Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re:Linux Gaming Support (Score 1) 336

That's it. That's all that we need. If we could somehow figure out a way to get a good gaming experience on Linux then the fabled Year of the Linux Desktop(tm) would manifest in reality.

Windows would be relegated to the office (and even that can change since more and more apps are web based) and we would finally be free.

Easy. Tell the kernel developers to take their heads out of their asses and accept that graphics card makers have proprietary shit to protect. Until the FOSS people learn to play nice with others gaming on Linux will be complete shit.

Comment Re:Steam should stop modifying perms (Score 2) 407

One of the things which turned me off to Steam was how they overwrote secure directory perms, to make it so that all users could modify folder, which only Administrators should be able to modify. Sorry Steam, you're insecure.

This. I want to cheer Steam as much as the next person but the Steam app is a fucking security disaster. I love Gabe but the dude is a crappy CEO. The flat management style at Steam means nothing gets done or things get half done because no one has the authority to power things through to completion.

Gabe saw the writing on the wall with Windows 10 and started SteamOS as a response but where is the follow through? It's stagnating and dying on the vine.

Comment Re:No, that's not insecure at all... (Score 1) 368

"You'll be able to ask it to make a note, play music, set a reminder, and lots more without ever logging in. "

All I can think when reading that is "attack vector." No matter how much they claim it's limited, sand-boxed, walled off and segregated from the rest of the system, someone will figure out a way to gain system access through it. Microsoft may as well advertise Windows 10, Now With Built In Password Bypass!

So turn it off?

Comment Re:And nobody will be punished... (Score 3, Insightful) 65

Assuming this is true...

What should happen is that the "genius" who thought this up should be convicted and sent to prison for 30 years (or whatever they threatened Aaron Swartz with), for breaking the CFAA.

What actually will happen is that $BIGCORP will get a trivial slap-on-the-wrist fine.

Punished for what? The article doesn't even describe a single attack, let alone a victim or perpetrator. This is like someone in high school saying "My cousins best friends brothers girlfriend heard that someone down the street smoked a joint 6 months ago"

Comment Re:God damnit (Score 0, Flamebait) 52

That funny because I am so sick of people complaining of the allegedly incorrect use of the word Artificial Intelligence.

It is the correct academic term for the computing field that include data mining, machine learning, operation research, and statistics. Now, maybe Artificial Intelligence does not mean what you wish it meant. But academics are fairly clear on what it means...

Machine learning != Artificial Intelligence

No matter how hard you try to rationalize that bullshit it doesn't make it true. It's just a bunch of jackass business people trying to sound like their company is ahead of the game with AI when the reality is that it doesnt fucking exist yet.

Submission + - Linux Mint Hacked Again (wordpress.com)

geek writes: "It is with deep despair that today I have to write that at least portions of the Linux Mint Infrastructure seem to have come under a coordinated attack and that the Development Team has to date NOT responded to subtle non standard channel requests for info on this.?

Comment Re:This won't wash (Score 2) 282

How would we differentiate between an encrypted data stream and a video stream in a new movie format? What's the difference between decrypting vs displaying a movie? Both processes are a conversion operation being performed on a data stream.

Simple. Packet capture and look for the key exchange. I do this daily.

Dunno if you are trying to be funny or are just a complete idiot. There's no need whatsoever for "key exchange" when I send an encrypted message to my broker in the Caymans. He has the decryption software and password. NOthing but the message is transmitted.

See also PGP.

That's nice. Also totally unrelated to what the GP asked.

"performed on a data stream"

Comment Re:This won't wash (Score 3, Informative) 282

Let's say I am an ISP and I have a data stream coming through my system. How do I know if the data is encrypted or not? Data is data. Neither IP nor UDP packets have an 'encrypted data' indicator.

How would we differentiate between an encrypted data stream and a video stream in a new movie format? What's the difference between decrypting vs displaying a movie? Both processes are a conversion operation being performed on a data stream.

Simple. Packet capture and look for the key exchange. I do this daily.

Comment Yep (Score 5, Informative) 144

My company has a new program that targets "millennials". Our HR department has been very vocal about it and how they need to target things millennials want on a work environment, like game rooms and catered meals etc. Its all talked about like this great thing and the future of the company. The hype is huge. Meanwhile I'm seeing fewer and fewer people over 50 at the company.

We're a fortune 500 company. The age bias is blatant and in our faces. We are not based out of Silicon Valley either.

Slashdot Top Deals

"In order to make an apple pie from scratch, you must first create the universe." -- Carl Sagan, Cosmos

Working...