Become a fan of Slashdot on Facebook


Forgot your password?

Comment Re:Yes (Score 1) 605

It is impossible, IMO, to do many functions without these privileges.

I currently work in an environment where I don't usually need admin. I'm a self-employed Mac developer, and do all of my dev work in an unprivileged account. However that account is a member of the _developer group, which gives the debugger the right to attach to processes. That's frequently all I need. When I've worked in $bigcorp networks where developers do need admin or root, IT have typically created a sandbox network for developer machines to sit in which have access to SCM, the bug tracker, build environment front-end and so on but limited access to business systems and internet facilities.

Comment Local admin rights? (Score 2, Interesting) 605

Why not simply work on virtual machines? Then you know they are clean and you can have all the rights you want and still have comply with company rules.

In a lot of environments, setting up a good seperation is simply to costly in time, so you either end up with dev's with not enough rights to do their job or to many where they can endanger systems they shouldn't.

So it should not be needed to have local admin rights, but then the sysadmins got a hell of a job to setup everything so that it is not needed. Most sysadmins simply ain't capable of that, or if they are, are not given the time.

Comment Re:more evolved means better (Score 2, Informative) 568

He's over simplifying. Other things being equal, a population with a higher reproductive rate will out compete a similar population with a lower reproductive rate. The key there is other things being equal differences in organization of a complex population can be sufficient to counterbalance a reproductive rate advantage.

Comment Re:What happens when the reader breaks ? (Score 3, Insightful) 419

Let me start out by saying that I agree with you. And it's a good argument - it gets the emotional parts of the issue right out in the open. However, I see some things here that are going to be used, effectively, as a counter argument:

1. How many books do you own that you can pass on to your children? How old are those books?
2. Have you ever had a book destroyed through wearing out, getting destroyed by dog, fire, water, etc.?
3. Have you ever lost a book, had it borrowed or stolen?

I'm sure you can all see how these questions erode the argument. And the counter argument, pushing the statistical likelihood of a book being lost or destroyed before passing it on, versus the DRM getting screwed up - it's not very powerful. No one knows the real answer to that question - but people think they do - and so the argument loses those who already have an opinion.

Just some thoughts.

Submission + - Anti-virus software in Klingon (

grahamlee writes: "In what looks like a pre-launch leak, British security software company Sophos have released a Klingon version of their threat detection tool. From an anonymous coward quoted in an article over at The Register, "While other people are worried about down turns in IT spending, it seems that some people in Sophos have had the time between lighting cigars on £50 notes to turn out a version of the product in Klingon.""

Submission + - Linux boxes make ideal botnet controllers (

lysdexia writes: "Yet another warning about RstB, this time from over at daniweb, so it's somewhat less silly than the usual anti-virus company [Moose Diarrhea|Soda]. I have been running linux since I was given a copy SLS (19-odd floppies) back in the dream time and have never had a virus or trojan crop up on any of my systems. How are these spread? Doofusism?

From the article: Security researchers at Sophos Labs have revealed that nearly 70 percent of all Linux honeypot infections are caused by a single virus. Perhaps even more shocking, all things considered, is the fact that the virus in question, Linux/Rst-B, is actually six years old now. So concerned is Sophos at this identified trend that is has now made a specific tool available just to detect whether this one virus is present on your Linux based computer or server."


Submission + - Six years on, Linux RST-B infections still rife (

grahamlee writes: "Security firm Sophos' blog describes a detection tool for the Linux RST-B virus, which has been in the wild for six years but is still showing up on the firm's honeypots. By running the detection tool, Linux users can help SophosLabs to research the extent of RST-B infection and perhaps understand why it is still infecting Linux boxes, despite being detected by many different Anti-Virus programs.

[Disclaimer: I work for Sophos]"


All GeForce 8 Graphics Cards to Gain PhysX Support 114

J. Dzhugashvili writes "Nvidia completed its acquisition of Ageia yesterday, and it has revealed exactly what it plans to do with the company's PhysX physics processing engine. Nvidia CEO Jen-Hsun Huang says Nvidia is working to add PhysX support to its GeForce 8 series graphics processors using its CUDA general-purpose GPU (GPGPU) application programming interface. PhysX support will be available to all GeForce 8 owners via a simple software download, allowing those users to accelerate games that use the PhysX API without the need for any extra hardware. (Older cards aren't CUDA-compatible and therefore won't gain PhysX support.) With Havok FX shelved, the move may finally popularize hardware-accelerated physics processing in games."

Submission + - Linux and viruses: real threat or just more FUD? ( 2

An anonymous reader writes: Sophos have announced they are going to study the role of Linux in botnet plague.

Personally I have always regarded stories of Linux viruses as just another piece of FUD, but I suppose as the plan for global domination takes shape, the bad guys will come after us. How worried should we be?

Slashdot Top Deals

Premature optimization is the root of all evil. -- D.E. Knuth