Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment: Re:Maybe because security people are dicks? (Score 1) 150

by c (#49734495) Attached to: Survey: 2/3 of Public Sector Workers Wouldn't Report a Security Breach

Security's motto: We break stuff, put ALL the burden on the users, walk away AND we get paid for it!

This is pretty much what happens when "Security" is a separate business group. Security-oriented admin groups can usually manage to balance security versus operational requirements, but if your only job is making things more secure and there's zero penalty for making things non-functional, well... honestly, I'd probably do the same thing.

Comment: Sounds great! (Score 1) 91

by c (#49734445) Attached to: Tweets To Appear In Google Search Results

At least, assuming these tweets are ranked appropriately.

Down near the bottom, with the ad spammers.

But really... what the fuck, Google? The most "useful" kinds of tweets are the ones who reference the authoritative material that you'd want to see instead of any tweet about it. As a means to add to the page rank of good (i.e. referenced) pages tweets might be valuable, but otherwise twitter activity is pretty much the definition of irrelevant.

Comment: Re:it's a C idiom (Score 1) 264

by c (#49643425) Attached to: C Code On GitHub Has the Most "Ugly Hacks"

I'm not sure I'm following. If we're non-POSIX, then what read(2) are we talking about? Also, that sizeof is by definition 1

POSIX defines sizeof(char)==1. But C itself doesn't necessarily *require* sizeof(char)==1, just that char is the smallest non-bitfield type. Theoretically, sizeof(char)==4 could be legit on some architectures. In practice, I doubt there's a non-trivial C program on the planet that would function on such a platform, but it's there.

The *point* of this being that the bug wasn't specifically that sizeof(char)==2, but that sizeof(char) was apparently variable within one trivial function in thousands of lines of code, and that throwing a trivial assertion in front of it was enough to change the value back to what it was supposed to be.

If a no-op changes behavior of your program, then yes, it's either a compiler bug

Exactly. In this case, it was the optimizer losing its shit. I wouldn't try to diff optimized and non-optimized ASM output from the compiler these days, but at the time it wasn't too horrible.

If that was indeed mid-late 90's MSVC++, then that makes it slightly easier to believe, yes ;)

It was still better than g++ on the DEC Alpha around that same time, but that's setting the bar pretty low.

Comment: Re:it's a C idiom (Score 1) 264

by c (#49643061) Attached to: C Code On GitHub Has the Most "Ugly Hacks"

I've been coding in C long enough to know the difference between unspecified/undefined behaviour and bona-fide bugs.

For example, I'm pretty darn sure that a chunk of code such as:


unsigned char inbyte;
read(fd,&inbyte,sizeof(inbyte));

should always read at most the same number of bytes (one byte would be nice, but let's pretend we're non-POSIX, here...). And if you *change* that chunk of code to something like, say:


unsigned char inbyte;
assert(sizeof(inbyte)==1);
read(fd,&inbyte,sizeof(inbyte));

It should *still* read at most the same number of bytes as the first chunk of code. If the second chunk of code reads 1 byte while the previous chunk of code was reading 2 bytes (and, incidentally, bashing the stack while dumping those 2 bytes into a 1 byte variable), I'm comfortable in calling that a compiler bug.

Mid-late 90's Visual C++, in case you weren't aware, was not a good vintage.

Comment: Re:File this under "NO SHIT" (Score 1) 264

by c (#49637107) Attached to: C Code On GitHub Has the Most "Ugly Hacks"

Because it is by design able to access a hell of a lot more than other languages. How many languages have direct hardware access? Or inline ASM code?

Amen.

As a rule of thumb, any code (in any language) that deals directly with hardware and doesn't have at least a few commented hacks should be treated with suspicion. It likely either doesn't work, the hackery is too subtle for mortals to comprehend, or the person writing the code is so clueless that they don't recognize when they've transgressed into writing horrible hacks.

Comment: Why a classroom? (Score 1) 352

by c (#49556931) Attached to: The Future Deconstruction of the K-12 Teacher

So, basically, it's going to be just like school is today, except the teachers will be working remotely?

I suspect that veteran teacher has been doing it so like that he can't get outside of the box and imagine education without classrooms, schools, or even structured classes.

I think the future is going to look a lot more like home schooling (possibly in groups to get around the whole school-as-babysitter issue that allows parent to hold jobs) than anything close to the institutions teachers currently work in.

Comment: Re:Protect the income of the creators or they can' (Score 1) 302

Copyright needs to (I reckon) end with the death of the creator; simple.

Given that we've established that the entertainment industry is a collection of sociopathic asshats, are you quite sure you want to give them a genuine monetary incentive to, say, kill copyright holders in order to plunder their now-orphan works?

Then there's the whole question of figuring out if/when a creator died.

A reasonable fixed term from publication/creation makes the most sense. Emphasis on "reasonable".

Comment: Re:Wait, what? Even in offline mode? (Score 1) 117

by c (#49541915) Attached to: iOS WiFi Bug Allows Remote Reboot of All Devices In Area

34% of users can't tell their iPhones not to connect to a hotspot named attwifi. That sounds like the ability to force connection to a WiFi network to me.

I'm thinking that if a malicious hotspot cycled through the known pre-installed SSIDs like "attwifi", common open SSIDs like "linksys", "NETGEAR", "dlink", "default", etc, plus corporate branded/hotspot SSIDs such as whatever Starbucks or McDonald's use, they could easily increase the vulnerable population to well over 75%.

The Force is what holds everything together. It has its dark side, and it has its light side. It's sort of like cosmic duct tape.

Working...