Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:ok i wanna hear from wordpad users if they exis (Score 2) 120

BINGO. This is the only reason I ever opened WordPad.

To avoid this, here's a pipeline script that will convert a Unix text file to Windows (MS-DOS) format:

#!/usr/bin/perl
while () {
chomp;
print "$_\r\n";
}

And to go the other way...

#!/usr/bin/perl
$/="^M";
while () {
chomp;
print;
}

Comment Oil Sands (Score 1) 193

⦠Albertaâ(TM)s oil sandsâ¦

You know, whenever you use the phrase âoeoil sandsâ, youâ(TM)re repeating petroleum industry propaganda. In Alberta, the resource was so dirty and of such poor quality, it was originally referred to as âoetar sandsâ.

The (successful) effort to rebrand âoetar sandsâ to the less filthy-sounding âoeoil sandsâ is reminiscent of how âoeglobal warmingâ has been replaced with the more politically acceptable âoeclimate changeâ.

Comment Re:Ackchyually (Score 1) 56

Technically it's not my IP, it's my ISP's and comes out of a randomly assigned pool. But thank you for playing.

That is a meaningless distinction. It is effectively your IP address for as long as you are using it.

Also, using a dynamic IP address does not mean that Skype (or any webserver you access) can't use the IP you were assigned for geolocation, which is the threat this article discusses. (You would need to tunnel your traffic through some kind of VPN to obscure that).

Comment Re:Would it be too much to ask that for just once (Score 1) 293

start talking about the real issues, instead of just the ones that inflame everyone and accomplish nothing?

Exactly. The thing about social media is that it's so susceptible to troll farms run by foreign adversaries. The US will never solve its real problems (mass shootings, racial tensions, healthcare, wealth distribution...) so long as half the population can be distracted by "OMG - this package has a rainbow on it !!!". And this is precisely what adversaries of the US seek to continue.

Comment I call bullshit. (Score 1) 218

my sister now spends at least an hour on the phone every day trying to talk our mother through trying to do iPhone shit.

Most older people will use a smartphone for phone calls, SMS, email, maps, and maybe a few games. I've never heard of an older person requiring "at least an hour every day" of support. Perhaps you're being a tad histrionic here?

If your mother really is spending over 7 hours per week making the screen brighter/dimmer, changing the ringtone, finding the contacts app. etc. - then I suspect that the phone itself is not the problem.

Also, you refer to iPhone users are "fucking elitist morons", which is funny because your partisan diatribe makes you sound like an elitist yourself.

Comment Re:They hype was because of tax dodges (Score 2) 137

... everyone with money gave up since they couldn't buy a $50k NFT, declare it's value $1m, "donate" it and take a $1m tax write off on a $50k purchase.

That's an interesting take, but surely tax auditors are not stupid enough to let people simply "declare" an arbitrary value on donations? If that's the case, why would an NFT be required? You could take any type of art or collectible item and claim an inflated value.

Comment re: Isn't this part of their job? (Score 1) 28

JumpCloud provides a lot of authentication for a lot of companies. Because of this, it is assumed that they are going to be hit by nation states, and they are going to need to prepare for that. None of this is rocket science.

This kind of arrogant bullshit aggravates the hell out of me. You think it's simple to protect again state-sponsored hackers? You think all you need to do is follow some "Best Practices" guide? Think again.

As an Administrator, you can follow every best practice, and patch 1,000 vulnerabilities, and it only takes one exploit to knock you over.

Let's consider just one best practice - the timely install of security patches. Do you know what happens when Microsoft releases a security patch? Assume it's for a newly-discovered vulnerability that they have been keeping secret until a patch was available. As soon as the patch is released, hackers will reverse engineer it to see what software components it affects, and will figure out how the vulnerability can be exploited. Then, because they are constantly port-scanning huge portions of the Internet and logging open ports, including specific version information on listening software, they will already have a list of vulnerable targets to be attacked. Then, after gaining a foothold on the network, they'll use hacking tools and additional exploits that you've never heard of to move laterally.

People who've ever been on the receiving end of a sophisticated attack don't go around yapping about how easy security is.

Comment Re:NUCs weren't very reliable (Score 2) 67

You're absolutely right. I started deploying NUCs ask desktop boxes for my clients shortly after they came out. I've deployed upwards of 40 NUCs, across a variety of models. I began to see higher failure rates than with other systems. Failure to recognize the presence of an SSD was a common problem I saw. Some models had some kind of foam strips that pressed against the M.2 SSDs. This material would deteriorate and secrete an oily liquid that I suspect was the cause of several failures. The fans were also prone to failure, and replacements were hard to find. I started switching to Dell OptiPlex Micro boxes as an alternative. They're a little bit larger footprint, but not much. They're also not barebones, but are configurable and reasonably priced. So far I haven't had a single issue with any of them.

Slashdot Top Deals

Diplomacy is the art of saying "nice doggy" until you can find a rock.

Working...