Become a fan of Slashdot on Facebook


Forgot your password?
Slashdot Deals: Cyber Monday Sale! Courses ranging from coding to project management - all eLearning deals 25% off with coupon code "CYBERMONDAY25". ×

Comment Re:Erm... (Score 1) 151

And how, exactly, do you verify PINs if the network is down but you aren't locking out customers? There are many millions of ATM users on each of the major networks, and every ATM on the network needs to be able to authenticate every PIN. Which is worse, having to update a massive file of account numbers and pins, allowing users to withdraw without pins, or making users go use another ATM (or, God forbid, an actual live teller)? Yes, it's inconvenient to the user, but so is overdrawing your account, and so is having a thief overdraw your account.

Submission + - The Resurgence of C++ and Native Code ( 1

GMGruman writes: "Neil McAllister writes, "Interpreted languages and virtual machines are all well and good, but a new version of C++ signals renewed interest in old-fashioned native binaries." In this blog, he shows why that's a good thing, helping developers do a better job in some areas. But nativist programming has its downsides, too, so developers need to think carefully about which approach they use when."

Submission + - Ask Slashdot

An anonymous reader writes: I love the idea of getting an ebook reader primarily for reading research journal papers, however I've heard bad things about the handling of pdf's of the major ones. I don't particularly care for color, but having an e-ink display and the ability to handle pdf/ps docs without conversion would be major pluses. I'd even be open to a hacked kindle running linux if it was practical. Does any good solution exist?

Submission + - Windows 8 to use the cloud to destroy piracy ( 1

MrSeb writes: "With the latest Windows 8 build (8064) that has been delivered to Intel, it’s clear that the company is taking strides to make sure that its upcoming OS isn’t quit so easy to pirate. For starters, the generic volume license keys that were so easily exploited during the early days of Windows 7 leaks will no longer be an option for pirates. Product keys also won’t be shipped in the prodkey.txt file included in the build packages. Instead, installers will need to retrieve a unique key from a Microsoft web page.

There’s also a good possibility that the recently-surfaced fast booting patent could come into play as well. If Microsoft does indeed have designs on using a remote server to push OS code to systems at boot time, that code would be a very clever place to embed activation-related programming. Even if a crack was discovered, it would be neatly undone during a subsequent start-up sequence — similar to the way Microsoft’s now-idle Windows Steady State could turn back the clock an entire Widows installation after rebooting."


Submission + - Google Related Making Information Accessible? (

vekou writes: "Google just recently released a new browser extension for Google Chrome (Google toolbar for IE) name Google Related. It claims to offer interesting and useful content while browsing the web by contextually scanning the page you are currently viewing and display relevant information (videos, images, webpages) about the page. Perhaps another attempt of Google to scout about what its users are browsing."

Submission + - Canada wants it to be easier to snoop on net users (

An anonymous reader writes: A bill being considered by the Canadian federal parliament includes two clauses specifically to reduce the 'due process' imposed when the police need information from ISPs.

Under the proposed bill, law enforcement officers will not require a warrant to acquire information about internet subscribers from Canadian ISPs.

Sophos security expert Paul Ducklin has criticised the bill saying that it "doesn't even seem to propose that the requests be based on any sort of specific identifier, such as a name or an email address."

"This suggests, in the worst case, that an ISP might be compelled simply to hand over information about all subscribers. No warrant needed, and thus no proactive oversight by the judiciary."

Comment Re:Legally blind != Totally blind (Score 1) 302

The article states that he "is legally blind, with vision roughly 1/100th of that of a person with normal sight." Now, I would assume that that means 20/2000 as opposed to 20/20. Relatively-but-not-entirely-undisgraced former New York Governor David Paterson has 20/400 vision, if I remember correctly, and signed his name like this: I think it's safe to say the man wasn't watching for the video (though he may enjoy listening). You aren't wrong; legally blind is absolutely different from completely blind. But in this case, the distinction is essentially trivial.

Comment Time for some about:config diving (Score 1) 415

Looks like they've gone with graying out all of the URL except the domain name, which seems popular these days. Too bad it's dreadful. I mean, it's not hard to find the domain name in a URL. But when you gray it out, it makes the rest harder to read. So if, like me, you occasionally manually change a URL for whatever reason, it's a pain. Or if you /do/ care whether you're using http or https. Hopefully it's changeable...