Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment The guy just didn't seem to understand his mistake (Score 1) 1051

At first, anyways. If you check:

https://lkml.org/lkml/2012/12/24/125

He basically goes on to agree with most of Linus' points after a few back-and-forths. He was apparently trying to make certain error messages more uniform, which certain higher level pieces of software didn't appreciate.

Comment And how much data ACTUALLY walks out? (Score 5, Informative) 380

Everyone preaches about the insider threat, even though less than 4% of all incidents come from insiders.. If you count by the number of breached records, insiders make up less than 1% of all breached records (though, arguably, they may be breaching records that are more valuable)

http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf

Encryption

Submission + - Do Slashdotters encrypt their email? 3

An anonymous reader writes: Many years ago when I first heard of PGP, I found an add-on that made it fairly simple to use PGP to encrypt my email. Despite the fact that these days most people know that email is a highly insecure means of communication, very few people that I know ever use any form of email encryption despite the fact that it is pretty easy to use. This isn't quite what I would have expected when I first set it up. So, my question to fellow Slashdotters is 'Do you encrypt your email? If not, 'Why not?' and 'Why has email encryption using PGP or something similar not become more commonplace?' The use of cryptography used to be a hot topic once upon a time.

Comment Re:Make the users fill in a form... (Score 1) 360

If you can, try meeting with your users face to face. The more you can facilitate communication, the better. Relaying through email or ticket posts can be a slow and arduous process. If you can instead spend a few minutes IM'ing them, or talking to them on the phone, you may be able to make more progress.

There are two sides to this communication process. There is your users educating you about their needs and requirements and the problems they are facing with your software, and there is you educating the users on how to make better recommendations and bug reports.

Also, most of the stuff in here is just a bunch of despair and people saying "fuck it" to communicating with those who are less technical. It's always going to be a problem, and it will always be an impossible challenge if you look at it with the same attitude.

Comment Re:Hookers vs Aldous Huxley (Score 1) 473

So, basically.. If one was to rewrite this in a way that isn't an intentional mind fuck:

Corporations hire young people, but don't know how to nurture someone to be useful to the corp when they get older.

A better way of doing things would be to try to keep your good talent around and murder your not so talented talent. Then mentor them so they can continue to develop and be useful when they're older.

NOW WAS THAT SO COMPLICATED?

Comment Re:Defective as designed. (Score 1) 145

Bit of a plug for some people I have met, but if you check out Duo Security, they have some neat stuff where you can avoid the whole adding a second password as two factor authentication. Instead, you're authenticating a login through your phone (can either be through their app, or a phone call from a nice robotic lady). They also offer methods similar to RSA's. I don't know off the top of my head if you can configure it to only allow certain types of two factor auth.

Submission + - Patent Troll Says Anyone Using WiFi Infringes (patentexaminer.org) 1

akahige writes: The Patent Examiner blog has the incredible story of Innovatio IP, a patent troll that recently acquired a portfolio of patents that its lawyers (what, you think there are any employees?) appear to believe cover pretty much any WiFi implementation. They've been suing coffee shops, grocery stores, restaurants and hotels first — including Caribou Coffee, Cosi, Panera Bread Co, certain Marriotts, Best Westerns, Comfort Inns and more. The lawyer representing the company, Matthew McAndrews, seems to imply that the company believes the patents cover everyone who has a home WiFi setup, but they don't plan to go after such folks right now, for "strategic" reasons. More info at Tech Dirt.

Submission + - FBI Cellphone Tracking Techniques Revealed (wsj.com)

glittermage writes: The WSJ reports on an ongoing case regarding alleged "Hacker" Daniel David Rigmaiden regarding the governments tools used to track mobile devices with or without a warrant. The Judge may allow Daniel to defend himself against the governments claims by putting the technology into the light. Sounds good to me.
Technology

Submission + - Why the Fax Machine Refuses to Die (infoworld.com) 1

snydeq writes: "Deep End's Paul Venezia waxes befuddled on the ongoing existence of the fax machine. 'Consider what a fax machine actually is: a little device with a sheet feeder, a terrible scanning element, and an ancient modem. Most faxes run at 14,400bps. That's just over 1KB per second — and people are still using faxes to send 52 poorly scanned pages of some contract to one another. Over analog phone lines. Sometimes while paying long-distance charges! The mind boggles,' Venezia writes. 'If something as appallingly stupid as the fax machine can live on, it makes you wonder how we make progress at all. Old habits die hard. It just goes to show you: Bad technology generally isn't the problem; it's the people who persist in using that technology rather than embracing far superior alternatives.'"

Slashdot Top Deals

Never trust a computer you can't repair yourself.

Working...