Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Comment: Keep rubbing it in our face ... (Score -1, Troll) 190

by kbahey (#48601957) Attached to: Why Didn't Sidecar's Flex Pricing Work?

Slashdot's editor team knows that the "audience" here hate Bennet Hasleton's continued long winded drivel, yet they keep posting his stuff regularly.

This yet another clear sign that Dice and Slashdot do not care about their "audience", continuing off from the Beta debacle.

Just keep ignoring your "audience" while expecting viewership to increase. Yeah, that will happen alright ...

Comment: PRT, SPF, and DKIM (Score 1) 405

by kbahey (#48382183) Attached to: Ask Slashdot: How To Unblock Email From My Comcast-Hosted Server?

I had similar issues, though on a machine hosted outside my home network.

The solution was to implement SPF, pointing to the PTR of machine (i.e. what a reverse IP lookup will resolve to), and DKIM.

In your case, doing a PTR will be hard, since dynamic DHCP may change what the PTR is, but the rest does apply.

I wrote the following detailing what I did: Setting up SPF and DKIM on Postfix.

Comment: Yahoo DMARC caused mail bounces (Score 1) 139

by kbahey (#48296663) Attached to: Ask Slashdot: How Useful Are DMARC and DKIM?

I had lots of mails bounce after Yahoo implemented DMARC.

However, with a bit of patience, I was able to implement DKIM and SPF for my domain, and now all the mails get delivered to Yahoo addresses.

I wrote about how ot configure SPF and DKIM in this article: Setting up SPF and DKIM for Postfix.

Comment: Re: Oh boy, another infection vector (Score 1) 230

by MrNaz (#48261511) Attached to: Windows 10 Gets a Package Manager For the Command Line

Perhaps you could have a two tier level of trust where repositories that are from signed approved vendors are automatically permitted, but unlisted ones require specific admin permission to install from. Of course, power users could mark an unlisted certificate as trustworthy to prevent the auth request, but it would prevent installs from silently coming in from hijacked repositories in the scenario described above.

Comment: Was OK until mid or late 19th century (Score 1) 272

by kbahey (#48251695) Attached to: A Library For Survival Knowledge

Things were easy until the mid to late 19th century. Anything could be produced in a carpenter, blacksmith or watchmaker's workshop. Lenses were ground, metals were machined, ...etc.

Then in the early 20th century things started to get far more specialized. By the mid 20th century, we had the transistor then the integrated circuit.

Now, everthing from ubiquitous phones to home appliances to street lights have complicated integrated circuits, CPUs, RAM, ...etc. that can only be designed by specialized teams, and fabricated in very high tech fabs.

I wrote about it here : Information readability and longevity in the digital age.

Comment: Re: On the other hand... (Score 2) 700

by MrNaz (#48209309) Attached to: FTDI Reportedly Bricking Devices Using Competitors' Chips.

This is exactly correct. I've experienced this with a radio programming cable with a counterfeit chip supposedly from Prolific. The drivers that Windows automatically downloaded for it caused the device to not function. Rather than stuffing around with the supplier, I simply downloaded an old working driver, uninstalled the new driver, installed the old driver, and done.

Certainly not a job my mother could do, but also not the same as the OEM bricking devices, which would legally be dangerous for them as it could be argued that they were willingly causing property damage.

From a commercial point if view I think it is an appropriate measure, albeit perhaps not the most reasonable from consumers' perspectives.

Comment: Hypothesis by researchers (Score 1) 139

by kbahey (#48058437) Attached to: Lost Sense of Smell Is a Strong Predictor of Death Within 5 Years

Contrary to all the speculative guesses in the comments, the researchers do have a hypothesis for this.

From the linked PLOS article:

Unique among the senses, the olfactory system depends on stem cell turnover, and thus may serve as an indicator of deterioration in age-related regenerative capacity more broadly or as a marker of physiologic repair function

10.0 times 0.1 is hardly ever 1.0.