Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment Re:Insecurity culture.... (Score 3, Insightful) 510 510

Reading a text in a godly way isn't hard to do either... if you're Morgan Freeman.
Building a complex dashboard in OBIEE isn't hard to do... from my point of view.
Developing a dynamic website is also not hard... for someone out there. For me, it's impossible.
Every thing that's simple to someone might be complicated for someone else. Now, we're talking about a thing that might drive you into (or literally under) the ground financially speaking if done wrong. There should be no room for mistake. If there is, of if the retirement plans are too complicated for more than 1% of population, then it should be simplified/redesigned/reformed/whatever.

Comment Re:The Big News not Being Reported (Score 1) 183 183

I don't think you've used Total Commander Ultima Prime, furthermore there's no functionality that Windows Explorer would have and TC wouldn't.
Using TC since ages and frankly Windows Explorer is something I haven't started in months.

Comment Re:How? (Score 1) 377 377

1. Visit shady torrent site.
2. Search for whatever porn you fancy.
3. Click the wrong "Download" button.
4. Install "Updated Flash".

This is just one of the gazillion attack vectors.
There's the .exe wrapped porn file which actually lets you jerk off while the malware silenty does its job in the background. The archived video which is actually an archive, but the unpacker does more than just unpack...
And so on and so forth.

Comment Re:How? (Score 2) 377 377

Looks like a simple question but I've been pondering it.
We have very mature 14 year olds, I met a girl about 10 years ago and I swear to God she looked like she way 20 and talked like she was 20. She was 14. No, I didn't bang her if that's what you're wondering (I was engaged at the time and I'm the kind of dude who doesn't cheat).
Since then I saw many girls and boys whose age couldn't have been guessed. "Overgrown" comes to mind, there's no way you could tell they're less than 18. Now, there's people over 18 who look like they're 15, also there's people who act like they're 12 even if they're 30 and so on and so forth. The problem is that theer's no universally applicable algorithm which would say "this person is an adult, that one isn't" unless you throw in an arbitrary, universal threshold. In our society, it's age. Not perfect but probably the best of the many imperfect possible solutions.
The alternative would force a case-by-case verification using complex methods (psychological age, physical age, intelligence testing maybe, behavioral testing, etc) which simply is too tedious and complicated.

So until we figure out a better way to separate adults from non-adults... age is the threshold. Again, not perfect but there's no better solution at the moment.

Comment Re:How? (Score 1) 377 377

You'd be surprised.
I'm cleaning up malware like there's no tomorrow from people's computers - and most of it is injected through this path:
- torrent website - click on pop-ups with porn - get malware.
I guess it depends on country, though. Where I live, torrents are a BIG thing. People watch movies, play music, jerk off on porn - all coming through torrent sites.
There are private trackers which are malware-free, and those with not enough brain to get an account there will go to the malware-laden public ones. They usually search for "porn torrent" and click on the first link they see.

Comment Re:Scripts that interact with passwords fields aws (Score 1) 365 365

I'm not talking about unsafe machines, just other machines which you occasionally are an user on (e.g. meeting room presentation machine or something). Yeah, I know, those are considered unsafe but we have security solutions enabled on all our machines and they do a decent job.

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (10) Sorry, but that's too useful.