stop and listen to themselves for _one moment_ they'd realise how ridiculous they are.

Comment Re:Yeah but.... (Score 1) 266

I don't buy that. The article says they tried it again to confirm it really was standard practice, and managed to get the same access.

So either they got the exact same service agent on the phone, or both the hackers and the journalists managed to isolate the two clueless individuals in the call centre who would defy the established practice, or it was standard insecure practice which Apple will now (we hope) address.

Occam's Razor suggests the last is the more likely scenario.

Comment Re:Learn Python The Hard way (Score 1) 247

Yeah, they do. I tried it out, for curiosity's sake. And dear lord, the parser is horrendous. You'll spend 30 seconds figuring out an exercise, and an hour trying to get the damned parser to work. It's like playing an old adventure game. "put the value in the variable". "put the value ON the variable". "use the value with the variable." "oh ffs never mind"

If they could fix that, I'd give it a thumbs up. Until then, god no. It'd put any rational person off programming for life - if that were representative of the coding experience, we'd all be living in padded cells by the age of 22.

Comment Re:A few complaints (Score 1) 576

Your points are thoughtful and well made, and I agree with you.

But I think what the article meant was that using the same measurement, music from the earlier era is less varied than from contemporary work. In other words, for at least this method of analysis, music is getting measurably less varied over time.

Of course you're right that there will be common sounds in any slice through musical history: that's why we even have the term "genre" :) But I think the point is that even taking that into account, older slices show more variation.

Comment Re:If Everything was "security"? (Score 5, Insightful) 206

Language evolves and drifts, but legal definitions do not.

Theft is a crime with a specific definition. Copyright violation is a different crime, with a different definition. They are both criminal actions, but they are _different_ types of crime. Trying to conflate the two is very successful PR by the media industry, since "theft" has negative connotations that "piracy" does not, but they are not the same.

For reference: try to find an instance of copyright violation which has been prosecuted (successfully or not) as theft. When copyright holders start charging violators with theft, I'll agree that the definition has shifted. Until then, they're not the same and should not be confused.

Comment Re:They should take action (Score 1) 90

But then, when the activation fails for a legitimate customer (because it WILL fail at some point), that customer doesn't know that he's paid full rate for a non-functional appliance.

There's not much harm in a "your device appears to be operating in a country on a list of Bad Places. Please call 0800 UNCLE SAM to resolve the problem."

It's not like they're likely to route all their traffic through a proxy in another country to avoid it. That's plausible, but so unwieldy it probably wouldn't be worth the effort. Esp not for a national government.

Slashdot Top Deals

"You need tender loving care once a week - so that I can slap you into shape." - Ellyn Mustard

Working...