Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:Deforestation (Score 1) 143

If you're including recent figures, then you need to figure in that oceanic pollution is disrupting the life of plankton, which produce most of the oxygen in the atmosphere. I doubt that the figures are recent enough to reflect the recent plankton die-offs, but expect the Oxygen levels of the atmosphere to take a sharp dip over the next few centuries. (it's a pretty slow cycle.)

Comment Re:Cheaper to get hacked than do security maintena (Score 1) 55

PHP? It's been my impression that right there you have identified one of the main security problems with your system.

FWIW, any rapid changeover is going to introduce its own costs and problems, but it is possible to write secure software which will generally pay for itself over time. Just not in the next quarter, or probably the next year. And you need to do decent Q/A testing before releasing the software. You still won't catch everything, but with the right design exploits won't propagate from module to module.

The real problem is trying to change too much too quickly and without sufficient Q/A. Doing that will save you money over the long term, but not over the short term, and it will mean that you don't adopt the latest glitz very quickly...and often not at all. So your image, as well as your actuality, won't be "cutting edge" but rather "solid and reliable". There are reasons the "cutting edge" is frequently called the "bleeding edge".

Comment Re:Not good enough (Score 1) 55

It's not using current technology that's the problem, it's that without unsafe methods you can't do remote administration, and it's more expensive to get someone to come in when you need to update the system. It's rather like a lot of the bugs that depend on bios flaws wouldn't be a problem is the bios couldn't be updated without throwing a local switch. And a lot of the complexity is mandated by marketing needs, not by technology.

It's my suspicion that a really safe network would be much cheaper, but this means you need the manufacturers selling things that require the equivalent of moving a jumper before you could update them, or perhaps even install executable software. It's not something that's cheaper if only one company does it...unless that company is, say, Intel.

Comment Re:the intolerant, hypocritical Left (Score 1) 563

If you think the intolerance exists on only one side you are blind, probably willfully so. And it's as reasonable to call the right hypocritical for that as the left. (At one point it was more reasonable, but you don't often find the right any longer even pretending to be strict constitutionalists.)

FWIW, I have more sympathy for that stated goals of the left than of the right, but in both cases their stated goals would result in a non-functional society. And there are, in both cases, adequate grounds for not trusting the purported candidate wielders of power with even the intent of accomplishing many of the stated goals. And in both cases most of the ones they are most likely to attempt to accomplish are the ones I would really rather they forgot. There are some exceptions, e.g. Hillary might actually try to improve the cost of education.

Comment Re:Just compare the prices of other utilites (Score 1) 200

Well, it is indeed a "hogwash misleading term", as it no more deserves the term "natural" than does white sugar or beer. It's a highly processed refinement of a naturally occurring substance.

Forget thinking of it as green-wash though, since the term is a lot older than that. It wasn't new in the 1950's, when I was surprised that my grandfather used propane rather than "natural gas". This doesn't keep it from being a misnomer, though I guess that it may have earned the term when being distinguished from "water gas". https://en.wikipedia.org/wiki/...

Comment Re:Personal anecdote (Score 1) 169

Judging by some I get, no, they don't need to be populated with plausible looking content. But even if they did, a mail-server being hacked is at least as plausible as one of her friends being hacked. It probably happens a lot less often, but when it does happen the payoff list of associated names is a lot larger.

Comment FWIU: social engineering (Score 1) 169

From what I understand, most problems of this "kind" are the result of social engineering. What that means can be anything from an email pretending to come from the CEO to a phone call that apes a desperate user trying to recover some information. And other possibilities.

For this kind of a breech, I'd expect that there was a potential weakness, and social engineering was used to gather the information needed to exploit it. Actual holes are possible but less likely, and even then it's likely that social engineering was used to gather the information needed to know what holes to try for.

That said, a zero day is always a possibility to keep in mind. It's just not the approach I expect was used. Also possible is a strong misconfiguration such that social engineering wasn't needed to exploit it.
P.S.: It's my belief that most social engineering is never detected. People don't like to tell their boss that they've been fooled, and in a really good social engineering approach they would never even know that they had been fooled, and the event could only be revealed by reasoning backwards after the penetration was detected.

All that said, I'm no expert in this area. Most of my information comes from reading Slashdot and such over the years, and patterns of attach change over time. But this is my best guess at the answer to your question.

Comment Re:Yahoo has users? (Score 1) 169

They don't "suddenly come from", but Yahoo used to be a quite popular place to have an account, and since they don't charge you for the account, those accounts never went away, people just forgot about them.

Even if the accounts *did* go away, the records would still be there, and so if the passwords are used with the same account name on another site...

Comment Re:Already compensated (Score 1) 172

They've, indeed, "already experienced anti-trust lawsuits". That let them know how serious the penalties were likely to be (i.e., you need to start bribing government officials...of course that's not officially called bribing, it's called making campaign contributions, lobbying, etc., but bribery is what it is by any usage except the strongly "gammed" legal definitions).

Comment Re:Time will show...and within the week. (Score 1) 180

But what's important for long term public perception is "Time since it was widely known". Even that oversimplifies, as when someone new hears about it, their opinions will remain flexible for awhile, and then, as their attention shifts to something else, the opinions will solidify and become more difficult to change. New memories are easy to alter.

That I'm "late to the party" is no surprise as I don't regularly buy any computers, and it's been awhile since I've looked at buying a laptop. (And when I did I wasn't looking seriously at Lenovo, though I don't remember why.) That said, I remember being quite unimpressed by the description of the "Yoga keyboard", which would already have me looking at other manufacturers before I considered Lenovo. But being "late to the party" is rather irrelevant to my point, and your point only makes it more likely that I'll consider the change malicious. But it won't affect most people, and only a few who read the article will read this far down in the posting tree.

FWIW, I recognize that my opinions are significant only in so far as they are similar to the opinions that many other people will have. Actually, others opinions are much more significant as I haven't actually bought a Lenovo computer since they were a part of IBM.

Slashdot Top Deals

All life evolves by the differential survival of replicating entities. -- Dawkins