Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re:C is the best (Score 2) 292

C is actually quite portable. But documenting it correctly so that someone else (or you a few years later) can understand what's going on it a beast.

C is more portable than either assembler or C++ (to bracket it with similar languages). It's not the most portable, for that you need either an interpreted language or one that runs on a virtual machine. Like Java, Python, Smalltalk, Ruby, etc., but it's probably the most portable language that compiles to native code.

Comment Re:If you think Twitter is bad... (Score 1) 114

I am not an admin, I only need to remember my passwords. Personally, I have a less-secure "story" and a more-secure "story". So I basically have 2 variations on the story behind my passwords. That doesn't mean I have only 2 passwords of course. So even if someone cracked one of my passwords they would be able to guess my others. And I have been using the secure scheme since 1996. The password looks totally random, but I know the story behind it, and remember the variations I made. So I can write down a single letter (or number) and know what the password is.

I think my point is that people need to THINK about their passwords, and make it unguessable yet something they can write down reminders for without compromising the guessability. Now making it 'uncrackable' is a different story completely.

Comment Re:If you think Twitter is bad... (Score 1) 114

True, to some degree... I only use this type of naming scheme where I am required to change my password - which is pretty much everywhere except on things that I control. Sometimes you have to deal with reality, and that means having to change your password. Is DaisyRIPyy99 harder to crack than DaisyRIPzz00? Not at all, but it is a method to help the user remember it.

Comment Re:If you think Twitter is bad... (Score 1) 114

Well, all this IT tech has done is forced the user to come up with a new password and WRITE IT DOWN ON ANOTHER POST-IT. He may think he is being clever, but what he has done is ensure that they will just do it again because it's a new password.

What he should do is come up with a method by which they can create a secure password and write down the hint to remember it, and distribute that process to everyone. In other words, TEACH them how to do good passwords.

1. Think of a very memorable event in your life.
2. Come up with a password based on that event.
3. Make it follow convention. (e.g. capitals, letters, length, etc)
4. Make it able to be changed easily without changing the event.

Example: My dog Daisy died in 1998
password: DaisyRIPxx98

Now when you have to change it in the future, you could "increment" the xx to yy, then zz, etc.
Or you could increment the 98 to 99, 100, etc. Or better yet both.

So next password is DaisyRIPyy99, then DaisyRIPzz00, then DaisyRIPaa01, ......
The user can write down a hint "puppy c3" in plain sight, and without knowing the scheme, nobody would ever be able to guess it. (in this case, DaisyRIPcc03)

Comment Re:The fix is in (Score 1) 270

Yes. It didn't work. Hillary was a bit slicker. But since them both parties have been "fixing the vote".

In a sense this is making them both true to their roots. The political ancestors of the Republicans believed that only property owning (white) males should vote. The political ancestors of the Democrats believed that the voting process was too restricted. It's too bad that decision can't be made on it's merits, and that neither party is willing to respect the current laws...laws which they, in combination, were in charge of writing.

Comment Re:The fix is in (Score 1) 270

It was already clear at the time of the Democrat candidate debates that the "fix was in". Anyone who didn't realize it was just not paying attention. It was (and is) less clear that the Democrats have done more to "fix" the election than have the Republicans, though they have both been clearly seen to be doing it.

Comment Re:Ok, so what? (Score 1) 270

It's not clear that "the network effect" is sufficient to cause them to be considered a monopoly. And that's the only grounds that I see for calling them a monopoly. Facebook is more like a "public accommodation". The laws regarding that are different from those regarding monopolies, and I don't understand them, but they *do* exist.

Comment Re:Servants (Score 2) 346

Yes... Unfortunately, not increasing the minimum wage only delays the automation by a year or so, as the cost of automation keeps falling.

Defending the status quo in minimum wages is a losing game, because the other side isn't standing still no matter what you do. Even if you cut the minimum wage automation will continue increasing, because there are some jobs that can already be done for considerably less than a person can live on that haven't yet been automated.

Comment Re:Free time (Score 1) 346

The "cheap community college" has also gone away...or at least become a lot less cheap. When I went to college the community college cost $2/semester, currently the same college costs $31/unit. That means a 12 unit load costs $62. but now the cost is per quarter rather than per semester. So that means it what was $4 is now $186. That's a bit of a steep increase, though it's not as bad as the university increase.

Comment Re:So much for the singularity (Score 1) 128

There are those whose view of the Technological Singularity is as you describe them. Those believe in the "hard take-off Singularity". Most of those who think seriously about it, however, believe in the "soft take-off". To deny that the technological feedback is happening and increasing is to deny (at least) the last five decades of history. But it never goes the way you predict...unless your prediction is just that it's going to increase.

Clearly there must be a limit. It is, however, not at all clear what the limit is. People keep redesigning things to eliminate bottlenecks and streamline processes. And new gadgets keep making increased streamlining possible. Certain areas have already passed the Singularity (my idea of the Singularity) a long time ago. E.g. the last person reputed to know all human knowledge lived in the 1800's. I doubt that he really did, e.g. I doubt that he knew how to take raw materials (iron ore, etc.) and shoe a horse, but he had that reputation. These days there isn't a single field-theory mathematician who knows all there is to know about field-theory. mathematics. Somewhere in there we passed a kind of Singularity boundary. Nobody noticed.

Comment Re: Encryption (Score 1) 318

But your device wouldn't have anything encrypted on it. It would log-on flawlessly, and there wouldn't be anything special on it or about it...whenever you were at the border checkpoint. That's the point of the proposed approach.

It does require that you have a drop-box you can trust to store encrypted data...but the drop-box is out on the internet, probably an ftp server. And it doesn't have the keys to decrypt. It also requires that you actually be able to delete files on your computer...unless you're willing to do a fresh install from a live CD frequently.

Slashdot Top Deals

Multics is security spelled sideways.