Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:NO! (Score 1) 366

In addition to my contract jobs from home, I have worked as a W-2 employee for three corporations. All three have been small local businesses. I appear to have made a wise choice based on how endemic denial of essential tools appears to be in large businesses.

Comment How expendable are you? (Score 1) 366

I shouldn't have to worry about these things if all I want to do is make a quick goofy little icon or whatever.

Does Paint even include an exporter for an icon file that includes multiple sizes?

But sometimes, part of the job includes knowing when to pick your battles.

True. I'm also aware that which battles to pick depends on how expendable the company considers you to be. This is probably why I haven't had quite as much problem getting GIMP approved as some other users are reporting, as I've worked at mostly small businesses.

This brings me to another point: Sometimes, picking your battles includes picking your employer. "I left when I realized the company made a habit of refusing to provide suitable tools to do my job on a reasonable time frame. Assigning projects that require image editing without allowing use of a basic image editor, even one distributed as free software, was the last straw."

Comment You are being paid to tilt at windmills (Score 1) 366

Some of us have Actual Work to do that doesn't involve tilting at IT windmills.

If your employer's IT department presents windmills, you are being paid to tilt at them. Then you can use your days off to polish your CV so you can find a job with a different employer whose IT department is less dysfunctional at approving widely used applications distributed as free software.

Hammers for nails.

You are dealing with an IT department that requires excessive red tape to obtain a hammer.

Comment MITM instead of breaking encryption (Score 1) 203

Self-signed certs force encryption, so I'm not sure how an ISP would able to crack that encryption [...] The problem with self-signed certs is there is no mechanism that requires the cert owner to actually control the domain the cert, no way to ensure the server you are connecting to actually is who it ways it is.

You answered your own question. Instead of letting a subscriber connect to a server with a self-signed certificate, the ISP would intercept the connection, act as a server to the subscriber, and act as a client to the real server. Browser publishers warn for self-signed certificates but don't warn for DV certificates because they have agreed that https in the scheme means some level of verification that the domain and server share control.

Slashdot Top Deals

Unix will self-destruct in five seconds... 4... 3... 2... 1...

Working...