Become a fan of Slashdot on Facebook


Forgot your password?
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: Re:Not Exactly.... (Score 1) 422 422

I get how it works. I disagree completely that any access to a third party WiFi network should be up to any permissions model put out by Microsoft, or that I should have to basically implement the kludge so that the network is excluded.

It's a shitty idea, pure and simple.

Comment: Re:It's that time... (Score 1) 226 226

Why? Just make it so that as far as the machines are concerned Gorillas are a subset of humans. And then keep the actual gorillas away from them.

You've got a reasonable point for more advanced machines, but for now I'd just as soon that they also avoid squashing dogs and cats...or, pretty much anything protoplasmic over, say, 5 pounds. Or 4. Slaugher house machines don't need to be intelligent, and shouldn't be. Not until things are FAR more developed.

And, really, wouldn't you just as soon that your car avoided running over that skunk? So if you adopt a variant of the precautionary principle, you can get most of the advantages without waiting for perfection.

Comment: Re: Fricking finally. (Score 1) 214 214

I do not think so.
I think that the big sites are ALL ready for IPv6. Netflix, Walmart, Amazon, etc are all ready.
So, if several of these large ISPs decide to go IPv6 only, they MIGHT lose a few customers, but I suspect not many. In fact, if they announce this together and give others 1 year to get their act together, we would likely see a change on all sites/ISPs.

Comment: Re:Ummmm... (Score 1) 169 169

If the password can be retrieved in an automated fashion then even if its encrypted, everything necessary (i.e. the key) is present, so if the host is compromised the passwords effectively are plaintext as the attacker can simply run the same process to decrypt the password.

And even if you use SSL to check your mail, that doesn't change how the email has been transmitted from one mail server to another, which is often done without using SSL, and most mail servers will fall back to plain text even if they do support SSL because so many out there don't support SSL at all.

Comment: Re:Security (Score 1) 169 169

Not necessarily in these days of social media... A lot of people have Facebook accounts and will have added relatives or people they went to school with...
For your example, you already know the school, so you find out a list of their teachers (often published online) and try them all, and if the attacker knows your age they can narrow it down further... Either way there's a relatively small number of possible answers.

Comment: Re:Now that was cool! (Score 1) 62 62

your alternative method is inferior as the specific request is tech *skills*, which you find on resumes, people speaking to their merits to get hired

not "tech appearing together on message boards," which indicated a whole host of relationships, relationship by skillset being far down the list

the simple fact is there is no perfect methodology so criticizing the methodology for being imperfect is without merit. and in articulating a yet even more inferior methodology in your latest comment i have to assume you're just arguing for the sake of arguing, you're barely trying, you're not serious, and so this useless thread is over


Any programming language is at its best before it is implemented and used.