Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Internal and External Simultaneously (Score 1) 104

That's just what I was thinking: if they're firms based overseas, then they can't force them to disclose SSL keys (making the communication secure-er). They shouldn't be able to force them to do anything, legally.

But doesn't facebook have a UK subsidiary, and offices in the UK (and mirrors, since I'm pretty sure they use CDNs)?

Comment Re:If only Windows supported IPv6 (Score 1) 250

Like I said, I doesn't support retrieving DNS over RA; only retrieving IP address/prefix (it's quite silly to support getting an address but not DNS servers, by the way. Why would I want a public IP address and no DNS on a desktop OS?).

RA is the more common (and simple) option for advertising DNS. DHCPv6 requires a second (redundant) service just for DNS - seems a bit of an overkill. Also, I've yet to come across a network that uses stateless DHCPv6.

Comment Re:IP numbers are terrible (Score 1) 250

I really don't get what your post is about. Only very specific situations require you to actually use IP (4 or 6) numbers. We've had DNS for decades and mDNS for a long time as well. You only need to work with dns when initially configuring network devices (eg: routers) or DNS servers themselves. No other scenario should require that you use IP numbers.

Comment Re:Just don't upgrade the kernel with nvidia close (Score 1) 185

Actually, were it not for propietary blobs, there would be abolutely no necesity for them. Linux is designed to have drivers in-kernel, so no user intervention should be required to have devices working, hence, a friedly UI for users to configure devices is sort of wierd.

Seeing as how propietary drives need to be properly integrated for non-power-users to install them, the package manager usually sounds like the right place.

Comment Re:Just don't upgrade the kernel with nvidia close (Score 2) 185

Text files have their huge advantage. They're easy to back up and don't require anything aside from a text-editor to restore a broken system. I can easily copy them over, and diff them. Sample configuration files are quick to compare.

None of this is true for the windows registry.

Text files may be less newbie friendy, but then again, programs do have a settings/preferences option generally for stuff newbies want to touch. Messing the config files OR a registry by these sort of users tends to end badly anyway.

Comment Re:Just don't upgrade the kernel with nvidia close (Score 1) 185

Actually, that's quite wrong.
There's are standards for configuration locations, and only legacy applications and notable exceptions keep them elsewhere.
Generally, /etc is for system-wide configuration, and $XDG_CONFIG_HOME (~/.config, be default) for user-level configuration. The former is only user when configuring the OS itself, generally, and the latter for desktop applications. Most users will only care about ~/.config.

See the XDG Basedir Spec for more details.

Comment Re:Security (Score 1) 323

Wrong.

Encryption is security through obscurity, just like MAC filtering.

No it's not. None of them have any obscuriy. Encryption can openly defined, it's just they keys/passphrases that are secret. Mac filtering has no obscurity at all.

One is far more difficult than the other, but they are more or less the same. The MAC is a 6 byte key that gets broadcast openly fairly often where as most people use far larger keys for encryption that aren't broadcast at all if possible, but in the end the principles are the same.

Please stop repeating things someone else said that you don't understand.

Security is built in layers, defense in depth. You use as many as you can/need. You ACCEPT that one or more of your security protocols CAN and WILL fail, but you design in the hope that enough of them will work to keep you safe.

Your argument is the height of ignorance. You're arguing that leaving your valuables out in the front yard near the street is just as secure as putting them in your home because you left the door unlocked, ignoring the fact that no one will see them inside the house so they won't know its there to steal. Sure, its easy to walk through then unlocked door, but thats already a step beyond what most people will do.

I'm not repeating something someone else said. Mac filtering is like having a doorman to whom you scream your name before getting into the building. Anyone in range can hear it, and pretend to be you by screaming your name.

Actual encryption is like having a key. Nobody can get in until you give them a copy of it (eg: tell them the password).

Comment Re:Uber Insurance (Score 1) 260

If Uber really has a better business model, it may drive the traditional taxi companies out of business. Then all those taxi drivers will join a service like Uber, bringing the same problems with them. Uber will be a nation-wide monopoly or part of an oligopoly.

The bad drives will eventually be down-rated and will end up having no job any more. The same applies for badly-conditioned cars.

Not everyone will be served by Uber, which is just a way of connecting drivers and riders; the drivers will have the legal right to refuse to pick up customers. Being a newer technology, older people will have problems using Uber.
In the end, Uber will end slightly better-looking than a traditional taxi company, but less reliable, the (unregulated) prices will end up higher, and when it goes bankrupt in 15 years or so its founders will be rich, but everyone else will be poorer.

You're assuming that no other company can do the same as Uber does. You are mistaken.

Slashdot Top Deals

Love may laugh at locksmiths, but he has a profound respect for money bags. -- Sidney Paternoster, "The Folly of the Wise"

Working...