Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:It depends (Score 1) 183

No, a virus will not "immediately re-activate on restoration". For a virus to "activate", some form of execution is required. Restore your data files only, or don't run infected executables from your backup.

Yes, there have been viruses that infect data files, such as PDF documents, Word documents, or graphics files, but even so, these would not "immediately re-activate on restoration".

Comment It's not just a cost issue. (Score 4, Insightful) 183

Having tried the preventive approach on computer security for years, I came to the reluctant conclusion that it's a losing game. In every business scenario I've dealt with, it is simply impossible to protect against every threat and every zero-day exploit that comes down the pipe. Software patching, firewalls, antivirus, specialized appliances, you name it - they all have their limitations. You can protect against any number of possible exploits, but if only one gets through, you lose. So businesses must weight the costs spending more and more on preventive security solutions versus the cost of a security breach.

Obviously the implications of a breach are more severe for some businesses than others, but in many cases I deal with it makes more sense to focus on a good recovery solution rather than focussing mainly on prevention.

Comment Re:Oh yeah? Then what are you gonna do about it? (Score 4, Insightful) 410

...in what way does the EU benefit other then to force a member nation to fall in line with the rules they agreed to.

If one EU country lures foreign investment by offering illegal tax breaks, they undermine the ability of other countries to attract investment. The benefit to the EU of enforcing the rules is that EU members get a level playing field.

Comment Pic Tac Toe (Score 3, Interesting) 55

The problem with Tic Tac Toe is that it's too deterministic. It will always end in a draw unless one player does something stupid.

That's why I made up a variant I call "Pic Tac Toe". On each player's move, they can choose to write either an X or an O. The first person to get any three in a row wins.

I don't know if anyone else has come up with this, or if it can also be proven to be deterministic. I suspect that it might be, but at least it adds a bit more variety to the game.

Comment Re:Thanks, developers! So agile! Much evergreen! (Score 1) 220

Would it seriously be too much to ask ... a working configuration that isn't "the newest version"..., users be permitted to not change already-working configurations?

I just switched to the Long-Term Servicing Branch (LTSB) version of Windows 10 and so far I like it. No App Store, no Cortana, no force-installed new features.

Comment Exchange 97 to Exchange 2010 (Score 1) 400

Wait till you see Exchange Server 2016. It's still chock full of gotchas, but with a completely new (web-based ) management interface. the PowerShell-based management shell is still there, however, and remains the best way to manage things.

Management issues aside, Exchange is a useful product. Synchronization of e-mail, contacts, and calendars with iOS and Android smartphones is supported out of the box, and Outlook Web Access is the best webmail implementation I've seen.

My main issue with it is that Jet databases are fragile. Had they implemented SQL Server as the back-end, it would be far more resilient.

Comment Doesn't break what UAC is intended for. (Score 5, Insightful) 79

UAC isn't intended to be some kind of inviolable security mechanism. It's more of a simple alert that some process is trying to make changes to your system - a nice thing to know if you weren't expecting it. The fact that you can bypass the UAC prompt when already on the computer with administrative rights is pretty non-consequential.

Slashdot Top Deals

10 to the minus 6th power Movie = 1 Microfilm