Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Over 30 years (Score 1) 160

It was the first time I witnessed how hype and a brand name could trump quality, especially because IBM had deliberately chosen a crippled processor (8088 was a 8086 with an 8-bit bus) - that was a harsh lesson.

I think that you're discounting the mechanical quality in the PC's success. IBM PCs were solid machines that had a resemblance to their mainframe terminals. Unlike many competitors of the time, PCs were neither overly clunky nor toy-like. Many business managers, who were not necessarily all that familiar with microcomputers, probably put a lot of weight into the mechanicals when they made purchasing decisions.

Sometimes I wish I still had one of those heavy clicky keyboards and that pleasing green long-persistence phosphor.

United Kingdom

Cameron's IP Advisor: Throw Persistent Copyright Infringers In Jail 263

An anonymous reader writes with this excerpt from TorrentFreak: "During a debate on the UK's Intellectual Property Bill, the Prime Minister's Intellectual Property Adviser has again called for a tougher approach to online file-sharing. In addition to recommending 'withdrawing Internet rights from lawbreakers,' Mike Weatherley MP significantly raised the bar by stating that the government must now consider 'some sort of custodial sentence for persistent offenders.' Google also got a bashing – again." The article goes on to say "Weatherley noted that the Bill does not currently match penalties for online infringement with those available to punish infringers in the physical world. The point was detailed by John Leech MP, who called for the maximum penalty for digital infringement to be increased to 10 years’ imprisonment instead of the current two years."

Comment Re:Over 30 years (Score 2) 160

I remember thinking "too little, too late" when IBM launched its x86 line (the IBM 5150 PC with 8088 CPU) in 1981.

  Damn, over 30 years later and we're still stuck with a variant of that architecture!

Too little, too late? You missed the target methinks. They dictated the architecture which is on desks these days, and made Microsoft unbelievably rich with that little oversight, letting Gates sell his version of DOS, too.

Where they utterly blew it, though, was in pursuing the regrettable PS/2 line up. Horrible machines which locked you into horrible upgrade paths. It was shortly afterwards they began shedding people so fast I didn't know which salesman I was talking to from week to week when we were acquiring an RS6000 for some stupid purpose.

Comment Written to deal with spies? (Score 2) 441

Pretty sure that those things are not problems to do with how these specific laws are written, they're fundamental flaws in the trial process and thus the judiciary itself. If such basic rules are being ignored then by definition you wouldn't know if an accused person was actually a traitorous spy or not, would you, because the system would be unable to come to any trustworthy conclusion.

Comment Re:Great Firewall of China is bad enough ... (Score 2) 270

I wouldn't say Net Neutrality is dead, only the attempt by the FCC to enforce it without the congress's say-so. Net Neutrality by law instead of arbitrary regulation is still an open door. Of course, that will involve democracy, and thus it would have to be popular (ie.e, actually matter to most people). Right now, most people don't care, but if the problem ever because actual, not theoretical, they would.

Most people don't understand. And even if you were to dedicate a half hour show on prime time television explaining it and why it's important to preserve liberties, people's eyes would glaze over and they still wouldn't understand. Though if some demagogue on radio or TV told them how they should feel about it, tens of thousands would queue right up behind whatever the position is.

It's like a return to the 1920s.

Comment Re:On the contrary: (Score 1) 276

And yet when an attacker can recover their plaintext password is doesn't really matter how "secure" the password was. I could have the strongest, most random password possible but if an attacker can steal it from you in plaintext, so what?

Indeed. I keep waiting for retina scan or DNA analysis, but it hasn't happened, yet.

and when it does the NSA will store all of that, too

Comment Re:2014 (Score 3, Informative) 109

I don't quite understand why auto popups like Livejasmin or 888casino can be allowed to popunder (I find them on client machines all the time) but when ever I ask one of my firewall to display me a log, update firmware or whatever (sophos & pfsense) the browser blocks it. I 'king clicked a button and the browser blocks it. Users do apparently 'nothing' and gambling and porn appear.

That said, uninstalling Chrome Browser and returning to firefox has been a great release.

I've had to return to Firefox just to get away from recent bugs in Chrome. Chrome as a pretty good browser in its time, but it's heading towards the shark on greased water skis.

Comment Re:Password Evolution (Score 4, Informative) 276

Create a password: password

Everyone is using "password." We need to stop that.

Create a password containing both letters and numbers: password1

Everyone is using "password1." We need to stop that.

Create a password containing numbers and both capital and lowercase letters: Password1

Everyone is using "Password1." We need to stop that.

Create a password containing numbers, both capital and lowercase letters and a special symbol: Password1!

And so it goes.

I was on an information system a few years back, if it didn't like your password, you couldn't use it and had to choose something more arcane. The downside of that is really nasty passwords, with changes of case, numbers and symbols end up written on Post-it notes and stuck on the fronts of computers.

Comment Re:On the contrary: (Score 3, Insightful) 276

If your password for Adobe is Adobe123, and Adobe leaks your password (AGAIN), nobody is going to be getting into your email, or your facebook account, or your bank account, etc., etc.

Even if the user is stupid, it's not like the site author couldn't dedicate a few minutes to to code evaluation of the password and tell the user 'Not good enough, not even secure in the least, do you want to see a picture of people who think that password is secure?' and display some of those Faces of Meth people.

even this lolcat is smarter than you

Slashdot Top Deals

"The one charm of marriage is that it makes a life of deception a neccessity." - Oscar Wilde

Working...