Follow Slashdot stories on Twitter


Forgot your password?

Comment Re:DH, FTW (Score 1) 178

Their service is pretty inconsistant. I think most of their customers get frustrated when they're initially filling the server - they don't do a lot of administrative oversight into what goes onto their servers, and it really shows in the first 3-4 months you are a customer of theirs. The reason they come up however, is they offer all of the stated services except VOIP. And I wouldn't use their VPN, though they offer VPN services. You can always use SSH Tunnels. I think there's a real logistics problem in offering that wide a variety of services, which is why most hosting companies won't do so. The original poster may have 5 providers, but each of those providers only has to stock admins to deal with 2-3 of the requested services.

Comment iMail has a history of infinate recursion (Score 4, Interesting) 158

This isn't the first infinate recursion iMail bug. Around five years ago I worked for a webhost at which we had customers complaining about there being nothing in their INBOX. When we checked, we'd find a giant tree of INBOX folders - for some reason iMail would create a new subirectory called INBOX every time it logged in, and then make the *new* INBOX folder the default INBOX. All the mail would still be delivered to the original inbox...

Comment I have to suggest a specific non-linux product (Score 1) 572

... but sometimes there are commercial solutions that fit a specific problem quite well - I'd use deep-freeze, a piece of windows software. I briefly attended a school that had it on their computer lab computers - effectively the computer is reset every time you restart it. It keeps a second partition sitting around with your save point or something like that. Guests are generally non-malicious so probably won't disable the software.

Comment Suggestions for subtly incorrect items (Score 1) 102

I find it really funny that Amazon is patenting their suggestion system since it's responsable for nearly every mis-purchased item I buy from Amazon. I wind up with GSM phones intead of CDMA (but in a better color), asus keyboards for a laptop I don't own, and a wireless access point instead of a wireless range extender! They should try to think of/patent a system for suggesting items that have the same important attributes and basic utility. It wouldn't kill Amazon to patent something that's not blaitantly obvious.

Comment find the culprit first (Score 1) 884

Wander around with netstumbler, and monitor the strength of the evil network. Once you've actually located the person you can: a) complain to their mom b) move your access point to where it's out of their range c) setup a malicious network of the same name with and perform MITM attacks on them (sslstrip, sslsplit, dsniff, malicious nameserver, redirect them to a copy of someone elses drive-by-0day page) If they run the deauth attack more than once (it only has to be run once), they're fairly unlikely to succeed unless given serious help (like changing the network encryption to wep).

Slashdot Top Deals

If you can't get your work done in the first 24 hours, work nights.