Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment There is a flaw in the logic (Score 1) 14

Does anyone else see the flaw in this logic? So no sharing, riders to get into Ubers by themselves. However, are they going to disinfect the car and driver before picking up the next rider? If not, then stopping a ride share of max 3 sharers does nothing but boost profits because they can no longer get the discounted rate it does not reduce the health risk.

Comment Re:1968? (Score 1) 823

I use the Pulse Smartpen by LiveScribe for note taking. It captures everything I write on the page, including drawings and doodles, as well as recording the lecture and links the recording to the text that I wrote. You can then sync it to your computer (Windows or Mac) to get a digital copy of your notes and recordings for easy searching and bookmarking. The notes can also be shared with other people or use the myscript add on software to convert your hand written notes to digital text.

Comment Re:Not the same, in several aspects (Score 1) 451

Plus there's no expectation that FedEx would (or should) have access to the *contents* of your mail, but an ISP-hosted email account, currently, does have full access to the content, with your tacit approval.

Hmm. Have you worked at Fedex or UPS? You wouldn't believe the condition that those packages end up in and in many cases the contents are exposed and the package handlers are required to re-seal them.

* POP email with "delete from server" active will limit how much of your mail your ISP has access to.

Seriously? What guarantee do you have that "delete from server" is a true deletion rather than an archive function? What about backups? What about cleaning up of the residual message from the slack space?

* Run your own mailserver.

Your message must still travel through other data networks and mail servers to reach it's destination. Through every leg of the route there is opportunity for the message to be captured via network traces. Through every mail server that the message passes through the message, at least briefly, lands in the mail servers message que until it is forwarded on; not to mention the log messages that may also be generated. What guarantee do you have that the mail server isn't configured to forward a copy of all messages to some unscrupulous individual?

* Develop a mailserver that stores mail in an encrypted folder and requires your key to access.

A little better but that would only account for the message after it as arrived in your encrypted folder. To truly secure the message, it must be encrypted prior to transmission and the only person that should be able to decrypt the message should be the intended recipient.

Comment Re:Pictures (Score 1) 895

"...you ask the IT department (dad)."


Why do people always assume that the home IT department is Dad? At my house, asking a wall for computer help is just as good as asking Dad for computer help. The IT department around our house is me (aka Mom) and the teenagers typically provide computer related help to Dad (eg. how to send an e-mail, how to receive an e-mail, what is my e-mail address, etc.)

As far as locking down the computers, sure they are locked down but mom always has access. The teenagers have been well versed in the IT Policies of Mom which include, everything that can be logged is logged, including chat sessions and URLs visited (thanks cisco pix & syslog-ng). Online sites like MySpace require that Mom is provided the password or access will be terminated. Mom ALWAYS reserves the right to review anything that they do on the computer period end of story. They are aware of this and know that I do, at random, review what they are doing online. They have also been made very aware of why this is necessary. Once they turn 18, they will be free to roam the internet at will without the supervision but, by that time, I hope that I have taught them what they need to know to stay safe online.

The biggest trick to retaining their trust is to be open and honest with them the same way that you are expecting them to be with you.

Slashdot Top Deals

"The eleventh commandment was `Thou Shalt Compute' or `Thou Shalt Not Compute' -- I forget which." -- Epigrams in Programming, ACM SIGPLAN Sept. 1982

Working...