Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment If I was Carlsen... (Score 1) 35

I would insist on using a keyboard for input from now on. This is ridiculous.

In the movies and chess analysis, they always use notation like "Queen's pawn to D4" and it's blazingly simple to X,Y label a chessboard. Battle Chess allowed you to do this back in the 90's FFS.

https://store.steampowered.com...

Comment Pertinent quote (Score 2) 224

From Goodfellas:
https://youtu.be/3XGAmPRxV48?t...

Fark you, pay me.

Company hired me because I have skills, and those skills cost money to acquire and maintain. I'm not asking farking ChatGPT to do all my work for me.
I'm worth what they pay me, so I ain't taking no pay cut to work from home. Try that and we'll find jobs elsewhere.

Submission + - A collection of fun databases for programming exploration

Esther Schindler writes: When you learn a new tool/technology, you need to create a sample application, which cannot use real in-house data. Why not use something fun for the sample application’s data, such as a Star Wars API or a data collection about World Cup contests? Esther Schindler, slashdot user #16185, assembled a groovy collection of datasets that may be useful but also may be a source of fascinating internet rabbit holes.

Submission + - Linus Tech Tips' YouTube Channel has been hacked by Crypto Scammers (overclock3d.net)

Kitkoan writes: Hackers had gained control of Linus Tech Tips' YouTube channel to promote a Cryptocurrency scam

Earlier today, hackers had gained control of the Linus Tech Tips YouTube channel and used it to promote a fake crypto giveaway that falsely used the name of Elon Musk and the Tesla brand (obviously without the permission of either party). Thankfully, the Linus Tech Tips crew has quickly worked to re-establish control of the channel, but not before the channel had started two live streams to promote AI, chat GPT, Bitcoin, and their aforementioned (fake) crypto giveaway.

At this time it is unknown how the Linus Tech Tips channel was hacked, but the good news is that it didn't take long for the channel to be taken back by its rightful owners. All links to the hacker's fake crypto giveaway have now been removed from the channel, and soon all evidence of the hack should be removed from YouTube.

Like any crypto giveaway scams, hackers had asked users to send crypto to the hackers with the promise that a large amount of crypto would be sent back. As is typical for these scammers, Elon Musk, a well known investor in cryptocurrencies, was used as the face of this scam (obviously without his permission). Scammers had claimed that Elon Musk was taking part in the "Biggest Giveaway Crypto of $100,000,000". Given the site's poor grammar, it is clear that the site has been created by foreign scammers, not Musk.

Submission + - Ask Slaskdot: IT Admins, will you be using Windows 11 on production networks?

John Smith 2294 writes: As an IT consultant who started in the days of DEC VAX/VMS, I find myself now maintaining several networks for small to medium businesses and non-profits. I object to Windows 11 insisting on an outlook.com / Microsoft Account OS login. Sure there are workarounds, but user action or updates can undo them. So I will not be using Windows 11 for science or business any more. Windows for work is over. I will be using Win10 refurbs for as long as they are available, and then Mac Mini refurbs and Linux. My first Linux Mint user has been working happily for two months now and I have not heard a word from them.

So, as an IT Admin responsible for business or education networks of 20 users or more, will you be using Windows 11 on your networks or, like me, is this the end of the road for Windows for you too?

It is the end of an era, and it just makes no sense for Microsoft to throw away the entire business and education market. Or does it? Is it just that the home gamer / viewer market is worth so much more?

Captcha: regret

Submission + - Disaster Recovery Causes Disaster On NYSE (cnbc.com)

cstacy writes: On Tuesday morning, the New York Stock Exchange failed to open normally, and trading was disrupted. "This caused significant price dislocations and trading halts" according to CNBC.

NYSE President Lynn Martin and other exchange officials confirmed to CNBC that the root cause of the Big Board’s trading glitch at the Tuesday open was due to a manual error involving the Exchange’s Disaster Recovery configuration.

After the 9/11 disaster, the NYSE was obligated to maintain a primary trading site (at the NYSE) and a back-up site (which is in Chicago).

On Monday evening, routine maintenance was being performed on the software for the Chicago back-up site.

On Tuesday morning, the back-up system (Chicago) was mistakenly still running when the primary system (NYSE) came online.

Because the back-up was still running, when the primary site started up some stocks behaved as if trading had already started.

As a result, Designated Market Makers (DMMs) (Wikipedia) who would normally publish an opening auction print for each stock were prevented from doing so because the system operated as if an opening had already occurred.

Another "file" problem, I guess. You computer people seem to have a lot of them.

Submission + - Critical Windows Code-Execution Vulnerability Undetected until Now (arstechnica.com) 1

joshuark writes: Researchers recently discovered a Windows code-execution vulnerability that has the potential to rival EternalBlue.
EternalBlue is the name of a different Windows security flaw used to detonate WannaCry, the ransomware that shut down computer networks across the world in 2017.

The latest vulnerability is tracked, allows attackers to execute malicious code with no authentication required. It is wormable, meaning that a single exploit can trigger a chain reaction of self-replicating follow-on exploits on other vulnerable systems.

The vulnerability is in the SPNEGO Extended Negotiation Security Mechanism, which allows a client and server to negotiate the choice of security mechanism to use. This vulnerability is a pre-authentication remote code execution vulnerability impacting a wide range of protocols.

“An attacker can trigger the vulnerability via any Windows application protocols that authenticates,” Valentina Palmiotti, the IBM security researcher who discovered the code-execution vulnerability. “For example, the vulnerability can be triggered by trying to connect to an SMB share or via Remote Desktop..."

Palmiotti said there’s reason for optimism but also for risk: “While EternalBlue was an 0-Day, luckily this is an N-Day with a 3 month patching lead time...”

Happy Christmas!

JoshK.

Slashdot Top Deals

What hath Bob wrought?

Working...