Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment Re: Android is not Linux ... (Score 2) 321

Ya, I've seen this kind of troll before..

Most of his argument is that the UI is different. It's like saying that if you don't have a Gnome/KDE/Unity UI, you're not running Linux..

As a sysadmin, when I'm in a shell on Android, I see Linux. When I'm in a shell on a Mac, I see a Unix. When I open a cmd.exe window on Windows, I see Windows.

I was having some fun with some of my older Android phones a couple weeks ago. I put Dropbear Server II on. I had 4 shells open to 4 phones. I was remounting filesystems, moving files, using wget to collect stuff from my server, installpkg packages (with pm), chmod'ing files, and rebooting as I saw fit. It's just another *nix, and by his own admission a barely modified Linux kernel...

If it looks like a bear, and acts like a bear, and everything else says it's a bear, it must be a spherical chicken in a vacuum.

Comment Re:Android is not Linux ... (Score 5, Informative) 321

    You're expecting too much.

    Android is just another embedded *nix. I'm happy that it's Linux. You shouldn't expect it to have a whole bunch of scripting languages, and unnecessary servers.

    With all that said, it is a functional embedded system, where you *do* have the ability. to extend it do to all kinds of neat things.

    They provided hooks to just about everything in Java. I'm not terribly delighted with that decision, but it's what they went with.

    For most purposes, play is their package manager. For the majority of users, they'll never open a terminal. I do 99% of my phone stuff through the happy little touchscreen. That's the nice interface provided.

    If you really want the CLI package manager, you'll find pm, which does just about everything you'd expect from a package manager.

    You can get Apache, Perl, and pretty much whatever else you want on there. Is it going to be like developing for an x86 server or desktop? Not really. It's a different platform.

    If you're going to be developing for distribution, and not just for yourself, I'd recommend about the Android way to do it.. If you're doing it yourself, grab a copy of Perl for Android, and enjoy.

    If you're going to complain, well, that's up to you. At least research it a little.


Comment Re:TV (Score 1) 85

    I don't know why anyone would have that problem.. At the end of the Great War, I shipped back plenty of barbed wire and landmines. More than enough to border my property. It was very useful during the Great Depression.

    There have been a few stray animals that have caused problem, but no damned kids on the lawn.

    Them youngins don't know how to protect their lawns.

    I'll go back to watching those funny kids, Larry, Moe, and Curly. Great fun they are.

Comment Re:Ok? How is this new, or a big deal? (Score 2) 153

That's been discussed a lot on here in the past.

One in particular that I remember was about a laptop locking cable that you could unlock with a pen in just a few seconds.

If a criminal wants a laptop, and sees 3 sitting around. No one is at them, and he has a few moments of no one looking. One is on a desk with the easily defeated cable. One is on another desk, tied down with a piece of string. The third was just put into a laptop bag, and is on the floor by a chair.

He won't go for the one with the cable. Even if he was prepared and knew exactly how to do it, it is still an obstacle. Even the one in the string requires a little extra time to untie or cut. The one in the bag on the floor is easiest, as he can just pick it up and keep walking.

The only variation on this would be the perceived value. If the one in the bag looked like an antique, he'd disregard it in favor of one that he can sell. If it's the one with the cable, and may get someone's attention by picking the lock, he may just move on to somewhere else.

The same applies to homes. All things equal except for security, the insecure house is the easy target and will get broken into. If the insecure house is a dilapidated hovel, but there is a nicer house that's an easy enough target, he'll go for the nicer one or pick a different neighborhood with better targets.

Comment Re:For those of you that don't RTFA... (Score 3, Informative) 378

... and a quick Google search says your wrong.

The presence of lead or other heavy elements was not required for visualization. Fragments as small as 0.5 mm were easily detected if there was no overlying bone.

And a somewhat NSFW link with some glass objects that shouldn't be there.

Density makes a difference. It won't jump out like metal, but it should be visible. here are some examples and notes

Comment 'rock star' is a loaded phrase. (Score 1) 356

You will get two answers, depending on reader interpretation of 'rock star'.

One connotation is that they are high maintenance douchebags, that might or might not be competent too. This comes from the fact that *usually* the only way such douchebags stay employed is having great talent. By no means is this sort of person generally required. If you have a talented person in this category, you will be screwed when they go away or stop caring, because no one will be able to do anything with their code.

The other connotation is that they are a great developer. These people are greatly valuable. You may still have retention problems due to competing offers. They can churn through problems easily and assume a leadership role. They can work with people. If someone is in this category, losing them is still a great loss, but not nearly as fatal as those who assume themselves too good to work with others.

Comment Re:Obligatory 5 dollar wrench. (Score 1) 292

So lets see... They thing you're a bad guy with something nefarious in encrypted cloud storage..

They ask for the password, you give the duress password.
They ask again for the password, since that one didn't return valid data..
They beat you for the password until you either give the real password, which you can't any more, or you're dead.

Official cause of death? You tripped.

In the end, the data is wiped, and you're a bloody pulp on the interrogation room floor. Regardless, the problem has been mitigated, and you saved them the trouble of destroying your nefarious something.

Was whatever you had worth hiding? Probably not. Not that I want agencies going through my personal stuff, but when the choice is being beaten down, and possibly killed, that duress password was the worst one to give up first.

Slashdot Top Deals

If this is a service economy, why is the service so bad?