Follow Slashdot stories on Twitter


Forgot your password?

Comment: What about security (Score 1) 145

by andrew71 (#47661091) Attached to: The Quiet Before the Next IT Revolution

I don't subscribe to this rose-tinted point of view, especially if you look at all this beautiful tech from the security standpoint.
Most of the tech we deal with today was originally designed without security concerns. In most cases, security is an afterthought.
So much for sitting back and taking a break.


Intego's "Year In Mac Security" Report 132

Posted by kdawson
from the almost-popular-enough dept.
david.emery notes the release of Intego's "Year In Mac Security" report (PDF), adding: "Mac OS X and iPhones that haven't been jailbroken fare pretty well (although vulnerabilities exist, there's not been a lot of exploitation). Apple does come in for criticism for 'time to fix' known vulnerabilities. Jailbroken iPhones are a mess. The biggest risk to Macs are Trojan horses, often from pirated software."

Bash Cookbook 278

Posted by samzenpus
from the read-all-about-it dept.
Chad_Wollenberg writes "Anyone who has used a derivative of Unix over the past 20 years has used Bash, which stands for Borne Again Shell. The geek in all of us makes us want to extend our ability to rule the command line. To truly master a Unix environment, you need to know a shell, and Bash is easily the most popular of them. Any Unix/Linux/BSD administrator knows the power at your fingertips is fully extended by what you can do within the Bash environment, and all of us need the best recipes to get the job done." Keep reading for the rest of Chad's review.

Comment: Re:What software developers have told me (Score 1) 566

by andrew71 (#15837954) Attached to: The Future of Closed Source Software and Linux

Now, I'll confess that this attitude has been diminishing as Linux eeks its way into the mainstream.

Now, what you call diminishing, I call distinguishing.

One should always understand his very nature, and going against it is always a bad mistake in the long run. That is, of course, provided that it's a good nature, and I guess that's the point in case here.

Any given program will expand to fill available memory.