Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: The New School... (Score 2, Insightful) 833

by nubsac (#27539029) Attached to: Linux On Netbooks — a Complicated Story
An overwhelming number of computers I've had exposure to since the 2nd grade have had Windows on them.

Is it any wonder why so many people are used to the rules and non-regulations of a Windows machine?

That being said, every flavor of Linux I've tried has some different scheme to it, making basic operations unnecessarily complex.

Standardizing basic ops like install/uninstall, media player/ect. would be a good start, but probably terribly unrealistic among mainstream distros.

Comment: Tactics? (Score 4, Insightful) 227

by nubsac (#27324029) Attached to: .CA Registrar Trying To Preempt Conficker
It seizes to amaze me as to why they would make this public, 8 days before conficker is "supposed" to become active.

It's like telling your enemy "Hey, I know where and when your going to strike"

We know it's capable to updating itself, this just gives the author an 8 day head start on writing a new pseudo random URL generator.

Comment: Physical Access == 0wn3d (Score 1) 260

by nubsac (#26511295) Attached to: Solution Against Cold Boot Attack In the Making
If an attacker has physical access to your machine, the "cold boot" attack should be the least of your concerns.

Additionally, if your that fucking concerned about this attack, wait 30 sec to 1 min after shutdown when logic gates loose electrical charge and are defaulted to zero.

Perhaps I don't fully understand the details of this attack, but it seems as if this would be impractical as a way to steal data. My understanding is that the data only exists for a short period of time after shutdown.Please correct me if I'm wrong...

Comment: Re:TV Scams (Score 3, Funny) 178

by nubsac (#25522609) Attached to: Game-Related Education On the Rise At Colleges

...those ITT Tech and other TV commercials who advertise making games after 2 years. That's bullshit...

So true, I know a buddy who attended one of these institutions and couldn't even write a simple "Sprite" Class.

Upon inquiring further, when asked what a Sprite was with respect to game programming, he replied "'s something that moves!"

Needless to say, you wont be seeing his name in any game credits anytime soon.

"You must have an IQ of at least half a million." -- Popeye