Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re:Here's why (Score 1) 814

The Mac in your comparison has the most expensive processor and actually looks like something you'd want to put on your desk, that's why it cost more. You don't mention details about the monitors other than size. Apple have great screens, I'd be surprised if the Dell/HP are comparable.

If anything your comparison supports the idea that Macs are fairly priced.

N.B. Not a Mac user.

Comment Re:Transactions need 3 elements to be safe... (Score 1) 193

Pah, repost, with formatting this time.

I trust my mobile phone as much as I trust a SecurID token, I would certainly realise if it went missing a lot sooner.

I think there was an article on here a while back about people being able to hijack phone numbers, so it's not perfect, but it does allow a convenient and cheap way to handle 2 factor authentication and transaction signing.

I use this on one of my accounts:
1. I enter my online banking ID and password and click next.
2. A 6 digit code is sent to me via SMS with the phone I registered for the service, the SMS includes the time of my last login.
3. I enter the code and click next.

I'm then able to browse my bank statements, if I want to make a payment an SMS is sent to me with:
1. The amount
2. The IBAN
3. A new code.

I have to enter the code to complete the payment, obviously the code that is sent to me changes every time and is valid only for a short period.

To compromise my account an attacker would have to get my login ID, password and corresponding phone number, they'd also have to have a way of intercepting my SMS without me knowing. I think the level of security offered is enough to convince an attacker to try a different bank.

Comment Re:Transactions need 3 elements to be safe... (Score 1) 193

I trust my mobile phone as much as I trust a SecurID token, I would certainly realise if it went missing a lot sooner. I think there was an article on here a while back about people being able to hijack phone numbers, so it's not perfect, but it does allow a convenient and cheap way to handle 2 factor authentication and transaction signing. I use this on one of my accounts: 1. I enter my online banking ID and password and click next. 2. A 6 digit code is sent to me via SMS with the phone I registered for the service, the SMS includes the time of my last login. 3. I enter the code and click next. I'm then able to browse my bank statements, if I want to make a payment an SMS is sent to me with: 1. The amount 2. The IBAN 3. A new code. I have to enter the code to complete the payment, obviously the code that is sent to me changes every time and is valid only for a short period. To compromise my account an attacker would have to get my login ID, password and corresponding phone number, they'd also have to have a way of intercepting my SMS without me knowing. I think the level of security offered is enough to convince an attacker to try a different bank.

Comment Re:Porn and hamburgers (Score 1) 512

Are you saying the actual food looks exceptionally good, or that the pictures look equally pitiful? Maybe it's different there...

I'm saying the food looks ok and based only on the pictures I can establish if I have been given BigMac, a cheese burger or a Filet-O-Fish.

Well, see if you can at least see the differences here. ;) (You're not completely blind, I hope? Although even with a screen reader you'd get the description beneath each photo.)

No I just have bad eyesight ;-) You could argue that at least the advertising pictures show what the burger contains, it would be impossible to tell from the actual burger. The KFC and Taco Bell realities look like road kill though.

Comment Re:Porn and hamburgers (Score 1) 512

I live in Switzerland, the photo pretty much matches what you get here. On point 3 you have me though.

Anyway, pedantry aside my point is that the picture is meant to represent a McDonalds burger, of which there are many and a variance is expected. When a photo Halle Berry is airbrushed the real Halle Berry is misrepresented and young girls might aspire to a figure or look that is, in fact, unobtainable.

A decent comparison using the McDonalds burger analogy would be if we took a picture that was simply meant to represent a human, you would understand there are many humans and that not all humans look exactly like the picture and the picture is unlikely to be idolised and figure aspired to in the same way that of a celebrity might be.

Comment Re:Porn and hamburgers (Score 1) 512

But does this apply to persons only? I hope we'd finally get to know the truth about McDonalds hamburgers. Or can we count them as persons?

Pictures of burgers are representative of the type of burger you can expect, you do not expect the exact burger that is in the photo otherwise they would have to take a lot of photos!

Good for the French anyway, this can only be a positive thing.

Comment Re:Indeed (Score 1) 408

Can you beat Google's uptime? I doubt it. Sure, it's not impossible, but you won't be doing it for less than $50/user?

Exactly, I challenge anybody on here to claim that they have achieved better uptime than Gmail, since 2004, with their corporate mail service. Don't forget that planned maintanence counts for downtime.

Comment Re:"Teach a man to fish" (Score 3, Insightful) 926

In terms of a CIO he just wants to eat, he doesn't care if it's fish, burgers or bread. The FSF completely miss the point here, sending what amounts to basically a hate letter to fortune 500 companies is really damaging to free software, it makes FSF look like lunatics which as a knock on effect makes things more difficult for the sales teams of people like Novell and RedHat. If you they are going to send deranged letters at least send a positive message with a clear and honest comparison of the benefits of both open and proprietary software. I wish we could make this windows7sins website go away.

Slashdot Top Deals

"The geeks shall inherit the earth." -- Karl Lehenbauer

Working...