Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Transferring employees (Score 2) 179

Sounds to me like 3000 employees just finished their last TPS report.

"Hi Mike, yeah.. remeber that TPS report? Yeah.. that one I asked you to yeah.. fill out before the end of April? Yeah, we won't be needing that here anymore, yeah... so if you would just put all your stuff in this box and yeah... head over to Accenture that would be great."

Comment get a grip people - It's just a phone! (Score 1) 195

The upgrade frenzy caused by Apple is really, really concerning. Just the labor practice alone[1][2] is appalling enough, not to mention the the amount of energy[3] it takes to produce a new device every 6 months. Can't people live with the same gadget for at least a couple/few years without going ape every time something new comes out?

[1] - http://thenextweb.com/apple/2010/02/27/apple-child-labor-china-history-sketchy-manufacturing/
[2] - http://www.zdnet.com/blog/government/apple-may-be-poisoning-chinese-workers-and-doesnt-seem-to-care-should-we/9908
[3] - http://www.enviroliteracy.org/article.php/1119.html

Comment Steps to responding quickly (Score 1) 125

1) Warn Boss of vulnerabilities
2) Boss asks for time/cost estimate to fix
2a) Boss brings estimate to talking-head meeting
2b) people protest about their job process changing
3) estimate sits on Boss's desk for 3 months
4) Boss golfs with his sis's brother-in-law and they talk security
5) Boss comes to work next day, calls meeting about security
6) You remind him of estimate on desk for 3 months
7) meeting devolves into yucks about golfing/hangover
8) Boss calls you into office after meeting
9) Asks you to pick two of the "hottest" security bullets in your list
10) time/cost gets approved for two of the 10 security items
11) system eventually gets compromised
12) everyone runs amok, asks how is this possible
13) Boss approves 8 remaining security bullets
14) Goto 1

Glad I don't do security anymore.

Comment Re:FTFA, both sides seem guilty. I'm confused. (Score 1) 250

Hmm.. the author calls it an exploit in the article. Seems to me that anytime you devise a method to utilize something that it wasn't really intended for is indeed and exploit, hack, workaround, kludge, whatever.

I think it's marvelous this person found a way to use the system in a way it wasn't intended. He/She is probably very bright. Thing is though, if you're going to mess around in places you really aren't supposed to, don't be surprised if someone takes issue with it. That's the risk you take. Used to be people used pseudonyms to mitigate some of the risk, but that's a whole 'nother discussion on privacy vs. idiocy.

Comment FTFA, both sides seem guilty. I'm confused. (Score 1, Insightful) 250

Dropship that allows users to exploit Dropboxâ(TM)s file hashing scheme to copy files into their account without actually having them."

I can see why they would be a bit ruffled over this. Seems like this could be in the same realm as an SQL injection attempt. It's just using JSON instead.

"First of all, attempting to protect a proprietary protocol is going to get them nowhere. "

Ok, that's a problem. The reason the protocol is proprietary is because the company has put a lot of time, money and effort into developing their product. They want to recoup some of the development costs through the implementation of their protocol.

The DMCA thing well ...that's what the DMCA is. It's basically a catch-all b1tchstick that can be bent into whatever shape the law wants to blame whoever for whatever. The way dropbox handled things *is* pretty crappy IMO, but if you're going to be a dick and crack peoples websites.... expect to get dick'd back.

Comment 'securing' wi-fi with a password (Score 1) 964

A password doesn't equate to security.

It would be a lot harder to prove someone else used your setup when it's 'secured' with a password, but it can happen. Besides passwords being a piss-poor way to secure *anything* these days, many people choose stuff like their kids names, or birthdays or other crappy dictionary words.

What's worse, is a lot of people and places are still using WEP, which is useless in terms of accountability, but it would be enough for a court to say "You say you secured your setup but someone cracked it anyway? Yeah, right"

Nobody I know (corporates included) use a password like(lei3%dk&l[_#=3 anyway because it's "too hard" for users to remember.

Passwords are pointless for proving, or disproving, accountability.

Comment The Internet says Greenpeace tastes like chicken (Score 4, Insightful) 370

Slow roasted Greenpeace over a hickory smoked fire. Famous Dave's Devil's Spit barbecue sauce slathered all over, popping and sizzling in the hot coals as it slowly drips. Next to it, a rack of Greenpeace ribs slathered in the same sauce, cooks to perfection as it fills the air with a smokehouse aroma.

over a hot fire
I can't wait to take a bite
Greenpeace is cooking

Comment 'Stronger' is a prett general term (Score 1) 244

Malleability, Ductility, Tensile strength, Hardness, Abrasion resistance, Brittleness, Thermal conductivity, Thermal coefficient of expansion... they mention some of these, but the list goes on quite a ways.

It might be nice and light and easy to cover an airplane with, but if the plane hits a pebble on takeoff will it shatter a wing because it's really brittle? If same plane soaks up a bunch of rays sitting on the tarmac in 110F deg heat, does the stuff expand by a factor of 10? Likewise, when it gets to 40,000 feet does the stuff contract by the same amount? Another issue is shipping the stuff from Australia to wherever.. what kind of carbon footprint comes with the manufacting process and shipping it? Is adopting this stuff mainstream going to heat the planet even more?

I'm sure the stuff is made of awesome , but just sayin... it would be nice to see a little more in-depth info.

Comment This isn't a big deal (Score 2, Funny) 591

It's not like someone is going to break into your house to steal your iphone location logs. Besides, if my phone or ipad gets ripped-off, It may actually help to reveal where the thief's travels took him. Possibly implicating other theives. I think it's good that Apple is thinking ahead this way. Everyone can be an active participant in crime fighting.

Maybe this will even be enough of a deterrent that the 'other' handset manufacturers will adopt the same strategy for their devices. It could mean the end of technogadget theivery altogether. Also, this is a perfect example of an instance where Apple has pioneered another idea which will change the world to make it better, but they will never get the credit for it. Steve invented the Linux kernel you know... He and Chuck Norris.. it's all over the internet, go read it for yourself.

Slashdot Top Deals

The Tao doesn't take sides; it gives birth to both wins and losses. The Guru doesn't take sides; she welcomes both hackers and lusers.

Working...