Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:Formatting (Score 1) 103

That was intended as a two-part joke about how Word files are saved.
- .doc: a binary output file, read somewhere it was some kind of memory dump from within Word. Definitely not "plain-text"
- .docx: a zipped collection of XML files describing the document and contents. Not quite plain-text.

I've seen a few of those documents entirely formatted in bold and/or italics. So, not "plain" text.

Coins in the hat, tomatoes in the face, please!

Comment Golden Rule (Score 2) 192

"The F-35 program has a proven track record of solving issues as they arise, and we're confident we'll continue to do so."

Funny, isn't it? If you throw enough money at most problems, they go seem to go away! From almost start to finish, this "program" has been an exercise in "work richer, not smarter".

Comment Re:So, what's her other option? (Score 2) 412

You're telling me it's "absurd" for her to sue, and she should "Grow The Fuck Up (tm)". But you're not telling me what she should actually do. What choices does she have other than suing?

I interpreted the GP post a bit differently. I agree that it is absurd that she is suing her parents over this stuff...but that it's not as absurd as her parents not taking them down (or changing the sharing to "Me only"). The whole situation has gone sideways.

Perhaps her parents are considering it on the same level as a scrapbook/album? I only hope that someone explained to them a key difference:
Facebook sharing is like a picture album that you have no problem lending out to any of your friends (or FoF, or member of the public, depending on sharing settings), any time they want it, with no idea what they are going to do with it (including making copies), while still having 100% certainty that it will be returned in perfect condition).

I won't lie; the idea horrifies me.

Comment Intrepid (Score 1) 55

I applaud their efforts, even though I'm a little horrified at the lengths to which we'll go in our quest to remove anonymity.
While I'm sure there are good uses this can be put to, I wonder if any of the researchers questioned whether this was really a good idea...

Now, if this system was capable of identifying the person responsible for {insert bad corporate act(s)} through the corporate veil well enough for them to be meaningfully punished, that would be incredible!

Comment *yawn* (Score 4, Insightful) 228

The Server Application in Windows 10 isn't running inside of a hypervisor; it's "running on the OS, getting all the benefits of performance and system access, as well as expanding the potential attack surface." eWeek reports on a new threat discovered by Alex Ionescu, the chief architect at cybersecurity company Crowdstrike, which begins with the fact that "The Windows file system is also mapped to the Server Application, such that the Server Application will get access to [...] files and directories."

Ionescu says "There are a number of ways that Windows applications could inject code, modify memory and add new threats to the Server Application running on Windows." According to eWeek, "The modified Server Application code in turn could then call Windows APIs and get access to system calls to perform malicious actions that might not be mitigated."

I'll Tell you what else increase your attack surface: Turning the computer on.
Didn't RTFA (naturally!), but the summary fails to convince me that this is more than incrementally worse than running...well...MOST applications that do anything useful on Windows.

Comment Improvements (Score 1) 241

Oh? So more/better qualified candidates have become available to apply for positions at Apple? Great! Although, I'm not entirely convinced that Apple had anything to do with that...
err..or were you saying that Apple has become a little better at hiring people that will make it look more Politically Correct?

Comment Re:Flash! (Score 1) 60

I think GP was perhaps alluding the Gutmann method (35-pass) of sanitizing data on a hard-drive. Which method has been obsolete since the late 90s, as it was specifically designed to wipe HDDs using MFM/RLL (how magnetic signals detected on the hard-drive were interpreted). With newer magnetic media, one pass is honestly "good enough". Three passes using a well-known standard can afford you better peace of mind while also allowing you to comply with most official "secure wipe" requirements.

Unless GP specifically meant Flash/chip-based storage, in which case, your best bet may be a drive that destroys its media if the drive's enclosure is compromised.

Slashdot Top Deals

Any given program will expand to fill available memory.