Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment: Re:Is that proven? (Score 1) 396

by thogard (#49557199) Attached to: Debian 8 Jessie Released

Lots of useful things can happen even if most file systems don't mount.

I have systems in data centers half way around the world. I want sshd to wake up as soon as the networking is up. Once the whole thing is up and stable, I want the initial sshd to be killed off and the normal production one started. The sshd started early uses no shared libraries and uses a config that lets root login. This means that if the machine is screwed up, I can get in if things are broken without depending on the lights out management card or some other virtual console hack.

Remember that on very large systems there are always errors on a disk and some systems are large enough that their mean time between failures is always now. That doesn't mean the systems aren't still useful in production.

Comment: Re:Here's to hoping they don't find oil (Score 1) 152

by RockDoctor (#49556105) Attached to: Yellowstone Supervolcano Even Bigger Than We Realized

What is the solution,

Popcorn.

As in "Oh, Yellowstone is erupting. I'll get some popcorn to watch until all the news broadcasters are dead. Then get on with my life."

A Yellowstone supervolcano would be devastating for the United States and most of Canada. At home, we might even get some ash fall (but we get that from Iceland already). Wouldn't be good for crops for the next couple of years, but we could probably use a 50% population drop. It'll be back in less than a century. Fuck up comms ofr a couple of years too, but the world will go on.

Comment: Did iTunes ever work on XP? (Score 1) 366

by RockDoctor (#49556021) Attached to: iTunes Stops Working For Windows XP Users
It destroyed my daughter's machine when I got her an iMP3 player one Xmas and she tried to install iTunes as instructed. Obviously she hadn't taken advice to back up her school work to the file server, so that was my weekend fucked.

Never considered an Apple product since, and only touched them on occasions (to move them out of the way).

Comment: Re: Figures (Score 2) 366

by thogard (#49540877) Attached to: iTunes Stops Working For Windows XP Users

I find it odd that there isn't a well known man in the middle SSL-> TLS 1.2 proxy for XP that can fake things enough to work for most programs.

The entire XP TCP/IP stack can be replaced and there are replacement WINSOCK versions for XP.

With the large number of programs that talk to specific hardware that simply won't run on anythign newer than XP, combined with how many machines are still functional for their users, it will be around for a very long time. Remember that Microsoft has only dropped free support for the consumer version of XP and paid support (and some free support) will be going on for another 4 years.

Comment: Re:Behavior that is rewarded is repeated .... (Score 1) 332

by Wrath0fb0b (#49539947) Attached to: Drone Killed Hostages From U.S. and Italy, Drawing Obama Apology

What's the morality of saving one hostage taken now if that leads to 10 more kidnappings laters? Just because those hostages are nameless and faceless (until they get taken hostage and possibly become headless) does not mean that their moral interests are any less real.

And, of course, the current hostage now was a hypothetical hostage in the previous iteration. Back then, he would have said "bomb them so they don't have an incentive to kidnap me later". Now he says "pay them $10M so I go free" even if that money goes to funding a kidnapping later, whereas the victim of that future kidnapping would prefer otherwise.

Comment: Behavior that is rewarded is repeated .... (Score 5, Insightful) 332

by Wrath0fb0b (#49538971) Attached to: Drone Killed Hostages From U.S. and Italy, Drawing Obama Apology

If kidnapping Westerners and keeping them within 50 feet of you grants you immunity from airstrikes, that increases the incentive to kidnap westerners.

There's no winning the hostage game -- if you ignore the hostages you lose the PR war, if you play to the hostages then you encourage future kidnappings. It's a lose-lose game. The same is seen for the millions of Euro paid by various European nations as ransom -- some of that money goes right back into funding more hostage-taking missions.

There is no way to time-consistent way reconcile the interests of the current hostage in not getting bombed/beheaded with the interests of future hostages in not being kidnapped in the first instance. It's a repeating game, we cannot evaluate each iteration separately but at the same time we cannot evaluate them all together.

Comment: Darwin by proxy (Score 5, Interesting) 607

by timholman (#49531733) Attached to: Bill To Require Vaccination of Children Advances In California

This Wednesday, however, the bill passed that committee after its authors tweaked it, adding amendments that would expand the definition of home schooling to allow multiple families to join together to teach their children or participate in independent study programs run by public school systems.

I hate to say it, but maybe this is for the best. Unfortunately, what may be needed to kill the anti-vaxxer mindset once and for all is for a whole classroom of unvaccinated children to come down with measles or polio or smallpox or whooping cough, and for several of them to die.

Horrible? Yes, but the parents who have bought into this insanity are endangering everyone, not just their own children. Some of these people are quite literally proclaiming that vaccines have never worked, and that it is only improvements in hygiene that have resulted in the elimination of most deadly childhood diseases. A good cold dash of reality is the only cure. It is just a damned shame that some innocent kids will have to pay the price.

Comment: Re:So what? (Score 1) 397

by Puff_Of_Hot_Air (#49529251) Attached to: Using Adderall In the Office To Get Ahead

Your argument was effectively "it must do something bad! It's a stim! They make your heart asplode!", so I shot the specific. You've reduced it to, "Well it must hurt SOMEHOW," which is the same fallacy as the trade-off concept.

No, my argument was that anything that increases your blood pressure and/or your heart rate is bad. I made the mistake in assuming that this specific drug also did this, and I'm happy to accept being wrong on this point. The rest of my argument is that you can't claim something is safe over the long term (lifetime) without actually studying it over a lifetime. You may have convinced yourself that the risks are minimal, but without even clinical trials, I find it hard to be so confident.

Comment: Re:So what? (Score 1) 397

by Puff_Of_Hot_Air (#49528889) Attached to: Using Adderall In the Office To Get Ahead
It's good thing if Phenotropil doesn't affect your heart rate or blood pressure (but my comment on no-safe level of the typical ADHD drugs still stands). At the same time, you don't know what other health effects long-term usage may cause. I can't find any studies of the sort you would find for a drug that has gone through clinical trials. If this was going to fix something that was wrong, I'd view the risk as pretty moderate, but to take it to "be smarter" looks pretty dumb.

Comment: Re:So what? (Score 1) 397

by Puff_Of_Hot_Air (#49527907) Attached to: Using Adderall In the Office To Get Ahead

Phenotropil is the only safe stimulant I've found

Define safe. How do you know that it is safe? Have there been long term studies following users over their life span? The answer is that they haven't, so you can't know that it is safe. There may be no obvious harmful short term affects; but this is not the same as safe. Cigarettes are quite safe for a very short term view.

All stimulants; including Methylphenedate and Dex at normal prescribed doses cause an increase in blood pressure and resting heart rate. Long term the research is showing us that this increases your risks for dementia and heart disease. Don't kid yourself, there is no safe stimulant.

Comment: Re:So what? (Score 2) 397

by Puff_Of_Hot_Air (#49526681) Attached to: Using Adderall In the Office To Get Ahead
There are in fact controlled studies showing that these stimulants enhance learning, remembered detail and a host of other things that are useful in both the academic and work setting. BUT. They are stimulants, there are side affects that will have a negative affect on your long term health. For people with ADD etc, it's probably worth it to have a normal life, but for a normal person you are greatly increasing your risk of heart disease and dementia (due mostly it would appear to the impact on your resting heart-rate and blood pressure). These risks are the same if your ADHD, but most medicine is a trade off. Here we are trading quality of life in the late stage (and length of life) for quality of life through the early to late stages. It'd be awesome if we could create drugs or other mechanisms to resolve these issues, without the negative health affects, but I've yet to see them. Anti-depressants are worse.

There is a reason why your doctor will try to get you to eat healthy and exercise, rather than go down the drug route. Sometimes you can achieve just the same benefits, and it won't be killing you

Comment: Re:How about basic security? (Score 2) 389

by thogard (#49517613) Attached to: Why the Journey To IPv6 Is Still the Road Less Traveled

Scanning IPv6 isn't as hard as you make it out to be. I look at it more like using dictionary attacks rather that sequential scans. The 1st 64 bits are known if your after a specific target. It is also trivial to know if a given /64 is even used. A tree of all known used /64 shouldn't take long to create.

The 64 bits of the host is a bit different. They could be fully random (which is rare) or they are allocated based on mac address or statically assigned. The mac addresses means that 40 bits of the address are known if you know anything about the targets buying habits (i.e. they tend to buy Dell or Polycoms). That leaves 16 million guesses which can be reduced based on the vendor or the product version you which you intend to exploit once you find a target.

You may not be looking for one in 2^64, but a network of devices that all may have many addresses and you might only need one.

The static address assignment space isn't very large as well as netadmins like using :: when they type in addresses so they are unlikely to be random. That means their 1st network will be 0::something and their second is likely to be 0001::something. Oddly enough you might find they skip ::a and use ::8,::9,::10 as well or use something that match with their existing ip v4 address so things like ::192:168:1:1 is very likely.

All these things mean that Monte Carlo scans of a specific IPv6 allocation on a remote network is well within the ability of small time hackers.

Throw in a firewall that isn't filtering IPv6 properly and that will result in remote exploits of internal devices.

If a 6600 used paper tape instead of core memory, it would use up tape at about 30 miles/second. -- Grishman, Assembly Language Programming

Working...