Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Do you code? (Score 2) 388

if you don't code yourself, then you probably don't have any idea how much time and effort is required to implement your 'improvements', and/or perhaps your suggestions really aren't very good to start with, therefore annoying the dev, who spend perhaps months or years creating his end product, only to have some random guy from the Internets post 'suggestions' that come off as criticism.

This is largely irrelevant to the OP's question - do the other users who are outright rejecting the idea of adding new features code? Do they touch the codebase for the app in question? All end-user feedback is useful at some level, it's useful for developers to know how people are using their software and even if just one report isn't enough motivation to add a new feature, if this is requested a number of times it might point to worthwhile future development, or changing the workflow in the software to accomodate the way the software is used by other people.

Asking for a new feature or function in software isn't criticism - in fact, it's the complete opposite. It's showing the developer that you use the software enough to care to provide feedback and you're thinking about ways that the software could potentially be even more useful.

Comment Re:No Way (Score 1) 366

This has always amused me - having a tradie offer 10% discount for cash, just because they don't have to pay the GST. They love it as they end up getting far more in their pocket as they're also not paying the 30-odd percent company tax or around the same on average for income tax on the earnings either. So, they get around 30% more in their pocket and you save 10%...

Comment Re:Interesting how few controls there are (Score 5, Insightful) 129

I've worked for big companies most of my career, and regular employees making purchases, signing contracts, etc. takes an act of God. I can't spend $100 on supplies without getting competitive bids.

See, that's where you're going wrong. I've actually had clients tell me that a proposal has to be _over_ a certain dollar amount - if it's less than (for example) $50k, it's subject to a lot more oversight than, say, $1M. Small, petty cash type purchases are even more difficult, relatively speaking. Good luck trying to get approval for a new mouse for your workstation!

Comment Re:Virtual Private Raid (Score 2) 151

What you want for this is some variation on Shamir's Secret Sharing algorithm. Yes, he's the Shamir in RSA.
What this does is break a secret up into n different parts, but unlike raid, you can break it up in such a way that there is a threshold for the number of parts required to reconstruct the secret. So, for example, you could break a secret up into 6 parts and specify that any 4 parts will reconstruct the original data. If you have only 3 parts, then the secret is completely unknown (not just partially known).

Comment Re:I fail to see the problem (Score 1) 456

That sounds like a pretty bad experience with voicemail. With my voicemail, I open the Phone app on my phone and go to the Voicemail tab.
In here, I get a list of either the number of everyone who has left me a voicemail or their name if they are in my address book.
I have a blue dot next to the ones I haven't listened to. I tap on the message to listen to it. If I don't do anything, it's then kept, otherwise if I delete it it goes into the Deleted Messages. Want to listen to a message again? Tap on it.

Couldn't be easier.

Comment First ask yourself, what are you guarding against? (Score 3) 140

First ask yourself, what are you guarding against?

What guidelines has the client given you, what expectations do they have?
There's no point in you being so secure that the machine is virtually useless if the client happily stores these files on Dropbox/Google Drive etc.

Are you guarding against random drive-by hacking, script kiddies and the like, or are you guarding against an advanced persistent threat?
If you're guarding against the US Govt then your threat model is very different to if you're simply protecting yourself against casual hacking.

If you're concerned about an APT, then what level of threat do you expect to face? Is this a competitors company that has some guy who knows computers? Is it a multinational corporation with a large budget and a cybersecurity team? Is it a nation state? Is it the US Government?

The answers to those questions will heavily influence the appropriate course of action to take. If you're worried about casual hacking and the client has provided the files to you via Dropbox, then simply don't connect to any open wifi networks and don't connect to any wifi networks you don't know are secure. Make sure the wifi networks use WPA2.
If however you are concerned that the Govt. is likely out to get to your secrets, and they're specifically targeting you (as opposed to you being caught in a drift net) then you will want to physically disable the wifi, probably by taking the wifi card out of the laptop - it's likely on a small mezzanine card that is usually easily removed with a small Philips head screwdriver.

Comment Re:Crowdsourcing! (Score 1) 553

I donâ(TM)t work for free. If they want me to solve problems, they can sign a consulting contract.

But hereâ(TM)s an idea, if they are going to force software engineers to do this sort of thing, maybe they can break up some vexing Homeland Security software problem and piecemeal it out, sort of like crowdsourcingâ¦

I know, why don't they put them to work converting Slashcode to support Unicode?

Slashdot Top Deals

In less than a century, computers will be making substantial progress on ... the overriding problem of war and peace. -- James Slagle