Follow Slashdot stories on Twitter


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment (Score 1) 383

my particular institution uses this:

e.g. John Doe starting his course in 2010 gets:

And if there are more of them they use additional numbers: ...


Submission + - Intel Core i7-3960X Sandy Bridge-E Tested (

Vigile writes: "Intel is taking the wraps off of the Core i7-3960X processor, the new high-end enthusiast part based on the Sandy Bridge-E architecture. Very similar to the currently existing parts, SNB-E moves from a quad-core design up to six cores while removing the integrated graphics. Other changes include a move to a 15MB L3 shared cache, 40 lanes of PCI Express (with unofficial PCIE 3.0 support) and a new quad-channel memory controller supporting speeds of 1600 MHz and capacities of 64GB. The new Extreme Edition part definitely takes the performance crown for consumer processors based on PC Perspective's testing while introducing a new socket (LGA2011) and a new chipset (X79) but will only be offered in two somewhat expensive options immediately (i7-3930K and i7-3960X) coming in at $555 and $990 respectively."

Submission + - Mac OS X Sandbox Security Hole Uncovered (

Gunkerty Jeb writes: Researchers at Core Security Technologies have uncovered a security hole that could allow someone to circumvent the application sandbox restrictions of Mac OS X.

The report of the vulnerability, which affects Mac OS X 10.7x, 10.6x and 10.5x, follows Apple’s announcement earlier this month that all applications submitted to the Mac App store must implement sandboxing as of March 1, 2012. Sandboxing, Apple has argued, limits the resources applications can access and makes it more difficult for malware to compromise systems.

Researchers at Core however revealed Nov. 10 that they had warned Apple in September about a vulnerability in their sandboxing approach. According to Core's advisory, several of the default predefined sandbox profiles fail to “properly limit all the available mechanisms." As a result, the sandboxing restrictions can be circumvented through the use of Apple events.

Comment Hardware/software split (Score 1) 1452

I think a lot of people are missing the point - nobody will remember steve jobs for Mac OSX.

They will remember him for the ipod, macbook air, mac mini, ipad series etc.

Whatever your views on their corporate behaviour, you have to admit it: mac laptops are shiny! ;)

None of this makes him a better or worse person, but all the talk about Apple's legal disputes and software derived from UNIX is missing the point. OSX is great to use, in a dull sort of way, but I much prefer debian. However, I have seen nothing as good for its size as a mac mini - even my 2008 model is better than non-apple models.

There is this

Comment Re:Especially given economic espionage (Score 1) 329

There is a fundamental misunderstanding here.

Corporate BB users generally run their own servers, which are encrypted end-to-end and as far as I know are "secure", or at least not directly compromised by RIM.
Consumer blackberries, however, rely on RIM for their servers and it is here that governments may spy on communication.

Governments have treated encryption like a WMD since enigma, and if they cannot access data simply make it illegal to either import, export or run encryption

This makes me want to find a new continent and set up a country where the citizens are free ... oh wait...

Comment erm... (Score 1) 417

Can you imagine the equivalent chat face to face, perhaps in a bar?

Troll: "Your mother is a slut!!"
Nerd: "I agree she is rather free with her morals, but what makes you think so?"
Troll: "more aggressively because I like ****ing her" & punches...
Nerd: "mphmph" (mouth blocked by fist)

In the real world, we pay big men in black clothing to help such "trolls" leave licensed premises.

Perhaps its just because I mostly associate with gamers, but really, +b was invented for trolls.

Comment not news (Score 1) 520

With his history, as its publicly reported, if he wasn't seeing an oncologist even if only to rule out cancer it would be surprising. This should be expected.

Of course, he could have been going to see a friend there or any one of a thousand things... cancer patients often get to meet each other at clinics and become friends.

I hope he gets well soon, in any case.

Comment My mum says... (Score 3, Informative) 345

"this is obvious."

Since I put debian 6 on her laptop - the frequency of ubuntu updates annoyed her, and she refused to install them (windows failed her long ago - even without viruses the spyware slowed it to a crawl) - she thinks it matters a lot. And who am I to argue...?

I am slightly amused by all the insistence on its geek credentials. For the above installation I put the installation CD in and essentially pressed return until a working desktop came up. I admit I had to type 2 user names and passwords, but I didn't find it too onerous. For my other machines I might do other things - but that is me complicating matters and nothing inherently to do with debian. It seems all my hardware is so old now, it just works out of the box.

{Kindly refrain from posting "j00r m0m" jokes... heard them all before... really. Not a challenge, either.}

Comment Re:Do we need more words? (Score 1) 263

Traitorware is something that you pay for thinking that it has a specified purpose (e.g. printing) - but it betrays you.

Spyware is something that you didn't have any knowledge of (e.g. 3rd-party cookies on websites)

I agree that the end outcome isn't so different, but maybe how you get there is important sometimes?

Comment I literally cannot see a 3-D movie in 3-D anymore (Score 1) 495

Yeah. Remember this? Part of my recovery from the crash (now just over ten years ago) was learning to deal with having a damaged eye. Part of the damage that drunk f-head did to me was to jam my head through the windshield of my car. (This is what happens when huge SUVs hit tiny cars!) While the eye surgeon could save my left eye, they had to remove the lens to do so. So the eye still receives light, but it's all a blur -- literally. My peripheral vision and depth perception have been greatly reduced, though I've regained some depth perception over the past decade simply by living with it. (My life has been very good in the past five or six years, BTW. Not completely ruined by that calamitous night ten years ago.)

I'd like to see "Clash of the Titans," perhaps at the cheap seats, if only so that I can compare it to the 1981 "Clash" and complain about how much better movies were when I was a kid. ;-)

Comment Re:No, but my dad has amblyopia. (Score 1) 495

Add together poor color vision, and near sightedness. Plus, being crossed eyed, but that was corrected as a very young age. Today, it's astygmatism and slowly developing cataracts.

I got used to the idea that I can't see things just like other people see them ages ago. The 3-D glasses do nothing for me, and the movies just seem so much nonsense.

Ehhh. If anything, it's good to hear that I'm not all alone.

Now, maybe if they would start working on holographic movies, they could sell more to people like me.

Then again, maybe not. I mean, most of the movies are ass hat stupid to start with, they wouldn't be improved just because I can see them better. Watch that next action thriller with a critical eye. The good guy never takes cover, standing in plain sight of everyone with a weapon, and no one can hit him. The bad guys actually make good use of cover, but the bad guy picks them off by the dozen, using two machine guns ambidextrously. Ass hat stupid, I say.

Comment Re:Holy shit (Score 1) 618

I don't bother with content filters. Too many false positives, and too easy to get around. I figure the kids (12yo and 17yo) can handle seeing by accident, and if they actually go looking it's its own punishment. I do have their browsers set up to go through a squid proxy, and I periodically review the logs. I have it set up so that they have to ask me to allow them access; a cron job shuts it down again at bedtime.

That's it, really. The threat of their mom finding porno sites in the logs is pretty effective.

Yeah, they could trivially get around the proxy just by changing their settings. I'm really kind of disappointed that neither one has figured it out yet. I'd actually like them to try; they'd at least be learning something about computers.

Slashdot Top Deals

An algorithm must be seen to be believed. -- D.E. Knuth