Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment Re:What are you missing? (Score 1) 78

I have no idea why you were modded down. You're absolutely right.

The OP apparently learned just enough to form those ideas and questions, but decided not to continue reading and find out that (more or less) all his proposals are already done.

1. On/off switch for "internet access". There's bunches of ways to do this. Many laptops come with a hardware switch to turn off wifi... that can do the trick. Just about any firewall software could do it, and most have a "panic" mode (including the very naive /etc/rc.d/init.d/iptables). You can up/down the network interface quite easily. All those fill his need here, but I suspect he just has no idea what he even wants - he probably doesn't want an internet access on/off switch, but one JUST for the browser, in which case, use a (local) proxy.

2. Start browser in fresh (virtual) space, but pre-populated with saved cookies. I'm ignoring the virtual/sandbox stuff, as it's unnecessary (but could be done via docker, a vm, bsd jails, chroot, etc). The browser can clear any and all data at the end of a session already, and can optionally not clear the cookies. There's also a cookies setting for "keep local data only until you quit your browser" allowing cookies to be created, but then those created during the session go away when you exit the browser. There are exceptions, third party blocking, and cookie managers.

2 - b. A good database of all the files in "my virtual space"... use your file manager. If you want to know what was newly created, use existing filesystem tools. You can even check the ~/.mozilla or ~/.config/google-chrome into git and diff it afterwards, or use etckeeper to maintain it, or a IDS like tripwire. Whatever level of detail you want.

4. When you decide to exit the browsing session, at least, the computer should save important cookies from sites you frequent for later restoration.
Already done. See #2. If you want a partial save (only those you consider important, but not other ones you don't want), then you'll need to become more intimately involved with your cookie management. Start with the cookie manager and figure out what you want. Then script something to maintain your cookie DB as you see fit -that isn't really as hard as it may sound. The cookie DB is often a flat text file, or an SQLite DB. Google Chrome's is SQLite (on linux, ~/.config/google-chrome/Default/Cookies)... you can use "sqlite3" and sql to manage it directly, or script something using your favorite language.

5. Shred the virtual space on exit.... if you really want this, then a short shell script can do it. Create loopback encrypted filesystem; mount; copy skel of browser directory into it; start browser using that profile; when it exits, copy out the cookies, then unmount and delete the file. I doubt that's really what is wanted though - have you thought about all the side effects? ...

3. Why is it so hard to find the specifics of, step-by-step, how (not why or if) we are being conned and raped...
WHOA! Hold up. This is not rape. You can watch every bit of data go back and forth, and you can control every bit of what you send or accept. Worst case (you don't trust the browser), use a local socks proxy and do your filtering there.

Comment Re:What's with calling them "Fake Apps"? (Score 1) 90

Are you just being incredibly obtuse? A "fake" app is one that is trying to pass itself off as another app but is not that app

Stop being an apologist. They shouldn't be referred to as "fake apps".

Back in the day, virus emails would include a "fake image attachment". It was fake because it wasn't an image, but was an exe. It was meant to get people to click it, or to get the email client to automatically run it. Things like, "flower.jpg.exe". Or using the unicode left to right override, such as "Great Song by [U+202e]3pm.SCR", which would be displayed as "Great Song by RCS.mp3", but executed as a screen saver.

Impostor, Scam, Phishing, Fraudulent... there's plenty of applicable names, but it's not a "fake app" unless it's not an app**.

** at the very very least, it shouldn't do anything like what its name suggests. For example, back in December 2014, there were 3 entries in the Apple App Store for "Quickoffice ...". Two of them actually included a word processor and spreadsheet - those were not fake apps. One of them was just a grey screen with a button reading "TAP" that closed the window. Maybe the latter could be considered a fake app.

Comment Re:No need to panic (Score 1) 90

It's funny how we think that a Windows Phone OS market share that is 50% higher than Linux desktop OS marketshare is just laughable ;) Latest numbers has Windows Phone share at 2.6% WW, and Linux Desktop OS share at 1.7%.

It's funny how Microsoft proponents primary excuse for the abundance of viruses affecting Windows versus other OS's was due to it's formidable market share.

We're now in the completely opposite situation on mobile platforms, and both Android/Linux (google play) and IOS (apple store) have FAR larger market share, and also address the "fake apps" faster and more thoroughly.

What's the excuse now?

PS: I'd also question the market share figures. Even if they were perfect, there's still the fuzzy definition of "desktop". I also doubt the number can be accurately reported, due to the way linux is distributed. All that said, 1.7%, while it looks like a small number, should actually prove its significance when one considers similar numbers and their impact - such as Windows Phone, which is considered to be doing poorly, but is still taken seriously.

Comment Re:RAM is not cheap (Score 4, Interesting) 207

Came here to same just about the same thing.
Even brought along some facts:

Price per mb at the end of 2012: $0.0037/mb
Price per mb Sep 13, 2014: $0.0085/mb
Price per mb May 15, 2015: $0.0056/mb

Sure, it fluctuated, but it wasn't a big drop, and definitely not a historical low.
The better question, is why isn't it going down further (especially on larger modules)?

Last time it was above $1/mb was in 2000.
In 2002, it hit a low of $0.19/mb - THAT was a drop.
First time it dipped below $0.05/mb was 2007 (got as low as $0.024/mb that year).
It still hasn't hit another 1/10th the price drop ($0.0025 has never hit).

I'd like to get some more memory, but the last time I got 2x8gb, it was cheaper than it is now. Makes it hard to justify... I've expect it to eventually go down in price, and if I wait long enough, I'll have to get a different format - probably worth waiting at this point anyway (ddr4 instead of ddr3).

Comment Re:Benefit to end users? (Score 1) 680

I assume there is nothing preventing this fork from contributing patches to the mainline kernel, and the mainline providing/porting patches to the fork assuming internal politics and code quality is in order. I can only see benefit for both sides.

Besides a hot puff of air while (slightly) publicizing some of the internal politics of the LKML (Linux Kernel Mailing List), that was exactly my thought as well.

If it does get picked up by any distros, it is very likely that only a patch made from it will be picked up. Redhat, for example, does that type of stuff all the time, and also backports many features. That's the way distros should work.

I had no idea what securelevel was, so I looked it up:
It does sound somewhat useful, especially to jails/containers/vms, but it doesn't do all that much (it can be set to 1 of four modes affecting a variety of things; maybe making it a mask of sorts for more fine grained control would be better?).
In any case, it does NOT sound like enough to pull people over to using it instead of the mainline.

These types of feature forks have been happening since the beginning.

Comment Re:Hardware hack help (Score 1) 248

$20 no need to do any hacking direct solution:
It's a bluetooth transmitter and splitter. It splits the audio fed to it via 3.5mm TRS plug (headphone connector, like the output from your phone), and sends to up to two bluetooth speakers.

Or, just fix the wired connection on your speaker (open it up, re-soldier it), and use a normal wired splitter.

Or, open up your bluetooth speaker, and split the speaker wire to drive another speaker, and wire it to the other speaker you have.

Or use the correct speakers for your problem. For example, a bluetooth receiver, plugged into a normal audio surround receiver with normal speakers all over your house fed from that normal receiver.

Or, if you're just looking for something to do with the jawbone cause you find it useless as is now, rip out the bluetooth part and shove that into something else (like a pair of headphones).

Comment Re:I am curious about one thing... (Score 1) 66

Agreed. I don't find it difficult at all to dream up good business cases for this. They'd just be guesses, but it's easy to imagine cases.

* some enterprise based company has some windows only app. They want tablets in hands of users walking around (maybe for supervisors at a call center). Surface would make the entrance fee much higher than acceptable. Cheap android tables + a tweaked wine + their slightly tweaked app = MUCH cheaper. Could easily bring enough savings to be worth it.

* vm's still need a separate OS and license. Depending on the app, I'd rather (if forced to use a windows only app) use it under wine if possible. This would apply more-so to android tablets/phones, where I wouldn't want to install a full windows, even in a vm, and that likely isn't an option at all.

* android dongles and streaming media apps that don't support android... that dongle can do *almost* everything some (hypothetical) person wants, except one thing. Is it worth it to just give up and use a full blown windows box, or worth it to sacrifice that one special app you like, or try to use both pieces of hardware? If you can get acceptable use of that corner case and make the cheap, low power, small, device do it all, why not?

* The user never has to even see wine. It is both an executable, and a set of libraries. For example (not a great one, but a real world one nonetheless), Corel had "ported" Draw to Linux long ago using wine libs. It ran more-or-less like a native application. That was a fairly ambitious attempt and it had its issues, but it does show that it can work.

Comment Re:Self Driving Cars (Score 1) 140

You're obviously one of the many that didn't look at the article.

Sadly, the car looks awful and is nowhere near the "ultimate" distraction it could be. I expected some actual coverage of the dash, console, steering wheel, projected heads up display, etc. Instead, it's one of the most boring looking designs I've ever seen. The only innovative coverage was the seats.... but why in the world would they put displays on the only parts that are likely to be covered? They even put big rectangular white things on the doors, but failed to make them displays. It looks like a toy made for a 2 year old.

Comment Re:And they recombine... (Score 2) 55

Yes! Let's do the exact same thing again that didn't work! It will work this time for sure!

I can't tell... are you commenting on the exact same thing being the merger of the individual networks/companies, or the divestment of the local exchanges into RBOC's?

IMO, the problem is simple. The mergers had to be approved, and we (through the FCC) approved them. That was dumb. We had the means to keep them from growing too big, but, instead, we approve huge mergers (and I'd include the merger of Sprint and Nextel from 2004, which were the third and fifth largest at the time).

History is bound to repeat itself. Or, in this case, at least we can hope :-)

Comment Re:Only if you use App Cards with APPS! (Score 4, Informative) 317

...It's basically the same thing as a magstripe, but different form factor....

I'm 99.9999% sure you are absolutely wrong!

Granted, the chip&signature that the US is adopting is far weaker than the chip+pin used elsewhere (the pin is "something you know" which prevents the card from being used by others, whereas the signature is just a scribble of anything you want and doesn't technically lock/unlock anything).

However, you can swipe a mag stripe and read all the info from it via VERY cheap hardware (for example, a free square reader). Doing so will give you every piece of info that is printed on the front of the card. It's the same info you'd get if you did an old style carbon copy rubbing of the card like gas stations used to use, and that's the same info you'll get off the new chip+sig mag stripes and imprints. The chip isn't there to prevent theft of the physical card.

If, however, you use the chip, then the merchant does not get the actual card number. There's a two way communication from your card, to the terminal, to the bank, and back, all using crypto. You can think of it like an SSL handshake. Once that handshake is complete, the merchant has a one time use token to use for the purchase.

What does this solve? It ensures that the merchant can't log your card number and store it in their insecure database for thieves to later take, ala the Target breach**, because they'll never have that number. More importantly for the banks, it's "proof" that the card was there, and not some cheap copy.

** I think that's what happened at Target, but there have been mixed stories, and I'm not 100% certain... maybe it involved data they got from the web instead, but I doubt that. I'm pretty sure it was card numbers scanned locally.

Comment Re:Is it worth doing this in hardware? (Score 1) 128

... but as mentioned before, the problem would be that the monitor would still tell the PC that it was connected even if the input was not set to that PC..

I was not aware of that behavior (I haven't tested it myself).

That said, there are simple software solutions for that:
* man xrandr
* man nvidia-settins ... etc for GUI tools. Should be fairly simple to disable the display via software.

Maybe not ideal, but how often are they really going to be swapping around the displays? If it's more than a couple times a day, then I'd imagine that the desktop layout reconfiguration (from 1 to 2 screens and back) would affect workflow more than it would be worth... just connect a "main" desktop, and vnc (or similar) to the others as needed for quick-swap needs, and do the full change only when necessary.

Comment Re:Racism v. Bias v. Intelligence (Score 1) 445

Just stop considering and naming it "gifted".

There needs to be multiple paths of learning, so that those that are advancing faster can continue to advance. Why they're advancing doesn't matter in the context of a need for such a path. Some may be from wealthy families that have hired tutors for home and really focus on education and push their kids, regardless of their capacity, and at cost to other parts of their lives. Some may have a knack or natural passion for certain subjects. Some may have higher IQ's. Etc.

The shame here is that there are probably a bunch of people that *could* be in those accelerated classes, but they're not for one reason or another (and income/poverty probably plays a significant role, but there's loads of other reasons a kid could be passed over). IMO, this identification and help should be a separate tract/issue. Programs could be started to help get kids up to speed to pass the entrance exams for those classes.

BTW, was anyone else left yearning for more gifted editors or submissions?

Analysts believe black and hispanic students are at put at a disadvantage because of the way in which the program is run.

Comment Re:Can't understand the obsession with TrueCrypt (Score 3, Informative) 106

What's wrong with dm-crypt that is shipped as default disk encryption backend by most distros?

Those distros do not include Windows or Mac OS.
AFAICT, FreeBSD doesn't support dm-crypt / luks either.
FreeBSD's go to encryption is Geli, which isn't supported by Linux distros.
eCryptFS works on FreeBSD and Linux, but it's not block level encryption.

TrueCrypt/VeraCrypt/CipherShed... they provide block level encryption that is cross platform. That's a feature that the others lack. It's theoretically possible for dm-crypt/luks to have a MacOS, WIndows, and FreeBSD driver (which would also probably require the filesystem drivers, as ext4 isn't well supported on those either), but it's not easy. Thus the obsession with Truecrypt.

Comment Re:Is it worth doing this in hardware? (Score 3, Informative) 128

IMO, I'd forego the expensive matrix KVM's as well as the loggy VNC-like solutions.

Many monitors support multiple inputs. If yours doesn't, get some that do.
Use the monitors input switching for video input changes. That takes care of video (I'm pretty sure 3 inputs each is more than feasible).

For the keyboard and mouse, use any of the existing hardware solutions for those (there are old manual switches that work with PS-2 and AT stuff that are dirt cheap, and would do the job, for example). Alternatively, use something like synergy (

Comment Re:Coders may not be the right targets for floggin (Score 1) 392

I would love to hear why they would need to test for a condition that requires emissions reductions only when a vehicle is being tested for emissions.

Here's a car with an empty firmware.
Here's a bunch of test cases (emissions, performance, etc).
Make them all meet or exceed the goals. ... someone discovers an easy way to make all the numbers look significantly better (could have even been an inside joke) ... TADA!

Your good nature will bring you unbounded happiness.