Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Egocentrism (Score 2) 517

Er, what? The Tamil people, quoting Wikipedia for convenience,

Tamils were noted for their martial, religious and mercantile activities beyond their native borders.

and again, further in the article...

Although most Tamils are Hindus, most practice what is considered to be folk Hinduism, venerating a plethora of village deities. A sizable number are Christians and Muslims.

Comment Yes (Score 4, Funny) 388

Yes, I have this exact same problem. However, I do not keep other people's e-mail.

I have been able to track down the correct people to whom the e-mails belong. In two cases, the people are lawyers and the e-mails contained either personal or confidential information. Another case is a general contractor, and I've received quotes from subcontractors, blueprints and general correspondence. In one case it was a confirmation of tickets for a theme park. (I debated showing up as soon as the park opened and claiming the tickets, but ethics got the better of me.)

These people now reside in my address book. I forward the e-mail in question over to them, and CC a copy to the sender.

One guy kept signing up for things using MY e-mail address instead of his. (name@isp.com vs name@gmail.com) He finally got the hint when *I* got the login information for his match.com account. (Ethics was still distracted by the theme park tickets case and lost.) Considering he was a single lawyer in San Francisco, I think my updates indicating he was gay, submissive, into BDSM and wealthy might've paid off. He seems to be extra careful in which e-mail address he uses now.

Submission + - Red Hat and CentOS Partnership

chill writes: CentOS and Red Hat have announced they are forming a partnership. Some of the existing CentOS Core members are moving to take up roles at Red Hat, as a part of their sponsorship of the CentOS Project, allowing these people to work on the Project as their primary job function.

The groups will be working as part of the Open Source and Standards team to foster rapid innovation. The new initiative is going to be overseen by the new CentOS Governing Board.

CenOS has also unveiled a new website design.

Comment Re:Capability Based Security (Score 1) 60

Copying and providing proxy access are process controls. You discipline people for that.

You're demanding something perfect and rejecting anything that doesn't measure up. The real world doesn't work that way. Security layers are added depending on the specific needs for confidentiality, integrity and availability.

Something like the formula for Coke or the KFC Original Recipe get more protection than the cafeteria's lunch menu.

Comment Re:Capability Based Security (Score 1) 60

SELinux (and SEAndroid)

...because we're all system administrators of our own machines, when it comes down to brass tacks.

No, you're not. If you allow that it is Discretionary Access Control. There has to be a master policy that is enforced, limiting DAC to only where appropriate.

For example, if Alice allows access to Bob and Charlie, she should have the ability to restrict resharing. That is, unless Alice allows it, neither Bob nor Charlie could grant access to Dan. Therefore neither Bob nor Charlie is a true admin of their machine.

Comment Re:True quote (Score 2) 292

Oh look, a tourist, an easy mark, and a rich one as well.

And a streamed video of the thief automatically uploaded and sent to the police with GPS coordinates. Add GPS monitoring and tracking to that app just for fun, and remote disable to make the resale value worthless.

The current prototypes are $1,500. They'll get cheaper and cheaper pretty quick. In a couple of years I can see these easily being $150.

I can also see them used in typical corporate settings. Having the power of Google search, plus access to all company data everywhere will be a "must have".

Slashdot Top Deals

The biggest difference between time and space is that you can't reuse time. -- Merrick Furst

Working...