Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re:How the ransom works (Score 1) 15

Add Adobe, AutoDesk, Microsoft, Oracle, SAP, IBM, McAfee, Symantec, and VMware to that list.

They're all on the 'software companies most likely to audit you' list.

And for these organizations, Audits are an increasingly important source of revenue.

So most of them are expanding audits, and switching products towards a cloud model; either way, to
force customers to pay an additional periodic revenue stream..... especially MS.

Comment Re:As a C programmer (Score 1) 308

> I think I'd be willing to argue in an interview that this does a memmove in 4 lines of C.

C requires you cast objects of type void*  before dereferencing such as  "*src".....

However, that bit of code crashes with a stack buffer overflow due to too many recursive calls if moving an object larger than approximately 200 Kilobytes.
At that point you might as well do this,  since it's essentially just using the stack as a temporary buffer anyways;   and this can handle objects of a bit more size  without crashing.....

void * my_memmove(void * dest, void * source, size_t n ) {
  char x[n];
  for( int i = 0 ; i < n ;  (x[i] =  *(char *)(source + i)) , i++ ) ;
  for( int i = 0 ; i < n ;  (*(char *)(dest + i) = x[i]) , i++ )  ;
  return dest; }

Comment Re:What's the big problem? (Score 1) 508

> If you're talking about the process being slower, ok yeah, by about 10 to 15 seconds or so.

That's kind of a big deal. Swiping used to be instant. Now Insert your Card and sit there waiting 10 extra seconds for the machine might not be a whole lot of time, but it is perceived as taking a lot longer, And compared to instant, it DOES take a lot longer for the machine to finish reading the card and say DONE.

Comment Re:As a C programmer (Score 1) 308

Clever. But it has the complexity of a 10-line solution packed into 4 lines using C tricks that would be disallowed in real-world code by the style guide or code review.

Each use of the ternary operator counts as three additional lines worth.
Each use of a comma or semicolon as an operator counts as one additional line.
Each clause on the righthand side of an assignment operator that contains a relative comparison or boolean op counts as 1 additional line.

Comment Re:In a country far far away (Score 0) 528

Unfortunately there are still some apps that only really run in windows. I have lots of Linux computers, but I still need windows for a few things. Reply to This

Are you sure? Maybe you haven't really done much to look for a workaround for those things, and it's just convenient, because you know a Windows option......

Comment Re:As a C programmer (Score 1) 308

That's clever, But each clause of a ? : statement, And Each Assignment in the same expression as a comparison or Boolean operator counts as an additional line of code.

Using those tricks is cheating and excessive usage is deprecated by most style guides.

Also, using memmove() in the implementation is clever, But also cheating.

Comment Re:As a C programmer (Score 1) 308

a naïve (acceptable in an interview) implementation of memmove can be achieved in 4 lines of code. This isn't rocket science I'm asking about.

I am going to challenge you right here and now to produce your 4-Line my_memmove() function. This should be a breeze, since you've apparently done it before.
One line per statement.
I will write you the test sequence that code has to pass with an identical result to the Linux Glibc2.12 memmove() function.

Here's the test sequence: http://pastebin.com/Bix6mvqv

You would need to implement memmove because, believe it or not, there are people out there who implement the libraries that memmove is implemented in.

Yes, there are people who have implemented LibC once or twice, then published. It can surely be accomplished; However..... It is not less than a half day's project for a good C programmer to implement something like Memmove(); There are complications, and unless you simply have implemented your own memmove several times, even an advanced C programmer is not going to be able to just bang this out.

Comment Re:So... (Score 1) 127

boutique car made by a startup company directed by an eccentric tycoon could possibly have had a supplier or design change. Unfathomable!

It is a bid odd, the timing of the supplier change, however. Did MobilEye deliver something substandard or that failed to meet specs? Did Tesla find a better option to replace MobilEye?

Maybe this is just a cost-cutting measure which happens to coincide with the fatal crash by chance alone.

Or... : Is Tesla dissatisfied with the MobilEye components on any rational basis, Or the supplier seemed like a good scapegoat, Or Tesla had unreasonable expectations from MobilEye's components?

Comment Re:As a C programmer (Score 2) 308

"Implement memmov"? WTH would you do that? There's a reason that memmov() is a Library call.

It's rough to implement such subroutines accurately; even if you know what you are doing.

You don't need to be capable of doing low-level coding on a whim to be a competent C programmer.

Sounds like you're expecting the average C programmer to be a low-levell 3-Star or 4-Star pointers expert, and your standards may be unreasonably high, there.

Comment Re: The basest, vilest (Score 1) 1006

Except political assassinations do happen, unlike being put in a Moon-bound boxcar,

Calling for someone to be given the death penalty by the state and calling for them to be murdered with no due process are two different things.
I believe what Trump people were saying can only reasonably be held to imply the former, not the latter.

If Trump actually went to ask his supporters or others to commit the latter, then Trump himself could be committing a crime by attempting to incite people to do so, and Trump himself could even go to jail if one of his supporters attempted a political assassination after he "called on" people to do that.

So I'm 80% sure Trump is smart enough to not call on people to Kill non-combatant Americans outside a sentence handed down by the legal system, now or in the future.....

Comment Re:How were crimes solved before cell phones? (Score 1) 254

Many law enforcement leaders are acting as if no crimes can be solved unless all cell phones are made more vulnerable.

Before Telephones; you could tell who someone was communicating with by monitoring their physical movements on foot. Telephones would have made that harder..... Until wiretapping became a thing that was allowed.

Ubiquitous technology, And "Ease of Snooping" made law enforcers' lives easier at investigating crimes than it ever was before Telephones were invented.

At this point they are "used to it", attached to it, and probably feeling almost entitled to the right to eavesdrop on demand. Millenial-style entitlement.

Instead of merely opposing them; however..... I propose that we as technologists should put together a list of "Recommended Alternative investigatory techniques"

For example: Communications may be encrypted, BUT service providers can still tell you Which Cell phone is Talking with which Cell phone.

And if you can get a court order, then require service provider and phone manufacturer to cooperate with planting a "Hardware snooping device" on the phone itself.

For example, a special hardware chip that can be covertly installed in the phone for info. gathering after a warrant is issued on a suspect.

Or a capability to clone their phone... E.g. Restore a backup from the cloud, and replace the suspect's original phone with a specially modified replica that will log the suspect's passphrase.

In either case, law enforcement covertly gain physical access to hardware, for at least a few minutes.

Comment Re: The basest, vilest (Score 1) 1006

What is even funner is that it is probably true. I would give a 99% chance, per each lost message, that message still exists somewhere. If nowhere else, then in the Outbox / outgoing and Incoming mail mail archives Of every person who corresponded with Hillary over E-mail. Gain access to the e-mail archives of 100% of the people who corresponded with her, then you can probably recover 99% of the messages.

And if not: Probably 50/50 odds for each message that it is in the hands of the Russians, and if not them Iran, or some other countries' intelligence department, or some random independent cybercriminal in one of those countries......

Comment Re: The basest, vilest (Score 1) 1006

The Trump campaign called for Hillary to be executed for mishandling email.

The Trump campaign could call for every Hillary supported to be shipped off to the moon if they wanted; that does not mean there's a snowball's chance in hell of that happening.

Just wishful thinking or mindless politico-babbling on their part to hopefully capitalize on the anger against Hillary to drive up their poll numbers.

Comment Re:The basest, vilest (Score 1) 1006

Sounds like a form of Treason if true. Inviting a foreign nation tho cyber-attack America and/or Americans

Not treason. Gaining unauthorized access to systems and leaking information to the press is Not an "Attack" or comforting an enemy. The state of Russia is not an enemy, and even if it were - Trump is probably addressing individuals, not the state --- and also merely speaking in favor of something happening is neither comfort nor aid, But it might be not presidential by traditional standards, and people may judge it as in incredibly poor taste.

An attack would be more like defeating gates and security, Trespassing on a company's boat being held by customs to pay Tea taxes due, And dumping the assets into Boston harbor.... And if some of those involved happened to not be locals....... now THAT would be a treasonous attack.

Slashdot Top Deals

Shortest distance between two jokes = A straight line

Working...