Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Well its a start (Score 1) 154

Read only makes it easy to start with. Maybe now tweetdeck and others can get view capabilities. If I can see things on G+ I am likely to go over and post.

The trick with Write is the authentication. Now google has to figure out how to do an authentication scheme it likes (read "they developed to take over the web") for that to happen.

Comment Re:$6 million? (Score 1) 140

Assuming 100% markup profit margin over baseline (common practice really) were looking at a baseline cost of $3 mil.

Now we need to factor in an encryption scheme that works across Windows, AIX, etc with enterprise support backing it up say $1.2 million to licence for all servers and locations (seem low but hey) and we have $1.8 million to spend.
Now we gotta pay people some prices to do that work so lets say $.5 million (500,000) so about $100 per man hour (bout right) and we have $1.3 to spend.
Now pay the electrical company for all that processing time (depending if they had THEM process it or they did it on their servers) at about $.5 million and we have $.8 million (800k) to explain.
Throw in some training for a few Ks to ensure the techs know how to handle the system lets say 100,000k for that (ouch! hey that is specializations ya know) 700K to go.
Maybe a little software rework (even if it wasnt really necessary) for another 100k and we have 600K to explain.
Opps forgot the "maintenance contract" which is often 10% of the sale price so 600k and lookie there, 6million blown pretty quick.

Thanks for shopping.

Comment Breaks Jailbreak (Score 3, Insightful) 94

Problem is that applying this update for something that is not likely exploited in the wild will hose your Unteathered Jailbreak. Reports on twitter are that redsn0w pointed at 4.3.4 (or 4.2.9) will work for getting a tethered Jailbreak. Many jailbreakers likely wont bother.

Wonder if someone will patch this like they did the PDF exploit and put it on Cydia.

Comment Re:so? (Score 1) 639

"known USB" means that the Serial Number is known to the central IT manager and approved for use. Not just "oh look this is a legit Cisco" or "nifty a MS flash drive" as know. The flash drive is brought in and signed off for use. Then the only flashdrive based attack is one where a flash drive is lost, infected and then returned.

Besides, bling drives are usually small anyway and suck. I would be very suspicious of a "bling" drive that was of any large size.

Comment Re:Dupe isn't even a day old!! (Score 1) 151

Dupe isn't even a day old!!

Oh I am going to be modded into oblivion for this, and likely loose some karma, but it was actually ~27 hours (4:20 am for article1 on 6-23, 7:19am for article2 on 6-24).

However this trend is quickly becoming problematic and approaching same front page dupes and soon both in the 15 count RSS feed. Do the editors even read the site?

Comment How will this help? (Score 1) 151

What I want to know is how filtering of these sites will help at all.

SERIOUSLY! HOW?

Here is what I am seeing. Austrailia blocks these sites and what happens:
  1. Technology is downloaded and used to get around this filtering (VPNs,alternate DNS,etc.)
  2. New sites pop up creating a game of whack-a-mole
  3. Lawsuits and public outcry killing the project
  4. Long shot but the viewing of these sites might go down

Now you will notice that nowhere on that list does the terms "kiddie porn sites go away" or "kids stop being exploited" appear. It will continue to happen at places around the world, I honestly think response will go 1-2-3-4 in Australia, and the intended purpose will never happen. Want a better option one that is even more sinister? Honeypot em. Dont filter. Trap em. Watch the sites you Blacklist, observe the people going, trace and trap the network and strike hard.

Block sites. Everthing ventured, nothing gained.

Comment Coulda just use UT3 as a starting point but no... (Score 2) 462

I always thought that DNF would be easily done as a Unreal Tournament 3 mod. Massive weapon set (10 or more depending on numeric reuse), maze like levels, good look and feel engine (ur3), jiblets and bits code ready. Thought it would have been easy. Guess they wen their own way and screwed it up.

I played the demo. The instant I had to juggle weapons I gave up on it. Duke deserves better. Try again Gearbox.

Comment Re:Moral of the story (Score 1) 62

Um nothing? I play with them next to my HDs all the time and the backups still work fine. Of course this is my personal machine and I am not to paranoid about the backups getting hosed.

We also took some HD magnets (scrapped from an old HD we just wiped) and tried to zap a stack of remaining HDs to be wiped with them. No luck. We could still read the data off of it when we tested to see if the magnets worked so we had to DBAN each and every one of them.

Buckyballs next to the tape archives.... well that's a different story.

Comment Wait he used old passwords? (Score 2) 62

Why wasn't this guys password deactivated? Did Gucci actually have common all-powerful known to all the engineers? We did that at our little IT shop because we didn't have full control of the network (we were a first response team to the main IT guys). It seems like you would give the guys some logins to use to things, use LDAP or ActiveDirectory groups to put them in the admin user level, and then when they leave/fired/downsized/outsourced/etc revoke them from the admin group(s).

How many times do we need to read "Fired techguy used his/known admin passwords to cause hell" before someone catches on?

Comment Re:Ok, Next .... or not cause your stuck. (Score 1) 173

if you have satellite radio you can listen for free online

You can listen online for free? News to me. My Sirius package doesn't have internet access last I checked. Maybe I need to try logging in.


Oh, and just how do you get any of those services on your XBOX360 or other device that ONLY has Last.FM?

Comment Re:Realistic analysis of he daa (Score 4, Interesting) 299

This correlates to IE market loss, so it is reasonable to suggest that chrome users are abandoning IE.

The simple fact could be that Chrome does not require administrator privileges to install. Users at offices where we are not given admin rights can install Chrome over IE and use it without slogging through a helpdesk ticket for something IT deems unnecessary. This may account for the growth we see as users are looking for more freedom and the bells and whistles a more modern browser with the ability to install extensions without needing better permissions.

Perhaps we are seeing a leveling out as those who want a different browser are finally being exhausted and entering a "long tail phase".

Slashdot Top Deals

Today is a good day for information-gathering. Read someone else's mail file.

Working...