Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment My last 3 android phones have had this feature (Score 0) 67 67

Taking and transcribing voicemail? My last 3 phones, all Android and going back at least four years, have had this feature. Is Apple really that far behind, that this feature comes out as News, and what's more, implies that they invented it?

Christ, does anyone editing this site actually keep up with technology?

Comment Somehow I can already imagine the threads ... (Score 0) 367 367

... that pile up below this post:

ARRRGH! LENNART POETTERING IS TEH SUX! HANG HIM HIGHER!

Sytem-DDDDD AAAAArrrrgh! Adolf Hitler designed it, with Heinrich Himmler and Ossama Bin Laden helping! We're all gonna die!

A brain-disease has infected all distro makers! Armageddon is upon us!

etc.

Comment Windows 2000 was the last I installed. (Score 1) 262 262

Windows 2000 was the last I installed.

This was around about the times of Photoshop 5.5 and SuSe Linux 5.x and Steve Jobs was upping the Mac with the OS X Unix variant.

How anyone besides Gamers and professionals who need specialised Windows-only software would use Windows today is totally beyond me. Windows IMHO combines the downsides of OS X (vendor lock-in) with the downsides of Linux (flaky hw support) and has nothing to offer that OS X, Linux/Ubuntu or Chrome OS can't offer faster, cheaper, freeer, more relyable and/or better.

How MS remains to be relevant is quite amazing. Although I do have the lastest Xbox 360 and all those dirt cheap top-notch games that you can get out of the bargain bin for it. It is pretty near, I have to admit. Anyhow ... MS Office as a subscription? WTF? I don't get it. Seriously.

Comment Re:systemd is the best init system for FreeBSD. (Score 1) 367 367

Personally I'm toying with the idea (literally testing stuff in VMs) of moving my stuff to FreeBSD or OpenBSD because of systemd wiggling into most Linux distros. I've been using Linux for about 18 years, so I have some knowledge of the inner workings, and I've generally been a Debian guy but moved to Ubuntu 3 years ago for rather trivial reasons.

When Unbutu comitted to systemd I figured I'd go back to Debian on the servers (leaving desktop-ish things to Ubuntu) but with Debian throwing in the towel my servers might move to FreeBSD... and I'll start toying with OpenBSD for the firewall.

Comment Re:MenuChoice and HAM (1992) (Score 2) 270 270

The other absolutely amazing thing they introduced in Windows 95 was the shortcut.

By forcing people to use them, you allowed any combination of multiple links to the same file in any location on your system. It made it so much easier for people to accept a concept like the Start Menu, while the actual programs were stored elsewhere.

It also had the upside of not making it easy to delete or lose files when clicking on or dragging items in the GUI.

Comment Poppycock! (Score 2) 77 77

This really is a load of crap. Extract a bunch of fairly obvious stratagems from a received text, an English translation of generally dubious worth, and apply it to cyber warfare.... unsurprisingly it fails to stack up particularly well. Sunzi was almost exclusively fixed on the idea that armies were controlled by single entities and that virtually all actions under taken by them had cost, and thus could be factored in a set of trade-offs, or expert application of game theory, before game theory was a thing. It was insightful at the time, to say the least, it can still be useful to state the more obvious strategems of any conflict but to claim relevance today where the agents existiing in dramatically different contexts is weak sauce indeed. Sunzi, in particular, would be horrified that any engagement would essentially exist in perpetuity, if the sunzi bingfa (art of war) was indeed written by one person, then he would be horrified by the layout of modern cyber warfare, and would certainly be quite unable to add anything to the idea that one may have to defend against any number of actors, each of which potentially using different strategies at virtually no cost..

Comment All your data r belong to us! (Score 3, Informative) 262 262

As another noted on the Red Site:

"We'll know everything* about you and we'll be snitching (including your BitLocker key) whenever and/or to anyone we think is in our interest to. Starting Aug 15"[1]

In particular, this is more than a little disturbing.

"But Microsoftâ(TM)s updated privacy policy is not only bad news for privacy. Your free speech rights can also be violated on an ad hoc basis as the company warns:

In particular, âoeWe will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary toâ, for example, âoeprotect their customersâ or âoeenforce the terms governing
the use of the servicesâ."

As with all things Microsoft, use at your own risk. Only now, the risks to you personally are higher than ever before.

[1]https://soylentnews.org/breakingnews/comments.pl?sid=8667&cid=215390#commentwrap

Comment Told you so. (Score 1) 160 160

Don't computerize the simple mechanical parts of a car. Just DON'T. You're collective playlists aren't worth the inevitable police and attacker control and surveillance of our cars.

No, you and you, you can't outsmart them. You can't be God King of Koding and Do It Right. There is always a way, if you permit freaking Turning machines to control your vehicle, for someone to take control.

A machine, a successful, elegant device that occupies the lowest possible fail state, is one that has as few moving parts as possible. Any turing box, by which I mean a programmable computer, that connects in is a complete failure of design if it is not utterly necessary. Brakes, steering, locks. and acceleration have been mechanical systems for over a century and a half. No need to interface hundreds of computers, sensors, and telematic holes into something that already WORKS.

Security

Remote Control of a Car, With No Phone Or Network Connection Required 160 160

Albanach writes: Following on from this week's Wired report showing the remote control of a Jeep using a cell phone, security researchers claim to have achieved a similar result using just the car radio. Using off the shelf components to create a fake radio station, the researchers sent signals using the DAB digital radio standard used in Europe and the Asia Pacific region. After taking control of the car's entertainment system it was possible to gain control of vital car systems such as the brakes. In the wild, such an exploit could allow widespread simultaneous deployment of a hack affecting huge numbers of vehicles.

Comment Re:Fail2ban (Score 1) 157 157

I like fail2ban. I started installing it on servers when I discovered a firewall getting so many SSH connections it couldn't hold anymore.

The only reason I found that was happening is my Nagios instance threw up a flag upon no longer being able to SSH into the firewall.

If you monitor for stability you will see security issues. If you code for security you will see stability. They tend to go hand in hand.

"Is it really you, Fuzz, or is it Memorex, or is it radiation sickness?" -- Sonic Disruptors comics

Working...