Follow Slashdot stories on Twitter


Forgot your password?

Comment: Again? (Score 4, Informative) 91

by darkain (#49733925) Attached to: Tweets To Appear In Google Search Results

Am I the only one that seems to remember that GOOGLE ALREADY HAD THIS FEATURE years ago. Back in the earlier days of Buzz, your Buzz account could be connected to a Twitter account. Google would pull friend's tweets on a particular topic, and show them intermixed with search results. This was just another one of the brazzilion tweeks Google has added/removed/fuckedwith/whoknowswhatelse over the years, and I'm quite honestly surprised to see it make a comeback.

Comment: Re:Don't convert needlessly (Score 2, Interesting) 200

by darkain (#49691243) Attached to: Ask Slashdot: What Is the Best Open Document Format?

All of the "X" variants of MS Office documents stand for "XML" - that is, the documents are stored in a series of XML files inside of a ZIP file that is renamed to formatX (docx, xlsx, etc). There is no real need to even have Windows or Office installed to index these documents. Just write up a basic script to extract the ZIP file and parse out the related XML documents. Note: this isn't as trivial as it sounds at first, though. This would assume that Microsoft's XML structures (yes, plural), had an easy to comprehend standard that was logical to work with. It'll take a little digging but totally doable.

TLDR: not by choice, my company heavily relies on Excel documents, and this is how I ended up managing them, importing their contents into a SQL database for indexing and other purposes .

Comment: Turbo (Score 2) 48

According to Passmark, this chip is clocked at 1.2GHz with a "Turbo" speed of 2.9GHz. In other words, it can do very short bursts at nearly 2.5x the clock speed, then have to scale back down to normal because of the heat it would generate. So while this thing looks awesome in synthetic benchmarks, how would it seriously handle in a sustained computing environment?

Comment: Adobe? (Score 1) 199

Yeah, right. We've also heard that from Adobe about their Creative Suite switching over the Creative Cloud. All we've gotten instead is more and more new bugs in each release, and without failure, new DRM failures with each and every release. How are we supposed to trust Microsoft with the same thing, when they already royally fucked up Windows 8? How can we trust them to not simply pull an Adobe, and spend all their time developing new DRM that constantly fucks up, instead of new actual features and functionality for end users?

Comment: File this under "NO SHIT" (Score 5, Interesting) 264

by darkain (#49635559) Attached to: C Code On GitHub Has the Most "Ugly Hacks"

Seriously guys. File this one under "NO SHIT" - Of course C is going to have the most ugly hacks. Why? Because it is by design able to access a hell of a lot more than other languages. How many languages have direct hardware access? Or inline ASM code? And does the word "hack" in the code really make it an "ugly" hack? Seriously? I wrote a micro-kernel for an ARM platform about a decade ago, and there was an assload of inline ASM code and direct pointer manipulation to access the underlying hardware, there is no other way to do this. Yeah, I'm sure the word "hack" appeared countless times in my code, because that's the general term we use. That doesn't make it "ugly" or bad by any means.

Comment: Re:wait, what? (Score 5, Informative) 89

by darkain (#49566661) Attached to: New Zero Day Disclosed In WordPress Core Engine

Re-read the summary. It is a little more complex than you may realize.

Attacker inserts malicious JS code into a comment box.
JS code is viewed and thus executed by site's administrator.
JS code was specifically crafted to modify/edit PHP files on the server - a common function of WordPress, allowing the live editing of templates and plugins.
JS code then requests the newly modified PHP files from the server.

Comment: Encryption? (Score 1) 77

Most everyone is commenting about better security software, firewalls, VPNs, encryption, and all that shit. Isn't the article about employee training?

For example: call up a bank. Try to get the balance on someone's account. This is a task well within reason for the person on the other end of the phone, ASSUMING it is your account, right? That's the point of employee training. The human element is the weakest element of any security system. What training do these employees need in order to not leak out your private information to any random person who calls in? Is simply stating your name on the account enough? Is there more verification steps required?

An example of social engineering security policies at various companies to the extreme that can happen:

Comment: Hurricane Electric (Score 1) 390

by darkain (#49517665) Attached to: Why the Journey To IPv6 Is Still the Road Less Traveled

I'm in this weird bubble where I live. I'm currently on the city owned cable internet here in Tacoma WA. This ISP has some really shitty upstream connections depending on what site I'm trying to access. I also have Hurricane Electric's IPv6 Tunnel Broker service on my router itself, so my entire network has public IPv6 over IPv4. The route to the HE server in Seattle WA (~35mi away) seems to ALWAYS be stable. HE's backbone is also rock-solid world wide. Sites that are IPv6 enabled, I generally have a much better / faster / lower latency route to them, simply because my ISP has shit IPv4 routes leaving our local region.

Some major companies that are or are not IPv6 enabled:
google: yes
facebook: yes (interesting note: they always have :face:b00c: in their IPv6 addresses)
wikipedia: yes yes
amazon: no
AWS anything: mostly no (they have some half-assed thing on their load balancer service that sucks ass, but nothing else)
slashdot: no
twtter: no no

"If you want to eat hippopatomus, you've got to pay the freight." -- attributed to an IBM guy, about why IBM software uses so much memory