Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Break down the problem (Score 2) 267

On face value...

It sounds like you're trying to achieve two separate goals here :

  1. 1. To limit time spent on websites that are potentially not work-related / time wasting / etc
  2. 2. To block websites that are potentially dangerous to your network (infected)

To implement the bosses suggestion you need a different system to handle each and a way to categorise the blocked sites - or a system that allows more fine grained control.

Stepping back a bit...

More importantly though, your boss should want to demonstrate that he trusts his employees to use their work time sensibly. By blocking websites for reasons other than network security and creating little bureaucratic procedures to unblock them you send a clear signal to the employee that they are not to be trusted with a basic resource like web browsing. Expect them to respond in kind.

Comment No Algorithm No Nothing (Score 1) 2

Am I missing something here or is this question utterly ridiculous. It says, here is my encrypted buffer encrypted with an unknown "algorithm" which, for all we know could be an XOR with a one time pad that only he has?

You want us to evaluate your algorithm then give us the damn algorithm!

Comment Re:medical services need a billing time limit (Score 2) 570

I have only questions :

Why do you Americans put up with this awful service? Why is it legal for medical providers to behave in this way? Who is looking after the interests of the consumer to ensure they are not ripped off? Who is regulating the market so that it remains healthy allowing proper price discovery instead of the outright fraudulent practices that you have described? What do you pay your taxes for?

This puts America in an entirely new light for me. I am genuinely disgusted.

Comment Open Wifi over Tor (Score 1) 184

How about open wifi over Tor - that would allow you to share but avoid problems associated with liability for actions done on your connection and an ISP would have a job proving you were sharing their network capacity too.

All you need is a router that supports multiple SSID's and segmentation of them, a couple of clever firewall rules and Tor's Transparent Proxy support.

Comment Re:MOD PARENT UP! (Score 3, Insightful) 123

Except often it goes like this:

NEWB: I have . How do I solve it?
List doesn't reply within 10 minutes.
NEWB: Look, I have to have this fixed by Monday. How do I solve it? If you don't solve it for me then I have to move to .
List doesn't reply within 10 minutes. NEWB gets angry
NEWB: Its such a simple issue. I can't belive nobody can solve it. (Oh the irony). Bump bump bump.

Don't expect support-contract-like behaviour from a list - remember they're volunteers, there's no "SLA" and they don't work for you.

Some simple steps for success: Make the effort to properly describe your problem and the steps you took to try and solve it. Make doubley sure you're posting to the correct list - many projects have development and user lists. And always be polite.

Submission + - Big Brother is WWWatching You (youtube.com)

bool2 writes: A fantastic 6-minute video rap on YouTube by Rap News 15, takes a light hearted look at the surveillance state, guest starring George Orwell and even mentions TOR. Well worth a watch. (You really do need to RTFA to disqus this ;-) )

Submission + - People Shown a Fake iPhone 5 Claim it's "Way Better" (geekbeat.tv)

phonewebcam writes: "Oops! "The Jimmy Kimmel Live show took to the street with an iPhone 4S, but told people it was an iPhone 5 to get their opinions. We don’t know how many thought it was worse, but as you can see from the video plenty of people fell for it and started talking about how much better it was. One guy who even claimed he has a 4S went on and on about how much better the new iPhone 5 was.""
Open Source

Submission + - GCC Code-Base Being Converted To C++ (phoronix.com) 3

An anonymous reader writes: The GCC compiler is being rewritten in C++ by Google. Currently this leading open-source GPLv3 compiler is written in C90 but developers have been converting the source language to C++. The cited rationale includes: C++ is a standardized, well known, popular language, C++ is nearly a superset of C90 used in GCC, The C subset of C++ is just as efficient as C, C++ supports cleaner code in several significant cases, C++ makes it easier to write and enforce cleaner interfaces, C++ never requires uglier code, and C++ is not a panacea but it is an improvement.

Submission + - Google To Face Questions Over UK Tax (techweekeurope.co.uk)

judgecorp writes: "Google is likely to face questions from British MPs over tax avoidance in the UK. The company paid only £6 million in tax on £395 million, by routing its UK revenues through Ireland, and paying most of them to a subsidiary in Bermuda. The scheme is legal, and Google has questioned why it should pay more tax voluntarily — but the Treasury Select Committee is expected to call it — along with other large firms — to give evidence"

Submission + - CAPTCHA: Why it's terrible and some potential user-friendly alternatives (roarc.co.uk) 1

An anonymous reader writes: I was Ironically foiled by the very subject matter of this article by Slashdot's submission form. CAPTCHA puzzles are a necessary evil to prevent us all from an inbox full of viagra. However, they're inconvenient, inaccessible (for visually impaired users) and machines are getting better at solving them too. How can CAPTCHA puzzles be made more relevant, user-friendly and future-proof? Will they even matter any more in the future? I'm an Undergrad Artificial Intelligence Student and these are my thoughts.

Submission + - You can't bypass the UI formerly known as Metro on Windows 8 (networkworld.com) 1

colinneagle writes: The final build of Windows 8 has already leaked to torrent sites, which is giving the propellerheads a chance to dig through the code. One revelation will probably not sit well with enterprise customers: you can't bypass the don't-call-it-Metro UI.

Normally, you have to boot Windows 8 and when the tiled desktop UI (formerly known as Metro) came up, you had to click on one of the boxes to launch Explorer. Prior builds of Windows 8 allowed the user to create a shortcut so you bypass Metro and go straight to the Explorer desktop.

Rafael Rivera, co-author of the forthcoming Windows 8 Secrets, confirmed to Mary Jo Foley at ZDNet that Microsoft does indeed block the boot bypass routine from prior builds.

He also believes that Microsoft has blocked the ability for administrators to use Group Policy to allow users to bypass the tiled startup screen. There had been hope that Microsoft would at least relent and let corporate users have a bypass, if only for compatibility’s sake.

Slashdot Top Deals

Single tasking: Just Say No.