Forgot your password?

Comment: Re:min install (Score 1) 221

by geminidomino (#47970517) Attached to: Outlining Thin Linux

Ubuntu is actually a very poor example, since it's one of the oldest offenders of just the sort of thing the guy's complaining about: Things like resolvconf, for example, have no place on a server (It's for helping the machine transition between nameservers when it changes networks) but it still installs on every -server install (at least as of 12.04)

Comment: Re:Too Bad (Score 1) 106

Bernadette is maybe the most well adjust and "normal" character on that show, with exception of maybe Penny.

A grown woman who can't be bothered to learn how to manage her household budget or maintain her car comes across as the most "well adjusted and normal." That's even sadder than the parade-o-parodies that makes up the rest of the cast...

And don't give me any of that "plight of the economically disadvantaged" stuff as a crap excuse . She can afford the bog-standard closet full of double-hex-digit pairs of shoes and "girls' shopping trips" and MMOGs (because they realized that there was a stereotype they hadn't played for cheap laughs yet).

Comment: Re:The problem... (Score 1) 385

by geminidomino (#47931527) Attached to: Torvalds: No Opinion On Systemd

That may be intentional. In fact they confirm it is. What better way for an attacker to cover his tracks after a successful break-in then being able to credibly corrupt the logs.

Have none of these people spent even a week on the administration side, FFS? Change "an attacker" to "a malfunctioning process" and, all of a sudden, you want it to be recoverable so you can figure out WTF went wrong so you can fix it.

Comment: Re:Simple set of pipelined utilties! (Score 1) 385

by geminidomino (#47931025) Attached to: Torvalds: No Opinion On Systemd

Well, it depends on how pedantic one wants to be (and this is slashdot, after all.:))

BSD is Unix, but not UNIX(TM). That is, it has the provenance, but not the corporate blessing. Feeling that the latter would confer any value is probably a litmus test of some sort...

Your other two examples are duly solemnized carriers of the brand name, however. ;)

Comment: Re:Uh... decompiled and deobfuscated? (Score 1) 354

by geminidomino (#47848997) Attached to: DMCA Claim Over GPL Non-Compliance Shuts Off Minecraft Plug-Ins

As one who has scratched out a few purpose-built minecraft mods over the past few years, maybe I can clear it up a bit.

It's a multi-step process. The initial de-compilation step is, indeed, just about as useless as you say: lots of

But there's a project called MCP Toolkit, which basically goes through every new release and reverse-engineers as much of it as they can (usually a pretty good percentage too), mapping the obfuscated classes, variables and methods to names which, while possibly (probably) not the names used internally, are at least meaningful.

Minecraft Forge, the officially unofficial mod API, used to include MCPing the minecraft source as part of setting up its workspace. It was really handy when I was learning, being able to trace things back through the code to figure out how they worked, but had its downside. I'm not sure whether they got tired of people needlessly making coremods (mods that altered the "vanilla" classes, as opposed to interacting through Forge), or they were afraid of drawing an evil eye from Mojang, or what, but they've altered their whole setup starting late in 1.6.4 so they don't even download the vanilla jar anymore.

Comment: Re:One bad apple spoils the barrel (Score 1) 1134

by geminidomino (#47827321) Attached to: Combating Recent, Ugly Incidents of Misogyny In Gamer Culture

Wait, did I just argue one of Anita Sarkeesian's points for her?

No, you argued one of her critics' points against her: a series of poorly-researched and inflammatory rant-videos accomplishes precisely dick other than to serve as a rallying point for similarly-aligned identity politics, who recursively make their own poorly-researched and inflammatory rants, feeding the current paradigm: a loud, incestuous echo-chamber on one side, convinced that their MO of using shame tactics to make other people do things their way, might someday work, if they can just reach that elusive critical mass of obnoxiousness; until then, they'll keep beating on the status quo like wind against a mountain that (rightly) doesn't give a shit.

The whole approach of Anita et al is fundamentally contradictory: you don't demonstrate "equality" or "agency" by demanding that other people do for you, rather than doing yourself.

Passwords are implemented as a result of insecurity.