Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:It's opt-in, by request (Score 1) 223

I choose not to live my life in fear and accept that shit happens. You should have proper insurance. I live in an urban area and was a stone's throw away from the first murder (January of course) of the year. The best strategy is just to not have people want to kill you (not always possible, but if you pull out a knife at a rowdy house party that's probably not the best move) and live comfortably rather than thinking about putting cameras up everywhere and making the assumption that the video evidence (or anything you say at all) won't be used against you.

IANAL. YMMV.

Comment Re:What is Your Most Obscure One? (Score 1) 370

Actually copying/blitting the off-screen buffer to the VGA card for my side-scroll arcade style game circa 1994 using inline x86 assembly (the main language I used was C) was significantly faster than using something like a C memcpy().

Shortly after that it no longer made sense to use x86 assembly in most cases. It would have bee masochism to write more than the dozen lines of code or so instead of just an instance of inline assembly.

That said, the game was written in VGA mode 0x13 (320x200 -- think Wolfenstein) so blitting the 64K off-screen buffer to a 64K buffer (320*200) buffer in the video card may have had something to do with it (but this was still common with other screen resolutions).

Comment Re:The financial *and* legal option (Score 2) 372

Aside from a few corner cases like the woman who apparently was using the service with her husband's consent because he was incapable, I'm not having much sympathy for the sites operators or its actual users, so that pretty much wipes out the rest of the options.

Sure, but in that case why wouldn't the woman choose another dating or hookup site and *not* one that is designed to have at least one party be unfaithful to their significant other?

Crime

Fujitsu Psychology Tool Profiles Users At Risk of Cyberattacks 30

itwbennett writes Fujitsu Laboratories is developing an enterprise tool that can identify and advise people who are more vulnerable to cyberattacks, based on certain traits. For example, the researchers found that users who are more comfortable taking risks are also more susceptible to virus infections, while those who are confident of their computer knowledge were at greater risk for data leaks. Rather than being like an antivirus program, the software is more like "an action log analysis than looks into the potential risks of a user," said a spokesman for the lab. "It judges risk based on human behavior and then assigns a security countermeasure for a given user."

Slashdot Top Deals

Never invest your money in anything that eats or needs repainting. -- Billy Rose

Working...