Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Re:Awesome! (Score 3, Interesting) 126

Perl 6, what's that? Seriously though, it's nice to see p5 undergoing productive changes as the grand wait for Perl 6 wears on and as it becomes more clear that the Perl 6 we're getting might not be the one we wanted. Having said that, I find it annoying that the focus on backwards compatibility hamstrings new features to the degree that everything is marked as unstable or experimental and we're left just writing the same damn old perl 5 we've been writing for years. We keep dancing around the issue, but what's really needed is a breaking fork of p5 to revamp the code base and remove a lot of the cruft and make a language that can be parsed by more than just the perl interpreter. Better packaging would be nice too. I'd love to see Perl offer proper bundled binaries a la Go.

Comment: Re:No (Score 0) 671

by walkeraj (#39243367) Attached to: Ask Slashdot: Using Company Laptop For Personal Use
Agreed. There is no substitute for good network security. If your business doesn't have behavior and signature-based network security and an isolated-host wireless network with strong encryption and authentication, you are doing something wrong. Furthermore, if your VPN gateway is open to the world and the password is shared, ANY employee can log in using ANY machine they so choose. If this person is still able to get into your secured network despite reformatting the laptop, what does it matter which OS is on it? That said, it sounds like the real issue here is that you're going to be pushing your boundaries from day 1. You might want to cool it, put the POS company laptop into a box, and just use your own personal machine.

Comment: Eh... (Score 0) 94

by walkeraj (#31478012) Attached to: Mario Reduced To 8x8 With Open Source and Arduino
It's cute, but not terribly impressive. There's only rudimentary scrolling of a map that is entirely hard-coded, no movement other than the blocks representing the world and the player itself (which is locked to a specific column that can only decrease). It might be a bit more of a technological achievement if the music was coming from the same board, but it's a totally separate, single purpose board.
Security

+ - Inexspensive system for non-password laptop login?

Submitted by walkeraj
walkeraj (1234310) writes "I'm purchasing a laptop soon, and would like to set up some kind of authentication for it that doesn't require a password and doesn't involve bulky antennae sticking out of the side of the machine. Ideally, it could be proximity based, but touch/fob interfaces are fine too.

I'm looking for a method that can be integrated into the existing functionality of the laptop or installed without affecting its form-factor too much. It would be nice if I could integrate this solution with my desktop at work, too.

The ibutton is promising, but I'm unsure if/how I could integrate a reader into the machine. I'm quite handy with disassembly and micro-soldering, however, so working for it isn't an issue, and I'm definitely willing to void warranty, since I'm probably buying it used.

RFID is interesting, but the only PCMCIA/CF/Cardbus readers I've found that don't have bulky antennae are upwards of 500 USD.

Blueproximity is an excellent idea, but I'd like to find a method I could use that didn't involve turning on the battery-eating bluetooth feature on my phone. Are there simple bluetooth keyfobs out there?"

Computer Science is merely the post-Turing decline in formal systems theory.

Working...