Follow Slashdot stories on Twitter


Forgot your password?
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re:as someone who is suffering from this... (Score 1) 228

Two points.

First, do what everyone does and tailor your CV to different jobs. If they don't like people with C experience, just don't mention it. Limit work experience to the last few jobs so you look younger.

The age discrimination is much harder to get past. Your generation screwed everyone by making the cost of living so high that older people need huge wages to maintain their lifestyle and have a reasonable pension and healthcare cover. The only solution for you is to move somewhere cheaper and take a lower wage, which sucks but is still better than the situation for young people.

Comment Re:All this collecting and hacking (Score 1) 29

This seems to be a hard problem to solve. On the one hand we want our favourite user names, on the other as much anonymity as possible. We want to avoid compromising one site to allow compromising other sites, but we also want to stop trolls and spammers creating new accounts too easily. We want people to remember their login details so they can use the site, but also use unique and hard to crack passwords.

Comment Re:Hypocrisy at its best (Score 1) 29

Those are interesting things for you to group together.

The GP didn't group them, the world did. The two most common cases of IP addresses being falsely equated with an individual identity are overzealous law enforcement going after suspected paedophiles and overzealous lawyers going after alleged copyright infringement.

It's interesting that both groups use the same lie to get what they want.

Comment Re:Slashdot should condone piracy (Score 1) 66

Did you even read the link? Apparently not, so I'll post it here for you, save you a click:

"Publishers often refer to copying they don't approve of as âoepiracy.â In this way, they imply that it is ethically equivalent to attacking ships on the high seas, kidnapping and murdering the people on them. Based on such propaganda, they have procured laws in most of the world to forbid copying in most (or sometimes all) circumstances. (They are still pressuring to make these prohibitions more complete.)

If you don't believe that copying not approved by the publisher is just like kidnapping and murder, you might prefer not to use the word âoepiracyâ to describe it. Neutral terms such as âoeunauthorized copyingâ (or âoeprohibited copyingâ for the situation where it is illegal) are available for use instead. Some of us might even prefer to use a positive term such as âoesharing information with your neighbor.â

A US judge, presiding over a trial for copyright infringement, recognized that âoepiracyâ and âoetheftâ are smear words."

They are not saying that it's okay to infringe copyright on the GPL, they are saying that calling it "piracy" and "theft" are just smear words designed to elicit an emotional response by comparing a minor civil matter to kidnap and murder on the high seas.

Comment Re:So much for biometrics being more "Secure" (Score 1) 96

Has there ever been a case of a thief actually cutting someone's finger off and then applying an electric current just to get into their mobile banking app? Seems much more likely they would just steal your wallet and phone, and maybe force you to withdraw some cash or tell them the credit card PIN number.

Thieves are usually quite unsophisticated and the ones with half a brain try to avoid making contact with their victims at all, e.g. by using card skimmers at ATMs and payment terminals.

The really stupid thing is that most banking apps don't work with privacy and security enhanced phones because they don't like rooted operating systems. They would prefer I expose myself to all that malware in web advertising. Google Wallet does that as well, although Google claims to be working on a fix.

Slashdot Top Deals

Five is a sufficiently close approximation to infinity. -- Robert Firth "One, two, five." -- Monty Python and the Holy Grail