Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Comment Re:Because... reasons (Score 2) 228

Seems a bit odd to me. to say:

They investigated, verified the times and locations, and asked him about them. When he didn't provide a satisfactory response, or in fact any response,

Citation? You ask others for it constantly, so I'm sure you have several.

I think this provides a counterexample:

I want to be clear: the accusations of criminal sexual misconduct against me are entirely false.

http://www.twitlonger.com/show/n_1soorlp

Flat out denying the accusations is.. a response, right?

I'm inclined to say "meh", let Jacob step out of the project and leave it at that. The project is bigger than him, and he's done some stuff that I don't think belongs in tech conferences. Criminal? Let the courts decide, I'll assume he's innocent until then.

Comment Re:who wants it? (Score 1) 400

Testing of the ports maybe, AD probably not... but. the FOSS community is very good at implementing specifications. If the object model is sufficiently well-designed, then maybe Libreoffice, Samba, OpenLDAP, MariaDB etc, will get hooks/shims/modules/whatever for a Linux Powershell.

The system level interfaces depend on how far the abstraction goes. They demonstrate obtaining objects for running processes... much easier and more accurate than grepping for PIDs.

https://github.com/PowerShell/PowerShell/tree/master/docs/learning-powershell

Their grep example is kind of ridiculous:

grep -Rin "sometext" --include="*.cs"

Becomes:

Get-ChildItem -Recurse -Filter *.cs | Select-String -Pattern "sometext"

But then look at stuff like their debugging and breakpoints: https://github.com/PowerShell/PowerShell/blob/master/docs/learning-powershell/debugging-from-commandline.md

There's a lot of hard work and cool ideas in there. It would be a mistake to ignore it because the syntax is awkward and MS is behind it.

Comment Re:who wants it? (Score 1) 400

I think Python is a very good analogy. It has an interactive shell, but the interactivity is only really useful in edge cases like troubleshooting or learning.

I'm not saying Powershell is great. I'm saying that it has a reason to exist and despite its weaknesses, has some strengths over traditional Unix shells.

Comment Re:who wants it? (Score 2) 400

Powershell has a very steep learning curve and IMHO lacks the end-user history of traditional unix shells.

That said... doing things like having most of your OS exposed through objects for inspection and manipulation, even cells in spreadsheets or network resources has value.

You *could* do this in bash with /dev/tcp/whatever, perl, sed, python and possibly an ldap client, but the exposed methods in powershell are more stable, have fewer dependencies and are easier to understand.

The fact that it's so hard to do simple things makes it very difficult to add to your knowledge without reading a few books or taking some course on the subject, then using it daily in Windows admin work.

I always wish I knew more about using it, but... unless you're deep in this stuff, it's better to skim the capabilities and let the Windows admins figure out the details.

Comment Re:Really? (Score 1) 43

"Security of Person" is a right of privacy.

Wikipedia says otherwise and provides sources: https://en.wikipedia.org/wiki/Security_of_person

Interestingly, the Declaration of Human rights from 1948 explicitly mentions privacy, but the 1960 Bill of Rights makes no mention of it, nor does the later Charter of Rights and Freedoms.

These are very fundamental areas of law... I mean, I had to know this stuff for undergrad intro-to-business-law.

Comment Re:Really? (Score 1) 43

I think you're talking about the Criminal code of Canada, not the "Bill of Rights".

http://laws-lois.justice.gc.ca/eng/acts/C-46/page-40.html#h-61

Details are important if you're not going to cite references and are going to tell a "Yank" to go Google something about Canadian law.

I would love to know what "Supreme Court" ruling you're referring to, but I'm guessing it doesn't exist.

Comment Really? (Score 1) 43

The Bill of Rights has nothing about privacy: http://laws-lois.justice.gc.ca/eng/acts/C-12.3/FullText.html

The privacy commissioner herself had her cellphone records sold to a reporter because there were no such protections in law.

https://www.priv.gc.ca/cf-dc/2007/372_20070709_e.asp

It's my understanding that postal services and landlines have protections in law, but there is no such thing for "new" mediums. I.e., you need a warrant to open mail or wiretap a landline, but before the privacy act, you could sell somebody's cellphone records to whomever you wanted without telling them.

You're probably also talking about the Charter of Rights and Freedoms, not the Bill of Rights. But neither contain anything about privacy other than protections against search and seizure.

Details on the current state of privacy law in Canada can be found on the Privacy Commissioner's website... https://www.priv.gc.ca/resource/fs-fi/02_05_d_15_e.asp

Please., please correct me if I'm wrong. I would love to see this Supreme Court decision.

Comment Re:And so continues.. (Score 1) 426

Yep, apply signature-based detection.

Then load the ads to /dev/null to avoid detection of adblockers. Have browser identifiers stripped and cookies manipulated into randomized identities so that tracking is limited.

Eventually advertisers will question whether or not their "clicked on" ads are even being seen... and content will go back to being created by people who want to create content, not by people who are trying to sell your eyes to the highest bidder.

Comment Re:As with most things... (Score 1) 211

"as long as you are not using that password elsewhere "

Password reuse like this should be absolutely forbidden. It's ridiculously insecure.

Password change policies depend on the service being protected. Very few benefit from changing. E.g., shared passwords such as safe combinations, door passcodes. Encryption keys such as those used for offline backup sets (nobody who worked there 10 years ago should know the current passwords).

When you don't trust the service provider, data breaches, such as somebody recovering a backup set from a recycling operation in Somalia, could mean that passwords depending on lockouts, timeouts, etc. can be subject to offline cracking attacks. Aging algorithms and changing standards can impact this. e.g, your AOL account password might be sitting around on some backup tape encrypted with DES.

But if you don't trust the service provider to protect their backup sets or have good employee policies, then what exactly are you trying to protect with that password?

Comment Re:99% of those (Score 1) 272

It's down to 85% now... and falling. https://en.wikipedia.org/wiki/Usage_share_of_operating_systems#Desktop_and_laptop_computers

Only 95% in gaming. 85% general desktop/laptop. 50% in development. 44% web clients.. 32% in servers...1% of tablets.. 0% of supercomputers

I think this will go into non-linear marketshare loss very soon.

Slashdot Top Deals

You are in the hall of the mountain king.

Working...