Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:The comparison is wrong (Score 1) 437

by junk (#48766289) Attached to: Is Kitkat Killing Lollipop Uptake?

As someone who has multiple Nexus devices in his possession and has upgraded more than one of them to Lollipop, I can say that I rolled back because of UX problems. Some of the "optimizations" made in Lollipop are contrary to what you'd expect. Additionally, some of the new security features break existing functionality. I'm all for security (I tried four different ROMs on a device I got yesterday until I found one with working device encryption) but one should be able to relax security if they so choose.

Go test drive Lollipop in a VM. Some people love it, some don't. I won't be upgrading anything I own back to Lollipop until there are ways to work around some of the new features.

* Two finger/double scroll for notifications bar
* Complicated prioritized volume setttings (I believe they removed a volume override intent for this, which I use)
* Tabs and recent apps part of the same "recent apps" overlay (can be disabled via a chrome setting, thankfully)
* Removing long press on app bar buttons (changed to a small hot area of text under the icon, which I didn't know about until someone told me)

* Pinning
* Volume and brightness sliders in the notification bar
* Material Design
* Change to battery metrics display

* Heads up notifications instead of stealing the entire display for things like the phone UI (CM11 does this too)

As you can see, there's really no compelling reason to upgrade and some really annoying new features (as well as some rather critical open bugs) that will keep _me_ away from Lollipop.

Comment: I applaud this as much as I did the gawker network (Score 1) 2219

by junk (#46182535) Attached to: Slashdot Tries Something New; Audience Responds!

Which is not at all. I logged in to post this, just to show my support for the Fuck Beta crowd. I've been here a looong time and want to stay but if you gum it up, I won't. Slashdot is an historical land mark, as far as the net is concerned. It was one of the first DDOS mechanisms we all knew and we want to preserve it as a beacon to what once was. When it goes away (or turns into just another cookie cutter news outlet), so does a piece of our youth. Don't kill it for us.

Comment: Clarifications on the 1% (Score 1) 683

by tanawts (#46073873) Attached to: VC Likens Google Bus Backlash To Nazi Rampage
There are no additional fractions needed. There still seems to be confusion around the "1%". You or people you know are in the "1%" when as an individual, you/they have a minimum salary of $350,000.00 a year. The folks who are having to ride those buses are most certainly not making $350k. There is no need to reference ".01%" Unless you are really trying to address folks like Gates or Larry Ellison directly.

Comment: validate email addresses... (Score 1) 114

by junk (#46020233) Attached to: Microsoft Researchers Slash Skype Fraud By 68%

Hopefully their research concluded that they should validate email addresses. I have about a dozen Skype accounts (though I never use the service) because of fraudulent account sign ups. The simple act of validating email addresses prior to issuing an account would fix this. Hell, even a product targeted at the lowest common denominator (Facebook) has managed to figure that out.

Comment: Enter at your own risk (Score 1) 204

The way that I read Jeff's comment was not so much as a ban of the Feds but he seemed to be politically cautioning the attendance of Feds on potential hostilities from attendees who aren't particularly thrilled with the recent disclosures. We can all argue the maturity level of the conference but in the immortal words of Friedrich Nietzsche: "Madness is rare in individuals, but in groups, parties, nations and ages, it is the rule" Surely there would be severe consequences on both sides were there to be pranks or aggressions on Feds in attendance. Of my many years of attendance, I have never considered Defcon to be a completely open environment free from danger, but rather a Hackers Mos Eisley where you can interact with all walks of life, but that you had better be aware of those who do not like you.

Comment: Glad to know I'm at least some kind of threat (Score 1) 976

"Similarly, you should not be concerned merely because your neighbors are a member of any national gun advocacy organization. The actual threat â" just to cite the best known org â" that the National Rifle Association (NRA) and its kin present to you and your children is political."

+ - The state of information security today->

Submitted by tanawts
tanawts (786512) writes "Capturing a recent topic posed during a panel at CERIAS Symposium, Gene Spafford breaks down the problems of the industries current response to computer security today.

The article touches on recent government involvement, pwn2own style competitions, and the vicious cycle of IT professionals being pulled into incident after incident without being allotted the time and priority to correct the systemic problems that cause these security fiascos.

"There's another barn on fire! Quick, get a bucket brigade going — we need to put the fire out before everything burns. Again. It is getting so tiring watching all our stuff burn while we're trying to run a farm here. Too bad we can only afford the barns constructed of fatwood. But no time to think of that — a barn's burning again! 3rd time this week!""

Link to Original Source

+ - Crisis averted in BIOS source code leak->

Submitted by mask.of.sanity
mask.of.sanity (1228908) writes "The world's largest BIOS vendor has attempted to calm rising panic over the leak of the cryptographic signing keys and source code for its UEFI BIOS
A Taiwanese vendor had left a file transfer protocol server open for anyone to browse and download internal emails and the source code for the vendor's UEFI BIOS and cryptographic signing keys.
The company, American MegaTrends, said the security keys on the ftp server were not used for production systems."

Link to Original Source

Comment: Re: Improve infrastructure, don't inact laws to p (Score 1) 80

by tanawts (#43380223) Attached to: Why Laws Won't Save Banks From DDoS Attacks
To put it another way. The wolf does not adhere to the laws of the little pigs. If your tired of him blowing your house down, you need to stop thinking about patching holes in your straw house. Reenforcing reeds isn't a scalable solution. You need to start building the houses with bricks.

Comment: Re: Improve infrastructure, don't inact laws to pr (Score 1) 80

by tanawts (#43380175) Attached to: Why Laws Won't Save Banks From DDoS Attacks
I'm not sure that we have a choice. "Because its hard" is probably not going to be a sufficient excuse with respect to the critical mass we are heading toward. If everything that the world has invested in standing on top of the Internet is so important, than all that important stuff is going to need to experience the growing pain of adapting to new redesigned transit protocols. The alternative seems to be a sheer cliff.

core error - bus dumped