Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Software

Submission + - Is Software Piracy Killing Jobs?

Murthy DN writes: During his visit to India, Steve Ballmer (CEO, Microsoft)said "By reducing piracy by just 10%, it would lead to the creation of 50,000 new jobs in India.". The full article is here.
Do you think software piracy is killing jobs?
Software

Submission + - Timesheet management software.

An anonymous reader writes: I currently work as a help desk supervisor for the IT department of a top 30 american university. We have around 40 graduate and undergraduate students manning our support areas at different times of the day and night, and a recent augmentation of our budget has us in the position to hire more. We still do our master schedule with a moderately complex Excel file, our timesheets are submitted online using a webpage, and our workers' clock in and out with a seperate webpage which gives us reports in CSVs that we import into yet another spreadsheet. Needless to say, our current, time-consuming method is rather clunky and has us looking at alternatives.

What existing systems are out there that might fill our needs? What systems should we avoid?
Music

Submission + - Best practices for a lossless music archive

Sparagmei writes: I'm a big music fan, and I like listening to the music I own on various pieces of digital gear. Right now my library's at about 20,000 tracks, ripped from CDs to MP3 at 256kbps (enough that I can't tell the difference on my low-end playback gear).

However, with the MP3 judgment rippling through the world, I'm interested in perhaps moving to a different compression standard. Before I do that, I'd like to ask a question: what lossless format would you recommend for making a digital "master library", which could be (relatively) easily downsampled to a compressed format? Important factors would be true losslessness, filesize (smaller than PCM WAV would be nice), embedded metadata (id3v2-like), existence of automated ripper software, and (to a lesser extent) open-source implementation of such software. Widespread playback implementation of the lossless codec is not an issue for me; the lossless library would likely be burnt to archival DVD media and stored after being downsampling with the chosen compressor.

The reason I ask is this: I've got a 20,000-track re-ripping job ahead of me. I'd like to do that just once, lossless, so that years from now, when I decide to jump from Vorbis to "komprezzor_2039_1337" or whatever, I don't need to drag out the old plastic discs. Thanks!
Security

Submission + - Laptop hibernation a security risk?

wally writes: "I was having a long think today when it popped into my mind, is hibernation on laptops a security risk?

My flow of thought went like this: if I stole a laptop knowing that it had encrypted home and root partitions (assuming a Unix-like OS), presumably if it has a separate swap partition, that'd contain an unencrypted snapshot of the system prior to hibernation.

Therefore, this RAM image is presumably exploitable. Booting a USB stick would allow closer examination, presumably I could do anything from reading an open sensitive OpenOffice document to inserting some exploitable code into the frozen kernel to do something nasty when the laptop is next booted.

Even if the system keeps a checksum somewhere hidden to ensure the integrity of the RAM image before loading, you could at the least extract some potentially sensitive details that would otherwise be safe?

What do other slashdotters think? Is this an easily exploitable threat that should see suspended RAM images encrypted?"
Software

Submission + - A judge-compatible tool that enforces the GPL?

Dave Taylor writes: "Does there exist a tool that takes as inputs an arbitrary compiled executable and the source code to a GPL project, and that then compiles that GPL source down using different compilers and compiler versions, and then does all the clever machine language interpretation to figure out whether odds are high that sections of your source code has been ripped off? If it does do this, is that tool's output enough for a judge to write a subpoena to see the source code of the executable in question to see if it violates the GPL?"
Security

Submission + - Webmail at Work

rtobyr writes: "I don't allow users at my organization to use any third party e-mail. When users complain, I point out that we can't control the security policies of outside systems. End users tend to think that big business will of course have good security; so I ran a test of the "Big Four:" Hotmail, Yahoo Mail, AOL/AIM Mail, and GMail. Yahoo Mail was the only webmail provider to allow delivery of a VBS script. GMail was the only provider to block a zipped VBS script. End users also tend to think that a big business would never pull security features out from under their customers. We Slashdotters know that AOL and Microsoft have both compromised the security of their customers. I don't know of any security related bad press for Yahoo or Google. Three of my Big Four either allow VBS attachments or have a poor security track records. So my Ask Slashdot question is this: If you are a network administrator, do you limit your users' ability to use third party e-mail, and if so, do you allow for GMail or other providers that you've deemed to have secure systems and repuations?"
Networking (Apple)

Submission + - OS X unable to write to large volumes using Samba?

groovemaneuver writes: "I'm the IT Manager of a small/mid-sized college network that consists mostly of GNU/Linux servers with a near 50/50 split of Apple OS X and MS Windows XP workstations. We have a Samba-based file server with a 4 TB RAID, and the WinXP boxes connect, read, and write normally. However, the Mac boxes can connect and read, but they see every share that is hosted on the RAID as having 0KB available, and refuse to write. As a test, we created an identically-configured share hosted on the server's OS drive (about 80 GB), and the Macs connected just fine. We also have a few GNU/Linux workstations, and they can all connect to the shares without issues. Is there a limit to how large a Samba share can be before Mac clients crap out? Are we the only ones dealing with this? Is there a known solution? (my Google skills are usually pretty good, but I couldn't find anything)"
Windows

Submission + - DST, the new Y2K for Consultants

fatalwall writes: "I work at a consultant firm that is has been looking at the Daylight Savings Time change of three weeks earlier and what updates are needed for various software. We have discovered that there is an update for Windows, Exchange, Outlook, blackberry ect. Grandly Microsoft has not provided updates through Microsoft updates for all of these. We have found various tools online that will help however we have some clients that use outlook with PST's which requires every user to run an update. The only thing I can find our people complaining they cant find a solution. How is everyone else dealing with this problem? What have you found for solutions?"
Unix

Submission + - Getting out of tech support

An anonymous reader writes: For the last year or so I've been working in 1st line tech support at a small call centre that's part of a much larger outsourcing company and to be honest it's sucking the life out of me, I want change but I don't know what direction to take in order to get out and I really need some advice from others who have made the jump.

I'm in my mid-twenties and I've taken a number of college-level courses, a couple of those being computer engineering courses, some math and a few others that I found interesting, in the process I also managed to procure a fairly large amount of debt in the form of student loans, nothing I can't handle but I don't really want more debt although going back to get a degree is one possibility. I'm not entirely sure what I want to do except that I want to do something a bit more "real", to actually fix problems instead of just talking to customer after customer and then submitting tickets for someone else to fix the problem. From what I've understood from older acquaintances moving from tech support to other positions was actually a good way to go back when a lot of companies handled their own tech support, but for me there isn't much of a career path at this company as we only handle 1st line support, 2nd line and all above is done by the client companies themselves.

I'd really like to get more into sysadmin type work, or at least something where you spend more time solving problems and managing systems than you do arguing with irrate customers over how they have to call customer service for billing questions as technical support can't handle those problems. I suppose what I'd like to know is what kind of jobs one should be looking for coming from technical support with decent knowledge of UNIX, networking, scripting and "light coding". Is there any hope for me or will I have to go back to school in order to even have employers look at my resume?
United States

Submission + - Best Money Management Software?

An anonymous reader writes: I want to start managine my personal finances on my computer. What's the best software program to use? I hear good things about Quicken and Microsoft Money, but are any of those open source financial programs any good? (JCash, GNUcash, Grisbi, etc.)
Linux Business

Submission + - Linux distribution....

tiredofnick writes: Have any slash dotters done mass depolyment of linux builds? I'm talking the Symantec Ghost for Linux... Is there any sort of solution for linux in terms of mass distribution over Ethernet? Let me know slash dotters!
Spam

Submission + - Spam-bot intrusion caught! Now what?

An anonymous reader writes: I've recently detected and halted an intrusion on my home computer, taken some actions to prevent further intrusions, and located the software that was running a bot agent. Cursory examination showed that the bot software is intended for acting as an agent for spamming. Configuration files distinctly point at the user/host/domain of several bot-herders — damning evidence. To whom should I disclose this information for appropriate investigation, follow up, and countermeasures? Nothing would please me more than to see this botnet to be caught and dissassembled, I'm sure much of the internet-using community would support this. Thanks in advance for your suggestions.
Businesses

Submission + - Can I sell my used mp3s?

An anonymous reader writes: Can I sell my used digital music that I purchased online?
Windows

Submission + - Contacting Intel Technical Support?

drivel writes: I have been troubleshooting Vista Ultimate for almost a week and found out that there are some issues with the Intel Pro/1000 PT Server Adaptor, every time I startup Windows I get Limited Connectivity.

I have tried to contact Intel, and their support is just useless, every e-mail they sent is just a direct copy from their knowledge base articles, such as:
  — "The adapter was tested and it worked fine"
  — "The drivers can be found at the following URL..."
  — "For further information please contact Microsoft."

In order to make sure the problem is not related to my particular of Intel adapter, I have setup another machine with similar config and plug in another Intel Pro/1000 PT Server Adaptor, but the problem still exists.

Then I contacted Microsoft support, and they have supplied me the location of the driver for my old network adapter, and when I use that non-Intel network adapter card, there is no problem at all.

Since the Intel Pro/1000 PT Server Adapter cannot work properly in Windows Vista Ultimate, they suggest me to contact Intel, however with the above level of support from Intel, it is really hard, if not impossible, to fix the issue.

Is there any way I can get someone that provide real technical support from Intel? Or is there any tactics to contact technical support?

Slashdot Top Deals

The one day you'd sell your soul for something, souls are a glut.

Working...