Forgot your password?
typodupeerror

Comment: Re:Can we stop trying to come up with a reason? (Score 1) 213

by ShieldW0lf (#48198699) Attached to: NPR: '80s Ads Are Responsible For the Lack of Women Coders

Men and women both contribute to creating people.

A mans contribution can be completed in a single night.

A womans contribution requires 9 months, during which time any distraction, disruption or stress can cause the "person creation" process to fail catastrophically.

This is the reason we systematically transform men into specialists instead of men. It is a waste of precious resources to turn a woman into a computer programmer when she's a lot more valuable as a mother.

It's not that women are incapable of being computer programmers. It's that they have more important duties, and when they neglect those duties, the entire human race suffers for it.

At the end of the day, the problem is people like you, who don't care about the fate of the human race as long as you get what you want out of life before you die, and, frankly, the solution is NOT diplomatic in nature.

Comment: Re:android = windows (Score 1) 97

by tepples (#48196219) Attached to: Delivering Malicious Android Apps Hidden In Image Files

Show me a single app that will work on one of these versions but not the others.

Any application that requires Windows XP Mode, SUA, or more than 16 GB of RAM will work only on Windows 7 Pro and Ultimate according to this table. So does any application that is accessed remotely through Remote Desktop.

Comment: Re:android = windows (Score 1) 97

by tepples (#48195899) Attached to: Delivering Malicious Android Apps Hidden In Image Files
If the malware didn't need root to enable itself as a device admin, then you don't need root to disable it. Most Android malware that makes the news is not the alleged "malware" installed by carriers, and besides, that's easily avoidable by buying Nexus or Google Play Edition devices and avoiding VZW and Sprint.

Comment: PPA (Score 2) 97

by tepples (#48195879) Attached to: Delivering Malicious Android Apps Hidden In Image Files

Because that is putting time and effort into developing features to support competitors.

Canonical put time and effort into the Personal Package Archive system, which supports competitors to the official Ubuntu repository. Each PPA is a Debian repository with a public key to verify packages, and a Canonical-managed PKI ties them together. True, a lot of that comes from the Debian project, but Canonical still polished it into PPAs starting in Ubuntu 9.10.

Comment: Re:So you have to install an app... (Score 1) 97

by tepples (#48195783) Attached to: Delivering Malicious Android Apps Hidden In Image Files
Yet because Apple rejects useful applications such as MozStumbler and any web browser that isn't a Safari wrapper, users end up having to deal with a platform that allows use of unsigned binaries without payment of a recurring fee to the operating system publisher. They have nothing to do with each other technically and everything to do with each other politically.

Comment: Showing how they're equally fragmented (Score 3, Insightful) 97

by tepples (#48195735) Attached to: Delivering Malicious Android Apps Hidden In Image Files

My laptop came with Window 8, which has a radically different interface

You could always install Classic Shell, an aftermarket launcher for Windows, to put the S back in Window 8.1 and give you an interface that's closer to Windows 7. Android likewise has aftermarket launchers.

of course I pulled out the HDD, installed an SSD and put Linux on it

Which is like installing a custom ROM on an Android device: there's ABSOLUTELY NO WARRANTY that all peripherals will be supported. I still haven't got my laptop's Bluetooth working in Xubuntu.

Oh, and there's 32-bit and 64-bit

And ARM vs. MIPS vs. Atom.

and Home and Pro and Basic and Ultimate and...

That's more a matter of which OS component repositories you're allowed to access than actual OS fragmentation.

Comment: Re:This sounds rather convoluted (Score 1) 97

by tepples (#48195643) Attached to: Delivering Malicious Android Apps Hidden In Image Files

I don't get why they think people would believe they need to open some random app just to view an image...

Because not all images are single-layer PNG or JPEG. There exist a lot of image formats a viewer for which is not included with all major operating systems. Compare to a common tactic used by Windows trojans: a web site displays a video with an "unsupported codec" and then ships the trojan disguised as a codec installer. Does Windows even come with a PDF viewer?

Comment: Re:Still have to install (Score 1) 97

by tepples (#48195535) Attached to: Delivering Malicious Android Apps Hidden In Image Files

Enabling 3rd party app installation is an all or nothing affair b/c its, well, 3rd parties.

Why doesn't the system provide a mechanism for the user to distinguish between trusted and untrusted third parties? For example, a user ought to have a way to choose to trust Amazon and F-Droid alongside Google but distrust all other APK sources.

Don't sweat it -- it's only ones and zeros. -- P. Skelly

Working...