Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:Ah, minimialism (Score 1) 362

Alright. This this X1 is bristling with extra buttons, finger sensors, track pads, track pad buttons and other pointing devices. They went too far though I don't need that stuff, but I do use esc. My existing mac book is fine without extra buttons for volume or power but it has esc in the right place.

Perfection would be the happy hacking layout with control where caps lock usually is. That's why I use a happy hacking keyboard at my desk.

Comment Re:Ah, minimialism (Score 1) 362

>Lenovo did this with their X1 Carbon a while back too. What is the obsession with removing functionality? Sure, Mac users probably don't use the Escape key too much, let alone the function keys. However, Esc has always been the equivalent of Cancel on MacOS and Windows dialog boxes, and terminal-based applications still use it.

I'm typing this on my Lenovo X1 Carbon, complete with its escape key on the keyboard. What are you talking about?

Comment Re:And... NO CONTRAST (Score 4, Informative) 314

Jesus H. That's like the anorexic fashion show of editors. There's nothing of substance there.

VIM: Whatever my terminal is, which is white on black.
Emacs: Whatever my terminal is, which is white on black.
Notepad++: Black on white.
BBedit: Black on white.

That covers all of them I think, over Linux, Windows and MacOs. Nothing else matters.

Comment Re:Who should we blame? (Score 1) 181

Also blame the engineers who didn't put in some interlocks, e.g. no requests from outside the LAN until the default password has been changed or simply force the user to change the password the first time they log in.

Can you do that? How can a device know a request comes from outside the lan? If I'm not mistaken, unless you use IPv6, in order for an outside request to reach a device on the LAN, you need to NAT it, and then, from the point of view of the device, the request comes from the router, from a local ip.

uPnP comes to the rescue and allows your camera to open a path in from the outside. Yay uPnP!
Disable uPnP in your router.

Comment Re:If the point was ... (Score 4, Insightful) 332

There's no proof that it has anything to do with Wikileaks, but in a world of IoT devices with no thought toward security, anyone who cares to do so can mount DDOS with the power of a national entity.

What's the point of doing what Assange and Wikileaks have been doing without any moral position? He isn't helping his own case.

Comment Re:Legal? (Score 2) 279

No, of course it is not legal to set a trap to intentionally hurt someone, even if you expect that the trap could only be activated by the person committing property theft or vandalism. Otherwise, you'd see shotguns built into burglar alarms.

Fire alarm stations sometimes shoot a blue dye which is difficult to remove or one which only shows under UV. Never stand in front of one when pulling the lever! But they are not supposed to hurt you.

And of course these booby traps generally are not as reliable as the so-called "inventor" thinks and tend to hurt the innocent.

User Journal

Journal Journal: Agorophobia 2

“Say, Ed! How was your trip? Lager?”
“Hi, John. Yeah, I’ll have a lager. The whole trip was lousy, a journey through hell all the way.”
“Didn't you fly Green-Osbourne?”
“Well, yeah.”
The bartender swore; he was a wealthy man who owned the bar he was tending and quite a bit of Green-Osbourne Transportation

Comment Re:shit post (Score 1) 284

The terminals support several payment schemes.

So what? Terminals can be bulletproof, but you still need software to talk to those terminals, and that's where the problem usually lies. ApplePay wouldn't prevent any of those security problems at all.

That's where PCI-DSS steps in as an utterly stupid spec that doesn't enable secure communication with PoS systems while leaving the card data within the PCI security boundary. This is in part so they can charge a bucketload of money certifying every PoS terminal that doesn't need to be within the PCI security boundary.

Comment Re:shit post (Score 5, Insightful) 284

The NFC terminals were paid for by the merchants. The terminals support several payment schemes.

It is in my interests as a person who pays for things and as a merchant who pays for and uses payment terminals that IPhone based NFC payments remain as secure as possible and letting thousands of different banks mess with it with thousands of different applications is counterproductive.

Look beneath the surface and you will see that this is about grabbing a larger share of the merchant's fee.

Comment Banks Like Money (Score 4, Interesting) 284

>Yet, this infrastructure was built and paid for by Australian banks and merchants for the benefit of all Australians."

Bullshit. The infrastructure was paid for by merchants buying the equipment.

Banks have shown themselves incapable of passing on the reduced costs of electronic transactions to consumers and incapable of deploying secure payment schemes. This particular scuffle is everything to do with banks wanting to keep all the 2-5% transactions fees rather than share it with a phone vendor who has developed moderately secure payment hardware that is in the hands of millions of people.

Slashdot Top Deals

Any program which runs right is obsolete.