Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment How pervasive? (Score 1) 256

Factoids... "200 Billion lines of COBOL code in existence" eWeek "5 Billion lines of COBOL code added yearly" Bill Ulrich, TSG Inc. "Between 850K and 1.3 Million COBOL developers" IDC "Majority of customer data still on mainframes" Computerworld "Replacement costs $20 Trillion" eWeek Researchers at Aberdeen Group recently found that about 70% of the world's business data is still processed by mainframe applications written in Cobol. According to Gartner Group, that number is closer to 75%. "Although most people are blissfully unaware of CICS, they probably make use of it several times a week, for almost every commercial electronic transaction they make. In the whole scheme of things, CICS is *much* more important the Microsoft Windows." Martin Cambell-Kelly, "From Airline Reservations to Sonic Hedgehog" (a History of the Software Industry), MIT Press 2003 COBAL is not dead and won't die :)

Comment Re:What about china? (Score 1) 166

Australia = elected government. China = military dictatorship.

That's probably about right. Since Australia prides itself as a democracy

As an Aussie I can assure you that a vast majority of Aussie DO NOT WANT THE BLUDDY FILTER!
The number of polls and surveys have run at around 80+% against.
Why are they doing it? For basic political gain of right wing votes - plain and simple. See: for more details


Critical Vulnerability In Adobe Reader 160

An anonymous reader writes "Core Security Technologies issued an advisory disclosing a vulnerability that could affect millions using Adobe's Reader PDF file viewing software. Engineers from CoreLabs determined that Adobe Reader could be exploited to gain access to vulnerable systems via the use of a specially crafted PDF file with malicious JavaScript content. Successful exploitation of the vulnerability requires that users open a maliciously crafted PDF file, thereby allowing attackers to gain access to vulnerable systems and assume the privileges of a user running Acrobat Reader."

(Useful) Stupid Unix Tricks? 2362

So the other day I messaged another admin from the console using the regular old 'write' command (as I've been doing for over 10 years). To my surprise he didn't know how to respond back to me (he had to call me on the phone) and had never even known you could do that. That got me thinking that there's probably lots of things like that, and likely things I've never heard of. What sorts of things do you take for granted as a natural part of Unix that other people are surprised at?

The Internet

Australian Censorship Bypassed Before Live Trials 184

newt writes "The Australian Government is planning to conduct live trials of as-yet-unspecified censorship technology. But as every geek already knows, these systems can't possibly work in the presence of VPNs and proxy servers. PC Authority clues the punters in." Maybe the ISPs secretly like encouraging SSH tunneling — and making everyone pay for the extra bandwidth used. Not really; Australia's major ISPs, as mentioned a few days ago, think it's a bad idea.

Slashdot Top Deals

How can you do 'New Math' problems with an 'Old Math' mind? -- Charles Schulz