Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Abolish it. (Score 1) 154

by Trevin (#45895493) Attached to: EU Copyright Reform: Your Input Is Needed!

There is no explicit mention of a copyright in the document itself, but the authors have posted this on their home page:

Copyright Notice: We don't think much of copyright, so you can do what you want with the content on this blog. Of course we are hungry for publicity, so we would be pleased if you avoided plagiarism and gave us credit for what we have written. We encourage you not to impose copyright restrictions on your "derivative" works, but we won't try to stop you. For the legally or statist minded, you can consider yourself subject to a Creative Commons Attribution License.

Comment: Bayesian Mail Filter (Score 1) 190

by Trevin (#44721831) Attached to: Ask Slashdot: Speeding Up Personal Anti-Spam Filters?
I've used bmf via procmail on my ISP shell account for years, and it was extremely reliable and accurate. As an added bonus, it automatically forwarded spam to uce@ftc.gov.

When my ISP discontinued the use of procmail filters, I moved it to my home computer and configured two filters in Evolution: the first one to auto-remove mail marked by my ISP as suspected spam, and the next to pipe the mail through bmf and remove it if it tested positive for spam. When I say "auto-remove", I mean it's moved to a spam folder where I can double-check it in case false positives get through.


Comment: I'm not bothered by break-in attempts (Score 1) 241

by Trevin (#41186965) Attached to: Ask Slashdot: Where To Report Script Kiddies and Other System Attacks?

I watch my daily security logs from time to time, but the only remote login attempts I see are my own. I can attribute this to several layers of security:

  • I'm using a dynamic IP address.
  • Access to my home network is gated through my router. Any incoming SSH connection is directed to a specific IP address on the inside, which is only configured when my computer happens to be running Linux.
  • ACL's on the router prohibit SSH connections from everywhere except specific source subnet's I've opened up, and some of those (like work) are only open at certain times during the day.
  • I'm subscribed to my Linux distributor's security updates, and apply them on a regular basis.

I won't claim that it's perfect protection, but one of the best things you can do to secure a system is to shut out all access by default and then only open tiny pinholes for the specific connections you need.

Comment: This means very little to me (Score 3) 121

by Trevin (#41129937) Attached to: Inside the Business of Online Reviews For Hire
I've seldom trusted consumer reviews, not because they might be fake, but because "consumers" often lack enough experience with large enough numbers of competing products for their opinions to hold any weight. When I'm looking for reviews of a product, I want professional reviews from journalists who are dedicated to researching the genre.

Comment: Easily worked around (Score 1) 126

by Trevin (#40429949) Attached to: Biotech Report Says IP Spurs Innovation

The problem with claiming "innovation" in the pharmaceutical industry is that they can easily bypass existing patents simply by tweaking the processes or non-essential ingredients in creating a drug to make it just different enough to claim it as a different product. That doesn't really help society at all. The rate of discoveries of "high social value" has not risen significantly in the presence of patents. See Boldrin & Levine: "Against Intellectual Monopoly", Chapter 9.

Comment: RAID + bacula (Score 2) 304

by Trevin (#39535797) Attached to: Ask Slashdot: It's World Backup Day; How Do You Back Up?

I have been using RAID for many years — RAID-1 at work as I only have two drives and don't need much storage space, and RAID-5 at home. A couple of years ago when I upgraded my computer at work, I downloaded at least three different backup systems to try out. The goals were simplicity of use, keeping historical versions of files, and relatively low storage space.

After setting up bacula, I never bothered with the other backup applications.

I found bacula to be highly flexible, adapted very well to the set of many virtual machines I use, and is the easiest to maintain. I just set it up once (or after any major re-partitioning) with a specific list of files and directories to back up or exclude, then practically forget about it. It's saved my files a number of times already from accidental deletion or overwriting, and I used it once for a full restore at home after upgrading my computer including a new RAID array.

At work my excess hard drive space is enough to store all my full and incremental backups locally, but I also have it back up critical files to a corporate NFS server. At home I use LTO-4 tapes, which provide plenty of backup storage for over 2 terabytes of data; and whenever it runs a full backup I take the used tapes off-site for extra security.

Single tasking: Just Say No.