Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:Say what? (Score 1) 58

Can I suggest your attitude here is why we are still struggling to solve the same IT security problems that have been subject of most discussion for more than a decade now?

What discussion are you talking about exactly?

if IT staff don't have the ability to install software on a given computer, they're not going to use that computer for anything of consequence, certainly not for something that's as big of a time-sink as email can be. The problem is that a normal computer set up for a normal user, isn't really usable for us.

Why if its so bad you can't or won't use it, it can't really be 'good' for anyone else can it. Maybe you should be trying to fix that?

Why don't you go and fix that, instead of asking people who want to do their jobs efficiently to do the exact opposite – mucking about with pointless drivel for the sake of making some holier-than-thou infosec wannabe like you happy?

But you are different right - you don't ever run binaries from lower trust sources than what is in you general supply chain right? If you use FOSS tools or scripts you carefully audit all of them for RATs, backdoors, etc, don't you? I mean you saved so much time not using that 'normie setup'!

Personally I don't anything in Outlook anyone else in the company probably should not need or want to do. I don't run rando tool on my host system either - I don't want machine where I do basic office work fouled up and krufted up. I have VM for these things that does not get my account on corporate systems, if I need to authenticate something on the VM. I usually shut the VM down and roll my passwords.

I'll close this off with something people like you really need to read: https://kellyshortridge.com/bl...

If you can see yourself in that text, maybe stop being a jerk and let people do their job for once.

Comment Re:17 trips for the price of 16 is NOT free (Score 2) 26

Even 2 for 1 is not free. 2 for 1 is 50% off of two trips. 17 trips for the cost of 16 is a 6.025% off discount, when buying in bulk.

6.025% off is nothing. NYC subways give a deal where unlimited trips cost for 1 week costs the same as 12 trips. Worst discount there is 8.333%

This is not due to a tax windfall. This is not going to create inflation.

This is barely even a mild sale to encourage greater use of their trains.

That is not what this is. You're not paying for the 16 trips - you're getting the deposit for the free season tickets back after you complete them. The trips themselves are free whether you get your deposit back or not.

https://www.renfe.com/es/es/gr...

User Journal

Journal Journal: weird

I've never given this thing a shot.

Microsoft

Why Windows Must (and Will) Go Open Source 555

Attila Dimedici writes "Charles Babcock of Information Week published an interesting article suggesting that Microsoft will have to at least to some degree take Windows open source if they want to stay in business. He suggests that the money to be made from the things MS builds on top of Windows (Office, Server, SQL Server, Exchange, Sharepoint, etc.) is so much greater than what can be made from Windows itself that MS will have to give up the revenue stream from Windows in order to maintain these other, more valuable, revenue streams."
Books

Your Favorite Tech / Eng. / CS Books? 517

chris_eineke writes "I like to read and to collect good books related to computer science. I'm talking about stuff like the classic textbooks (Introduction to Algorithms 2nd ed., Tanenbaum's Operating Systems series) and practitioners' books (The Practice of Programming, Code Complete) and all-around excellent books (Structure and Interpretation of Computer Programs, Practical Common Lisp). What's your stocking-stuffer book this Christmas? What books have been sitting on your shelves that you think are the best ones of their kind? Which ones do you think are -1 Overrated? (All links are referral-free.)"
Security

Duplicating Your Housekeys, From a Distance 287

Roland Piquepaille writes "Some clever computer scientists at UC San Diego (UCSD) have developed a software that can perform key duplication with just a picture of the key — taken from up to 200 feet. One of the researchers said 'we built our key duplication software system to show people that their keys are not inherently secret.' He added that on sites like Flickr, you can find many photos of people's keys that can be used to easily make duplicates. Apparently, some people are blurring 'numbers on their credit cards and driver's licenses before putting those photos on-line,' but not their keys. This software project is quite interesting, but don't be too afraid. I don't think that many of you put a photo of their keys online — with their addresses." I wonder when I'll be able to order more ordinary duplicate keys by emailing in a couple of photos.

Untangling Web Information 76

Ostracus writes "The next big stage in the evolution of the Internet, according to many experts and luminaries, will be the advent of the Semantic Web — that is, technologies that let computers process the meaning of Web pages instead of simply downloading or serving them up blindly. Microsoft's acquisition of the semantic search engine Powerset earlier this year shows faith in this vision. But thus far, little Semantic Web technology has been available to the general public. That's why many eyes will be on Twine, a Web organizer based on semantic technology that launches publicly today."

Slashdot Top Deals

There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence. -- Jeremy S. Anderson

Working...