Forgot your password?

Comment: Re:Pick a different job. (Score 1) 548

Comments are a hack to work around the failure to write code which is sufficiently clear and expressive (note that I'm talking about inline comments, not comments used to generate documentation). When I find myself typing a comment, I step back and look for ways to improve naming, or refactor, until the comment is no longer necessary.

Talk about misleading advice. I agree with your premise that the purpose of your code should be apparent through a the use of a meaningful naming convention but that does NOT eliminate the need for comments. Comments should be redundant, they are meant to confirm the obvious so that there is no room to second guess what that section of code is meant to do. Your code may be "clean" and "easy to read" but that means something between jack and shit to the poor PFY who has to bring it into compliance with a new standard. Who do you honestly think is better off? The intern who has the privilege of learning from your immaculate structure while basking in the glow of your brilliance; or the guy who can read what you've done and make the changes he needs to and make it out of the office in time to meet that new blonde from accounting out for drinks?

Comment: Re:Value of physical examination (Score 1) 97

by ComputerGeek01 (#47630233) Attached to: The Doctor Will Skype You Now

The physical examination should never be dispensed with in the long run. But in the case of a routine checkup for someone like myself, mid 20's non-smoking male, it seems like one of those things that is done just because I happen to be there anyway. Maybe the frequency of a physical visit could be cut down to once a year, or every 18 months with this system. It would mean one less potential scheduling conflict for the both of use without completely ignoring my health and if I could double book and have a check-up interview while I'm already away on vacation with the family then I'm all for it. The pointed questions that a doctor asks are the really valuable part of the check-up because something that sets on gradually, like my carpel-tunnel, isn't something that I would ever have noticed until it was far too late. But since my doctor knows what I do for a career and asked that one direct question; I can start to take steps to mitigate the problem before surgery is even a consideration.

Comment: Re:So what? they can be tapped to. (Score 1) 244

by ComputerGeek01 (#47456075) Attached to: German NSA Committee May Turn To Typewriters To Stop Leaks

The difference is that its a lot harder for the NSA to get a microphone into the office of a German agency (and a lot worse for international relations if the NSA did it and the Germans found out) than it is for the NSA to hack into the computers at a German agency from a computer room at Ft Meade.

Even I own a laser mic; I'm sure the NSA has way cooler stuff at their disposal for extracting sound remotely.

Does this whole hipster throw back move to antiquated technology seem ass backward to anyone else? Is it that hard to simply not plug a PC into a network? You're worried about someone with a thumb drive? Fill the USB slots with non-conductive wood glue and let's see what they do then.

Comment: Re:Windows DLL injection attack vector. (Score 4, Informative) 75

by ComputerGeek01 (#47442453) Attached to: Source Code Leaked For Tinba Banking Trojan

Damn it, you're going to make me burn the mod points I have already spent in this thread to educate the other *nix fan boys like you. First of all Windows offers a boat load more process memory protection then most other major Linux distros out there which is why DLL injection is necessary in the first place where as in Linux I can just dump the data I want from any memory page I damn well please once I'm running on the remote system. UAC may have been a bit late to the game but it's here now. However despite this solid protections scheme Windows must still remain functional for developers, so the WinAPI is forced to offer some method of run-time debugging for most processes (it does NOT allow this for all of them; things like csrss and lsass are off limits). DLL injection is accomplished by first locating the load point of the Kernel32 DLL in the target process and then going to the offset where the exported GetProcAddress() and LoadLibrary() functions are and invoking them through CreateRemoteThread(). Before even that occurs though the strings that all three of those functions rely on have to already be present in the remote process, this is done with first allocating the memory with VirtualAllocEx() and then writing to it with WriteProcessMemory(). In order for any part of this operation to be possible the end user would have had to of allowed the infection to enable the SeDebug privilege for the malicious process in the first place. Meaning that at some point the end user f***ed the pooch all on their own without Evil Old Microsoft having done anything stupid. Further more absolutely NONE of this would be in the slightest bit relevant if the information was encrypted in process to begin with and that is the fault of the banking systems software vendor. So get off of your wooden high horse, a well documented API being utilized by incompetent third parties is not an insecure one.

Comment: Re:Wait until those lamers find out... (Score 1) 385

As for batteries -- they don't generate energy.

How is it that batteries work in your little world then? Please, enlighten us. Because here in reality they operate by using a chemical reaction to transfer electrons between two differing metal plates. You could try to argue and say that isn't generating energy, it is simply releasing it. But then I would be unable to help myself from pointing out that energy in fact cannot be created or destroyed.

Batteries != Capacitors;

You're right about solar panels in that they do take up a metric butt-load of space. As for cleaning them, that is a real problem. If only we had the technology to do that automatically. Maybe some kind of wiper blades attached to an oscillating motor to clear away particulates so that light could pass through a transparent medium designed to shield the panels from the wind ... Hmmm ... What technology could we possibly posses that would accomplish this feat of engineering?

Comment: Re:Disclaimer? (Score 1) 346

by ComputerGeek01 (#47376261) Attached to: Goldman Sachs Demands Google Unsend One of Its E-mails

>The problem with that is, is if was sent to your email address, you are the intended recipient. No you're not, when the email was sent by mistake.

I'm having trouble figuring out where to begin explaining how incorrect this statement is. Your argument is intent? OK, let's start there. The users intent was to send an Email. This user intentionally entered real world confidential information into the body of this Email message. Then this user intentionally entered a fully qualified and valid Email address into the "TO:" field of the Emails header and finally they intentionally sent this message to the previously mentioned Email address. Tripping over a power cable is a mistake, everything about this action was deliberate.

Comment: Re:If some idiot leaves a space heater running 24/ (Score 2) 349

by ComputerGeek01 (#47368617) Attached to: Bug In Fire TV Screensaver Tears Through 250 GB Data Cap

Probable old school Slashdot troll, but what the hey, I'll bite. I won't even mention their complete refusal to upgrade our decaying infrastructer because that would just be too easy. When you consume a Kilowatt you are consuming an actual resource. This is a unit of energy that requires a certain amount of fuel to generate. There is actually a potential compounding effect with it's usage since the power company has to plan to over produce in order to prevent potential brown outs. So a rising trend in power usage over a long enough period of time will cause a shift in the power generated by the plant. This is why we except that the do-do running the space heater will except the monetary penalty involved with being a moron.

On the other hand a Kilobyte is an abstraction that is used to quantify data, it is not finite resource. This is not a commodity and the cost of it's existence is covered in the static overhead of the entire operation. There is hardly anything (as far as the ISP is concerned) consumed by its use, and if it is not used then it is not wasted and it's existence adds nothing to their cost of operation.

Comment: Re:what a waste of money (Score 1) 190

by ComputerGeek01 (#47349739) Attached to: NASA Launching Satellite To Track Carbon

Carbon dioxide, however, is the single biggest contributor to the temperature on earth there is. Also, I suspect you're just a troll :-)

No, the sun is still the largest factor determining the temperature on this planet. In fact, I have it on good authority that Carbon Dioxide doesn't generate any energy what so ever and it is in simply a by-product of a reaction that does. Keeping this in mind allows us to explore options beyond just burying crap in the ground.

Comment: Re:Hardware requirements (Score 5, Insightful) 641

by ComputerGeek01 (#46693613) Attached to: Meet the Diehards Who Refuse To Move On From Windows XP

That is not the pain of XP EoL, it is the self inflicted torture by those who refuse to use free and open source software.

It is a shame, but I have no sympathy for those who embrace planned obsolescence.

Alright wiseguy, then tell me what the "open source" solution is to my companies key fob system that periodically runs a hash against itself to protect against code injections, checks against VM's by dialing out of the system to an external client and only runs on XP? Is someone handing these systems out? Are we going to organize a flash-mob to come in and rip apart our walls and rerun the cabling to and from the locks on all of the doors on two separate floors and through concrete flooring while replacing the proprietary locking mechanisms? Who is it that is going to be so generous with their time and reprogram this thing for our 200+ employees? There are in fact some things that your precious open source community does not provide and that are necessary for businesses to meet certain industry standards

Comment: Re:Stop signs and lights everywhere. (Score 1) 364

by ComputerGeek01 (#46638643) Attached to: Your Car Will Tell You How To Hit the Next Green Light
Yeah, more roundabouts are a great idea. Maybe if every ass-hat in an SUV didn't think that "Yield" was a synonym for "close-your-eyes-and-accelerate" then roundabouts might be a decent solution. But as it stands increasing everyone else's stress just because you can't bother to break for a half-second is a stupid idea.

Comment: Re:Customers may benefit... maybe (Score 4, Insightful) 455

by ComputerGeek01 (#46602365) Attached to: Wal-Mart Sues Visa For $5 Billion For Rigging Card Swipe Fees
You're only seeing the face value here, what is interesting is that Visa is being sued for price collusion by an entity that is large enough to follow through with the action. The ideal end result of lower swipe fees for merchants would benefit every business across the board. The only significance of the $5 billion number is that it says Walmart is serious about this and it is not going to settle this out of court, if they had picked a reasonable number Visa would have just payed the money and told them to go away. The goal here is not simply to get the money, it's to lower the fees.

Comment: Re:You know what they call alternative medicine... (Score 1) 517

Then prove it. Show one piece of holistic/homeopathic medicine which does the equivalent of real medicine.

If all I have to prove is that my approach is as effective as the current high cholesterol on the market then I'm pretty confident I could meet your challenge.

"Come one! Come all! Allow Geeks thrice blessed face whacking paddle to reduce your risk of heart attack by up to two whole percent!"

+ - Remote ATM Attack Uses SMS To Dispense Cash->

Submitted by judgecorp
judgecorp (778838) writes "A newly discovered malware attack uses a smartphone connected to the computer that manages an ATM, and then sends an SMS message to instruct it to dispense cash. The attack was reported by Symantec, and builds on a previous piece of malware called Backdoor.Ploutus. It is being used in actual attacks, and Symantec has demonstrated it with an ATM in its labs, though it is not revealing the brand of the vulnerable machines."
Link to Original Source

"No, no, I don't mind being called the smartest man in the world. I just wish it wasn't this one." -- Adrian Veidt/Ozymandias, WATCHMEN