Forgot your password?

Comment: Re: Why did they pick such a bad buzzword? (Score 1) 98

by aix tom (#47674077) Attached to: Gartner: Internet of Things Has Reached Hype Peak

Dunno about you. But mine must have skipped a bug fix or something. Because ever so often I go into the kitchen at night, open the fridge, look into it, wonder "what the hell am I doing here? I'm neither hungry nor thirsty at the moment, why did I have the urge to look into the fridge? Is it the old hunter-gatherer gene that prompts me to look at my food source location, to see if any interesting prey has shone up? This is madness!!!!", then I close it again and go back to bed.

Comment: Re:Didn't we just see... (Score 1) 97

by aix tom (#47628651) Attached to: The Doctor Will Skype You Now

The major problem probably is people behind corporate or private firewalls, or on NATs, or behind proxies, or other things that prevent them from being a "server" that the other side can see directly over the internet.

So network-wise a "third party server" that has no such restrictions might always be necessary for those www-but-not-really-internet connected people so that their machines can talk to another. Of course if one of the participants is "really" on the internet that participant could run the server part.

Comment: Re:Put in a separate table (Score 1) 62

by aix tom (#47623709) Attached to: Oracle Database Redaction Trivial To Bypass, Says David Litchfield

Ideally, the payment processor is the only one who has the hash, the merchant passes the hash they made from customer data on to the processor.
The payment processor doesn't even need to have the CC#. They just need the hash.

And where does the customer store that data? Or the printing company that prints the number on the credit card?

Also, if "the hash is all that is needed" when sending something to the payment processor, then you would have the same problems in the long run when you "store the hash" that you have now when you "store the credit card number".

Comment: Re:Meeh (Score 1) 402

by aix tom (#47587859) Attached to: Comparison: Linux Text Editors

Hey, the Outlook Options Dialog has one named "Other" instead of "Misc.", which is basically the same in "dumbed down language" ;-)

(And every time I have to use THAT at work, I have to search through "Preferences" -> "Email Options", the "Mail Setup" and "Mail Format" Tabls, because the things that are sprinkled through them don't seem to follow any kind of logic on what is where.)

Comment: Re:"Just let me build a bridge!" (Score 5, Insightful) 372

by aix tom (#47518183) Attached to: 'Just Let Me Code!'

I agree, and that is actually a pretty good example on how it could/should work in IT also.

You have an architect or an engineer to make the general plans, then split that into chunks the individual construction workers can handle, and then let them do their job. On top of that you have some sort of infrastructure specialist, who might not know much about bridges, but has determined that there is a traffic bottleneck at point X that needs a bridge.

I would be perfectly happy to be either the architect or the construction worker in a project, but (for projects larger than a sawhorse) those two people SHOULDN'T be the same person. I that sense I sometime would also like to scream "Just let me Code!" instead of dragging me into all sorts of management meetings where people just sit around going "Say, wouldn't a bridge be nice?" First decide THAT you want a bridge, then decide WHERE you want a bridge, only then come to me to be the architect and get someone else to code, or get an architect that then gets me to code.

But in IT a lot of unnecessary overhead is caused because people call big meetings of construction workers before having even decided if they want a bridge or not.

Comment: Re:Derp (Score 2) 168

by aix tom (#47485335) Attached to: New Mayhem Malware Targets Linux and UNIX-Like Servers

Well, I cut down from ~50 SSH login attempts per minute some days to basically ... looks up the logs ... four such attempts last month.

What I found: No matter how secure your lock is, when you have one, big, red, secure, lock on your stuff, which people know is active, people will try to pick it. On the other hand, when there is not one, big red, secure lock, but thousands of identical looking little, grey, secure locks, and the attacker would first have to try every one of them to see which is even active, then 99.999% of the script kiddies don't bother long enough to even find the lock.

So I moved my SSH stuff to another port. Doesn't help against any "real" attacker, and doesn't really add any security, but it DOES cut down on the noise in the logs.

Comment: Re:Pairing? (Score 1) 236

by aix tom (#47480587) Attached to: Nearly 25 Years Ago, IBM Helped Save Macintosh

It is pretty hilarious however about all these kids complaining about MS Office. With the setup above MS Office is only available for Mac, for Windows 2 or 3 you would need WordPerfect instead since Microsoft had no office suite to run on their own OS.

As single applications MS Word, Excel and Powerpoint were available for Windows at that time, and even some time before that. The same way that MS Word, Excel and Powerpoint were available for Mac before. Only the "marketing gimmick" of selling all three programs in a bundle called "MS Office" was started a little over a year earlier for the Mac versions (in August 1989) as a "Limited Time Promotion" originally, before they decided to turn it into a regular product, and then also made available a Windows version of the bundle. (November 1990)

FORTUNE'S FUN FACTS TO KNOW AND TELL: A black panther is really a leopard that has a solid black coat rather then a spotted one.