Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re:Wrong. (Score 1) 482

... rpi kubernetes cluster for a few hundred bucks. You can run hadoop or spark or hbase or mesos on a cloud provider. Learn ansible, prometheus, go, python or loads of other things in your browser. You can show off your skills outside your job on github or bitbucket ...

100% buzzword compliant. You list products that are 2 years old.

Which brings up the old joke about HR looking for someone with 10 years experience in X which has only been out for 5 years.

Yes, you can PLAY with all of those for very little money but you won't KNOW all of those. You will be a dilettante. And swapping out existing tools for whatever was released 2 years ago is a recipe for disaster.

Comment Wrong. (Score 4, Insightful) 482

No, there is nothing about you or your skills that is so unique that you cannot be replaced.

And if your severance package depends upon you teaching your replacement how to do your job (see Disney), you are even easier to replace.

I have skills that are useful and hard to find.

They may be useful, but they are not hard to find.

And yeah, I get that sucks. But the solution is to learn more skills so you can get the first type of job.

Unless you personally are working for Google or Facebook that kind of invalidates your position. You aren't so rare that Google is fighting to get you.

Look up "confirmation bias". You think that because your decisions have resulted in your position that anyone who has not achieved that position has made incorrect decisions. The reality is that when a company wants to cut their IT costs to save money, your skills will have nothing to do with their decision.

Comment Re:She makes money off of H1-B outsourcing (Score 1) 482

That's why it's "heart breaking" but she won't do anything about it.

Sure, some people suffer ...

But corporations make bigger profits and spend money on lobbying and campaign contributions and put the friends and family of politicians on their boards.

So don't expect any change from her. You have to fight for it at the state level.

Comment Not even think-tank shit. (Score 3, Insightful) 364

1. Any company TRYING to write code with the intention of killing/injuring the user will be sued out of existence.

2. Whichever executive ordered the techs to write such code would never work again.

3. Even if you allow a theoretical situation that bypasses #1 & #2, complex software is very difficult to write. The company (and executive and coders) would be sued out of existence when the car killed/injured the passenger to avoid running over a box of toy dolls.

And yet we keep seeing this bullshit on /. People here are supposed to be more informed on the topics of AI and robotics and programming than the average. But here we are, again.

Comment Re:Whitelist (Score 4, Interesting) 268

The worse issue is that her server wasn't setup with a certificate. So no startTLS option.

So all the emails she sent to it were sent IN THE CLEAR.

So yeah, it seems like idiots all around this issue. None of them understood email or security or anything more than click-here-to-make-blackberry-work.

Businesses

Comcast Admits It Incorrectly Debited $1,775 From Account, Tells Customer To Sort It Out With Bank (consumerist.com) 180

An anonymous reader writes from a report via The Consumerist: Consumerist reader Robert is fighting with Comcast over a $1,775 early termination fee that should not have been assessed after he tried to cancel his business-tier service with the company. Comcast itself has even admitted that the money should not have been debited from Robert's bank account, but now says it's his responsibility to sort the mess out with his bank. The Consumerist reports: "In an effort to save money in 2014, Robert called to have their service level downgraded to a more affordable rate. Shortly thereafter, correctly believing that he was out of contract, he cancelled his Comcast service. That should have been the end of the story, but only weeks after closing the Comcast account, the boys from Kabletown decided that Robert was not out of contract, debiting $1,775.44 from the checking account tied to the Comcast service. Skip forward to Jan. 2015 -- two months after being told he'd get made whole; still no check. Robert says that when he called Comcast, 'the rep actually laughed when I told her I didn't get a check yet. She said it would take three months.'" Two calls later, one in June 2015 and one in Jan. 2016, Robert still didn't receive the check even after being reassured it was coming. More recently, he received an email from someone at Comcast "Executive Customer Relations," saying: "I understand you're claiming that someone advised you Comcast would send a refund check for the last payment that was debited but this is generally not the way we handle these situations. [...] For your situation, you would have to dispute the payment with your bank." Good news: The Consumerist reached out to Comcast HQ and a Comcast rep wrote back. "More information just came in," reads the email, which explains that an ETF credit was applied to his account in Dec. 2014, but "through some error the refund check never generated." Comcast is reportedly sending the check for real this time.

Comment Re:How about instead... (Score 3, Insightful) 120

The immigration charade is a diversion.

Particularly because the majority of terrorist attacks in the USofA have been carried out by US citizens WHO WERE BORN IN THE USofA.

If you want to look at foreigners, those terrorists come here on tourism visas and such.

Very few immigrants commit any terrorist acts in the USofA.

Comment Re:Simple: Restore from your backup (Score 1) 116

That's my problem with this story.

It's 2016. We know how to make backups. And databases compress nicely so the backup won't take anywhere near as much space as the original.

We'll see ... but I'm willing to bet that there won't be ANY higher officers fired for this. Even though it means that some IG investigations/reports are now lost. Unless that is a feature that they wanted.

Comment Re:Its... (Score 4, Insightful) 559

Yep, it's the distance.

And whatever constitutes "teeming with aliens". Is that 10 planets per galaxy? 100? 1,000?

And the time involved. How long ago did life start on Earth? How many mass extinctions have there been? Would ANY of those have been detected by aliens on their home planet using technology equivalent to ours?

The Fermi "paradox" is based upon alien expansion. Which is, in turn, based upon tech advances that we don't have.

The galaxy could be "teeming with aliens" that we cannot detect and that we cannot reach with our technology. Nor can they detect us or reach us.

Comment Re:Finally security done the right way (Score 3, Interesting) 119

Not exactly "security done the right way".

This is mitigation.

Netflix gets the username/password list AFTER the bad guys have put it up for sale. What other bad guys have also purchased it? What other sites have you used that password on?

Running widespread password lists against your own password database is a good security practice and you are indeed helping your users much more than trying to enforce a stupid password policy.

Not really. The users will just keep modifying their passwords until they pass your checks. Then they'll have a "good" password that they'll re-use on multiple sites.

It all comes down to how the password will be cracked by the bad guys. That's why re-use is the main concern. Because that means that the bad guys only need to try ONE password for your account on other sites.

And they've scripted those attacks. They can hit thousands of sites in seconds once they have your re-used password.

That's why more secure systems use things like the RSA key fobs. So that your password CANNOT be re-used.

Comment Re:Easy. (Score 5, Informative) 637

Yeah, it matters. Unless you really are using a hash function you probably aren't as unique as you believe.

Remember, the crackers have hundreds of millions of passwords to dig through to find patterns.

Check haveibeenpwned.com to see if your email address has already been compromised. And if so, at how many sites.

Comment Re:Easy. (Score 5, Insightful) 637

#1. But I can't remember all those passwords.
  - use a password manager

#2. But I like the formula I use. It's my name + the website name.
  - no. Just use a password manager

#3. How will I know that my password isn't in a dictionary list?
  - use a password manager and have it generate random passwords

#4. But I cannot remember long passwords.
  - use a password manager

Also, "ieatkale88" can now be cracked in the same number of tries as "iloveyou" or "pAsswOrd" because they are now all added to common dictionaries.

Once you publish your "secure" password someone will add it to a dictionary.

http://arstechnica.com/security/2016/06/how-linkedins-password-sloppiness-hurts-us-all/

Slashdot Top Deals

A man is known by the company he organizes. -- Ambrose Bierce

Working...