Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re: Question for user community (Score 1) 236

I guess every situation is different, but how much of that can he get away by just sending a PDF copy to his customers?
I actually try to do that as much as I can, even for internal use. Worst nightmare is that every person who receive it gives me back an amended copy, ending up babysitting 5 versions of same document. (I'd rather get comments out of band and make an adjustment myself.)

Comment Re:Move to a gated community (Score 1) 611

I think the spirit of that "Except local traffic" is pretty much for discouraging commercial vehicles (trucks, etc.) from using a corridor of a road for thru-traffic.

This wouldn't work in a typical passenger vehicle case as you have described, but if enough people in the neighborhood are seeing/reporting a number of trucks routinely without making delivery to the area, that would be a different story...

Comment Re:Point is you would not STOP paying (Score 1) 631

As far as I know, Costco does accept credit cards (actually they don't accept anything else, including cash) at least for my local one.

You will have to validate yourself for the member, which you can use their membership card or Costco AMEX.
If you choose to validate yourself with AMEX, it should give you option whether you want use Costco AMEX or something else.

Comment Re:Every OS sucks (Score 1) 293

That''s somewhat the conclusion I've reached after I've been hopping between different OS. (Windows, Mac OS, Linux)

So I myself find that Linux is least painful for me, at least for the fact that it doesn't try to hide the details from me. While mileage may vary with the nature of the issue, but it at least it's relativy simple for me to <b>try</b> to address and fix the problem before resorting to complete fresh of the machine.

Comment Re:Am I misunderstanding this? (Score 1) 56

That's the one thing that I love about it.

It reduces onboarding process for the user as simple as typing in the secret. One of the pet peeves I had with most of P2P file synchronization services were that they required registration with the central server. It's much easier directing my peer installing software, then typing in secret instead of "install the software, now go to their website and register, wait for E-mail confirmation, and then confirm your E-mail...what? You can't remember the password you have set?"

Their Windows installer even provides an opportunity to type in the secret right after installation, which makes the cases like above very easy to handle.

Comment Re:Am I misunderstanding this? (Score 1) 56

Actually, the case that was illustrated in the earlier comment can throw things off pretty bad. By inserting a bit at the beginning of the file, it'll pretty much shift the offset of the block for the whole file thereafter invalidating all the blocks, unless the actual data of files are considered. (Which I believe BitTorrent Sync is NOT doing.)

Comment Re:Am I misunderstanding this? (Score 4, Informative) 56

You only share among people with same shared key. So, no, you are not spreading your encrypted file to other people. At 1:1 it's pretty much direct peer-to-peer transfer. If more nodes are participating, then it can leverage distributed transfers from other nodes that may have part of the whole part of a file.

Comment Re:How can they possibly know that number? (Score 5, Informative) 56

As they are using BitTorrent technology, perhaps the metadata would contain size of data (number of blocks) to be transferred. Considering you can choose to NOT use a tracker, and go DHT (or pre-defined host) only, so probably there are some data transfer that are not accounted in this figure.
Privacy

Submission + - Dataleak detection that moves files to an employer (netagent.co.jp)

UnsignedInt32 writes: "Japanese security vendor, "NetAgent" released the software solution aimed to detect unauthorized data takeout called Winny Tokubetsu Cyousain 2 (Japanese of "Winny Special Detective 2.") This solution is a set of client and server, and employees run the client in their personal computer at home. The client software searchs through files in employees' personal computer to find the file with matching keywords, which are specified by their employer. What makes this solution controversial is that the client software can be "factory configured" by their employer (but not by employee) to send detected files to the company server, and then deletes those files from employees' computer. Employees then must ask their employer to get back false positive files transferred to company server."

Slashdot Top Deals

An authority is a person who can tell you more about something than you really care to know.

Working...