Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Comment The guy is a squatter (Score 2) 190

If the current owner was actually using the name for his business, I'd agree with the majority of commenters in this thread. Say he had a consulting firm named "WorkBetter, Inc." and had been using it for years with business cards, receipts, and tax records to show for it. That does not appear to be the case here, as he has a list of domains that he's trying to sell. 117 of them by my count, including several with active trademarks and a few Daft Punk-ish variants of work-something.

This is textbook cybersquatting. He bought a whole bunch on speculation hoping to get rich quick, and now wants to cash in his lottery ticket. It's a little too late for him to claim he has a legitimate business use for it.

I know that's not the prevailing opinion here, but he's been squatting on the domain for years without using it. I think the company suing him has a legitimate case. It doesn't and shouldn't matter that he held the domain before the plaintiff registered their trademark; his continued holding of it is squatting.

Comment Re:Infinity (Score 1) 1067

Of course. Then do your check for zero before the division, if your latency requirements can handle it. If either option doesn't meet spec, then your specifications are where the "bug" is...

I kinda assumed that if someone is looking for a CPU to assign a number when dividing by zero, he's not in a job where they're asking him to do low-latency signal processing. VisualBasic is probably a better fit for his career path.. ;)

Comment Re:Simple (Score 1) 1067

sqrt(1^2) does not imply 1, nor does sqrt((-1)^2) imply -1, they both could be either positive or negative: sqrt(1^2)=±1

The last equality should appear as ±1=±1

Congratulations; you've hit on another undefined answer in mathematics and exploited it to make the rest of the uneducated think you're smart.. or something.

Comment Re:Infinity (Score 1) 1067

That is simply false. There are an infinite number of algorithms that might contain the (sub)expression X/X for which zero is a valid value of X. To assume it's a programming error is sheer unmitigated stupidity that I might expect from a mathematician that has never written a real program in his life.

As someone with a degree in mathematics and a degree in computer science (with special academic honors, I might add), I strongly disagree. Fix your damn program to check for a dividend of zero, or at least trap the exception and handle it then. If NaN or any of the infinities are useful in your computation, do it outside the normal math libraries or choose a language that explicitly permits them.

To assert that it's not a programming error is sheer unmitigated arrogance that I might expect from a code monkey who barely scraped by his high-school math courses, assuming you even attended any.

And yes, I've made my living writing programs, many of which benefitted from my knowledge of higher mathematics.

Comment Re:Memorizing site-unique passwords isn't possible (Score 5, Insightful) 267

... password reuse is a larger danger to users than is having a weak password.

The best of both worlds: use a six-to-eight word diceware password for your password manager, and generate a long, random password for everything else.

Comment Re:Redmine is good (Score 2) 144


While Redmine definitely has plenty of plugins and features for "agilism," it's easy to bypass or ignore them. It also allows SSO for Windows users with fallback to user+password, sends change and assignment notices by email, and has a Wiki built in. You can auto-create recurring issues if that's needed (think assigned weekly/monthly tasks), and there's a knowledge-base plugin that we've also found useful. It is project centered, where you can assign subsets of users to projects when they're created, and archive cancelled or completed projects to remove clutter.

Comment Re:Why Force Your Children to Live in the Past? (Score 1) 734

Obligatory The Newsroom opening sequence

I think every U.S. politician should watch this at least once a week, both during session and during their fundraising runs.

Returning to the topic, it sounds like you have until they turn 18 to make that decision. By then, they can consider all the pros and cons and make their own decision, right?

Comment Re:Polycom (Score 1) 95

The Jabra Speak 410 is also an excellent USB speakerphone with feedback suppression. Works well with Lync on Windows or Mac, in my personal experience. This would require someone bringing their laptop into the conference room just to run the VoIP app of your choice, though, but is likely to be a cheaper solution than any Polycom phone.

Comment Re: file transfer (Score 1) 466

I'd be surprised if the drive even spins though. Most of the time when I go to try ancient hardware, the drives don't spin, or spin enough, even though the owner remembers that it was working when they shut it off.

I've heard the fix for that is to spin the entire drive while applying power; kind of nudge it along the platter's axis to get the bearings unstuck. It involves "open-case surgery," where you have the drive out of the case and free to move while you first apply power. Once it starts spinning, you'll want to power down and reinstall into the case so you don't knock it around while it's operating and damage it further.

Comment Re:What are the actual risks to your network? (Score 1) 114

OK, this is clearly a bad thing, but I don't think it means that your private LAN is immediately accessible to people all over the world does it? Multiple routers using the same keys means you could be tricked into logging in to someone else's router without knowing, but that would still require some way of directing your traffic to the impostor's device to begin with, such as DNS hijacking.

Finally, a breath of sanity... Thank you, nuckfuts! A shame this is the bottom thread in the post.. at least when I got here.

There is a huge difference between a host key and a user key. These consumer devices all share the same host key, which is only used by the client to verify that the host you're connecting to is the host you think you're connecting to. This is the key in /etc/ssh/ssh_host_rsa_key for those with access to a Linux shell, and is never encrypted or password protected. How do I know this? Because there's no way to determine what user keys are in a host's authorized_keys file with just an unauthenticated connection. However, when a client connects, the server always sends the host's public key along with a challenge signed by the host's private key.

The host key is only ever used for authentication, never for authorization, which is to say it identifies the server you're connecting to, but in no way grants any privilege to access it. The only risk here that I can think of is a MITM attack. Since the host key is well known, someone could fiddle with your DNS or local ARP tables and make a victim connect to their evil server without the scary "MAY HAVE BEEN COMPROMISED!!!" warning you get when the destination host key doesn't match what's in the known_hosts file.

If someone can paint a more frightening scenario (based on known host keys, not user keys), I'd like to hear it. If you don't understand the difference, don't bother trying.

Comment That sounds cheap (Score 2) 38

I'm sure it's commercially viable, easy and cheap to do. We'll see this in real world applications in about 2 years if all goes well.


But good luck with it. This is the kind of breakthrough that may one day lead to viable quantum computers, teleportation, and other things that are relegated to the SyFy channel for now.

Whoever dies with the most toys wins.