Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:Hope (Score 3, Insightful) 180

I really, really, hope that the current work of DnF is not lost. That all the data, code, levels, ..., are going to be released somewhere. Or better, finished into a playable state.

Isn't it possible to find a different developer that can take it over?

I'm wondering if there is any code. I think all we've seen up to this point is some nicely rendered scenes, but are they in-game?

Ah, cynicism.

Comment Re:Boy oh boy! (Score 1) 414

Both my father and my grandfather got Ubuntu as their first operating system. I did not want to have to fix all the viruses and spyware and whatnot they'd get from porn and other stuff the internet is for.

WTG outing your father and grandfather as porn addicts! ;-)

Comment Re:The only real solution to the wiki-wars... (Score 1) 115

Actually, the final straw was when I added ISBN numbers to J. Edgar Hoover's wikipedia page -- I noticed they were missing, so I looked them up and put them in. How controversial is that? It got reverted by a wikipedia admin (JayJG) with an ideological axe to grind. Twice.

On the surface, it seems like a silly revert, but what was the context here? Was it an article about the current stimulus package where Democrats accused some Republicans of Hooverism? If so, ISBN numbers may have looked like a different statement: "Hey! Read these books to find out just how much of a bonehead Hoover was!!!!!!!!"

I suppose the larger point is one can find bias in nearly everything. It's just like listening to songs in reverse. Go slowly enough and you're sure to find a naughty word.

Comment Re:Hostile Action from Spammers (Score 1) 68

Either we need a lot more volunteers, or we need to start imposing the the death sentence on convicted spammers and get the root problem solved.

Right. Kudos to Microsoft for picking up a good member of the community. I sincerely hope he'll be able to help. Whatever platform you use, spam and trojans diminish everyone's experience.

Still, even if Paul Laudanski's expertise is top-notch, he was but one piece of the larger community. This isn't quite like a government where someone leaves to work elsewhere. In those cases, a system takes over, pushes a person into the vacated position, and business continues. In this case, the community is now closed, the members scattered.

I sincerely don't want to paint all this as MS business-as-usual. Heck, Paul wasn't forced to except the position. Still, the result is awfully close to embrace, extend, extinguish. No, MS doesn't want more trojans or spam, but by Paul leaving, an entire community is gone.

Obviously, the internal cynic has prevailed here. Perhaps Paul will be instrumental is helping to create a security structure that benefits all O/S for many years to come. I sure hope so.

Comment My advice... (Score 2, Interesting) 396

It's not completely unrealistic.

(( tl;dr - Find a one-man show who needs help with current workload and is willing to contract out. ))

Let me tell you my quick story: I've been in IT most of my professional life, having made a lateral move from printing (prepress) into working for a hard/software developer in the field. A few years later, after running my own show for about five years, I worked for a helpdesk.

I didn't like working at this helpdesk, but I kept chalking up my displeasure to personal concerns. In the end, I was trying to fit into a management role and I hated management. My anxiety and depression (as I am inclined to) kept building to a point where I literally walked out one day with a serious bent toward harming myself.

Despite my situation, I needed work. I set out to find work in which I could set my own schedule. Now, I _hoped_ for part-time work, but was willing to do full-time if that's all that was available.

The first thing I did is leverage _all_ my contacts. I interviewed with companies with which I already had worked with or employed people I knew. When they asked me about availability, I told them "I would prefer part time, but we can talk about full time."

One contact was a guy who was in the same situation I was during my business' run. I had loads of work, but didn't know how hire or manage people. I never really solved that issue, but he was committed to trying. I started working for him part-time. Today, I work 4 days a week at about 4-6 billable hours a day. The rate is generous.

Now, initially, the hours available were pretty low. (Considering my mental state, I was happy to have a lot of time out.) What's key, however, is that as I learned his customer base and their needs, the customers realized that my colleague's business was simply more available. So, the customers started making more requests and, now, the company has the ability to serve the requests. My hours increased and I can do more if I want.

So, like any other search, you have to network. You have to state what you want, but be willing to compromise. Be nice. Be humble. Be enthusiastic.

Security

Submission + - SPAM: Chinese mistakenly released unpatched IE7 exploit

alphadogg writes: Chinese security researchers mistakenly released the code needed to hack a PC by exploiting an unpatched vulnerability in Microsoft's Internet Explorer 7 browser, potentially putting millions of computer users at risk — but it appears some hackers already knew how to exploit the flaw. At one point, the code was traded for as much as US$15,000 on the underground criminal markets, according to iDefense, the computer security branch of VeriSign, citing a blog post from the Chinese team.
Link to Original Source
Software

Submission + - Chandler PIM reaches 1.0, loses financial support (chandlerproject.org)

TuringTest writes: I was surprised to learn that Chandler, the open-source Personal Information Manager (covered on Slashdot after releasing some stable versions), has silently reached its 1.0 milestone this summer only to (or maybe because of) having its financial support removed at the end of 2008. Chandler inherits organization concepts from Lotus Agenda and is a brainchild of Mitch Kapor (of Firefox, EFF and Lotus fame). It shares an approach to unified information representation with recent PIMs like MIT's Haystack and KDE's Nepomuk. What happened to the persistent universal data storage that object-oriented desktops and metadata filesystems were never able to provide? Did it finally arrive as a userland application, and nobody cared?
The Internet

Submission + - Diamond Giant Tries To Force Spoof Ad Offline (computerworld.com)

CWmike writes: "A provision in the Communications Decency Act protects domain name registrars and hosting providers from being held legally liable in most cases for the content clients post on their sites. But that hasn't stopped some companies from trying to pressure Internet intermediaries into disabling sites that contain what they consider to be objectionable material. The most recent example involves diamond conglomerate De Beers, which is trying to get registrar Joker.com to take down a spoof New York Times site that includes a satirical De Beers ad saying that diamond purchases would enable De Beers 'to donate a prosthetic for an African whose hand was lost in diamond conflicts.'"
It's funny.  Laugh.

PETA Using Games To Spread Its Message 477

Cooking Mama is a series of games for the Wii and the DS in which players go through a number of steps to prepare meals using a variety of recipes. Last week, People for the Ethical Treatment of Animals (PETA) created their own Flash-based parody of the game, highlighting the use of meat products by having a more bloody-minded Mama do things like pull the internal organs from a Thanksgiving turkey. Cooking Mama's maker, Majesco, issued a light-hearted response, pointing out the vegetarian meals in the game. PETA then said they plan to continue making parody games as a way of "engaging the public."
The Courts

Submission + - Hacker Could Keep Money from Insider Trading

Reservoir Hill writes: "On Oct. 17, 2007, someone hacked into a computer system at IMS Health. A few minutes later Oleksandr Dorozhko, a Ukrainian resident, invested $41,671 in put options that would expire worthless three days later unless IMS shares plunged. The next morning IMS announced earnings and the share price did plunge, making $296,456 for Dorozhko by selling the puts. "Dorozhko's alleged 'stealing and trading' or 'hacking and trading' does not amount to a violation" of securities laws, Judge Naomi Reice Buchwald ruled last month. Although Dorozhko may have broken laws by stealing the information, "Dorozhko did not breach any fiduciary or similar duty 'in connection with' the purchase or sale of a security" and she ordered the SEC to let him have his profits. Through a strange anomaly in American securities laws a person who legally obtains insider information and trades on the basis of that information is breaking the law, while someone who illegally gets their hands on such information may not have violated the securities laws by trading on it. If her opinion stands, it will be very hard for the SEC to go after hackers in the future. The judge herself appreciated the absurdity of the situation, and expressed disappointment that the Justice Department had not brought criminal charges for computer hacking."
OS X

Submission + - Apple fails to deal with change to NZ DST

NTDaley writes: Debian may not have pushed their update for the NZ daylight savings change, but Apple has failed to deal with it at all. Their website instructs users to change the time manually, which is obviously inadequate for people who have to administer a large group of computers, or who need to have accurate times for other timezones. Fortunately a third party has created a fix for the problem.
Space

Submission + - Sputnik at 50: An improvised triumph (yahoo.com)

caffiend666 writes: "According to an AP News article, "When Sputnik took off 50 years ago, the world gazed at the heavens in awe and apprehension, watching what seemed like the unveiling of a sustained Soviet effort to conquer space and score a stunning Cold War triumph. But 50 years later, it emerges that the momentous launch was far from being part of a well-planned strategy to demonstrate communist superiority over the West." "At that moment we couldn't fully understand what we had done," Chertok recalled. "We felt ecstatic about it only later, when the entire world ran amok. Only four or five days later did we realize that it was a turning point in the history of civilization." "And that winking light that crowds around the globe gathered to watch in the night sky? Not Sputnik at all, as it turns out, but just the second stage of its booster rocket...""
Security

Submission + - Anyone still in the "just use root not sudo

An anonymous reader writes: Some time ago, I saw some decent arguments in favor of just using a root account only on certain machines, not going for sudo and individual admin accounts. It may have been on an old OpenBSD mailing list. I can't find it now but it made me wonder, given the current landscape of SOX, ITIL, etc and the continuing misdirection by upper management, politician and consulting firms that the answer to corporate malfeasance and poor performance is in CCTV and keystroke monitoring of low level employees, is anyone still using and/or willing to admit to using root only? sudosh seems to be an interesting option, I've tried it and if it was a little more up to date, it appears to have some better logging features than other FOSS options for root level task logging.

Anonymous because I don't want to be torn to shreds by enthusiastic sudoers.

Slashdot Top Deals

Money isn't everything -- but it's a long way ahead of what comes next. -- Sir Edmond Stockdale

Working...