Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Comment: Re:*shakes magic 8 ball* (Score 2) 148

by shadowknot (#47921307) Attached to: I think next winter will be:
I think it depends on where you live as to how accurate they can be. Most of the time they're pretty good here in Utah but there are periods when things change so quickly and unpredictably that they can't keep up. When I lived in England the climate seemed a lot more consistent (rain, grey skies for 7 months of the year!) so that could be the source of different experience or at least perception of forecast reliability.

Comment: Re:Perhaps they can ask Google to forget that page (Score 1) 273

by shadowknot (#47615151) Attached to: Hack an Oscilloscope, Get a DMCA Take-Down Notice From Tektronix
Apples to oranges. This all comes back to property rights and what you're actually buying. In your example I don't own the race track so I have no rights to it without the express permission of the owner, a fee may be involved. In this case, however, the discussion revolves around what one can do with property they own. Sharing information about that property is neither immoral nor unlawful. It would seem it is illegal under the DMCA but that seems rather ridiculous to most with rational heads on their shoulders. If the manufacturer wanted to sell added capacity they shouldn't sell the unit in a crippled state but make the add-on features available by way of additional/replacement hardware. A good example of this is the Roland synthesizer expansion cards that provide additional instrument patches. They're a little PCB that you pop in to a slot under an easily accessible panel. I don't really know a great deal about oscilloscopes but I suspect it's not beyond reason to expect that a company producing complex electronic devices do something similar. This is especially true given how technical the consumer base is for such products and the idea they're surprised by it is, quite frankly, ridiculous.

Comment: Re:What's there to compare? (Score 2) 402

by shadowknot (#47587229) Attached to: Comparison: Linux Text Editors

So they did a text-editor roundup that excluded every serious contender in favor of 5 third-string also-rans. I actually tried to read the text but it was too brain-numbingly stupid to get through. He's trumpeting all these wonderful features that... vi and emacs had in the 80s. It's so true - 'those who do not remember Unix are condemned to re-invent it, poorly.'

Lennart Pottering needs to read the last line of this comment in particular!

Comment: Re:I used to teach Linux. (Score 1) 402

by shadowknot (#47587129) Attached to: Comparison: Linux Text Editors
It's a matter of preference and consistency for me. I've been using vi/vim for more than 15 years and have it as my default editor on my desktop so I have the same environment whether I'm ssh'd to a system I manage or editing scripts locally. I feel that my motivations for doing so are far from retarded!

One thing that has been a challenge is learning XEDIT under z/VM in the last couple of years. Many a REXX EXEC has ended up with a :wq on the last line I was editing!

Comment: Re:domain name taken? (Score 1) 207

by shadowknot (#47249231) Attached to: Ikea Sends IkeaHackers Blog a C&D Order

is already taken?

If it is maybe is available....

Whois Server Version 2.0 Domain names in the .com and .net domains can now be registered with many different competing registrars. Go to for detailed information. No match for "IKEAGOFUCKYOURSELF.COM". >>> Last update of whois database: Mon, 16 Jun 2014 21:23:27 UTC

Yep, go buy it if you think you can do something constructive with it.

+ - 5 years old bug in Linux kernel fixed-> 1

Submitted by rastos1
rastos1 (601318) writes "Ars Technica takes a look at serious bug in the Linux kernel that was introduced in 2009. "The memory-corruption vulnerability, which was introduced in version 2.6.31-rc3, released no later than 2009, allows unprivileged users to crash or execute malicious code on vulnerable systems, according to the notes accompanying proof-of-concept code available here. The flaw resides in the n_tty_write function controlling the Linux pseudo tty device." This flaw has been identified as CVE-2014-0196."
Link to Original Source

Every successful person has had failures but repeated failure is no guarantee of eventual success.