Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×
User Journal

Journal Journal: My older systems

I have two 'legacy' Macs, both with powerPC (PPC) processors.

The 2001 model has 256M of RAM, the 2004 model has 512M of RAM. Both were abandoned by Apple long ago, and no longer
enjoy the ability to run the current MacOS. This is a problem when depending on a single vendor for everything.

My 2009-vinage computer has 6G of RAM, an Intel CPU, but it's not a Mac. It runs Linux, and can run other OSes as well, but I only do that with virtualization.


BFG Exiting Graphics Card Market 108

thsoundman writes news that BFG appears to be giving up on the graphics card side of its business. The company's chairman said in a statement: "After eight years of providing innovative, high-quality graphics cards to the market, we regret to say that this category is no longer profitable for us, although we will continue to evaluate it going forward. We will continue to provide our award-winning power supplies and gaming systems, and are working on a few new products as well. I'd like to stress that we will continue to provide RMA support for our current graphics card warranty holders, as well as for all of our other products such as power supplies, PCs, and notebooks."

Comment How about an audit first? (Score 3, Interesting) 306

Before going crazy overhauling, let's audit the devices that are out there. Then you can assign marketing labels (Bronze, Silver, Gold, Platinum) in case you can't read the numbers. (Numbers would be watts per day, assuming constant usage)

Just create something the FCC registration process/database, and let certified labs submit their own engineering reports on the TRUE power consumption. I've never seen any Energy Star audit reports.


Should Companies Share Criminal Blame In ID Theft? 328

snydeq writes "Deep End's Paul Venezia criticizes the lack of criminal charges for corporate negligence in data breaches in the wake of last week's Best Western breach, which exposed the personal data of 8 million customers. 'The responsibilities attached to retaining sensitive personal identity information should include criminal charges against the company responsible for a leak, in addition to the party that receives the information,' Venezia writes. 'Until the penalties for giving away sensitive information in this manner include heavy fines and possibly even jail time for those responsible for securing that information, we'll see this problem occur again and again.' As data security lawyer Thomas J. Smedinghoff writes, data security law is already shifting the blame for data breaches onto IT, thanks to an emerging framework of complex regulations that could result in grave legal consequences should your organization suffer a breach. To date, however, IT's duty to provide security and its duty to disclose data breaches does not include criminal prosecution. Yet, with much of the data security framework being shaped by 'IT negligence' court cases over 'reasonable' security, that could very well be put to the test some day in court." It's a slippery slope to be sure, but where should the buck stop?

Are IT Security Professionals Less Happy? 363

zentanu writes "It's said that if you want to be happy, be a gardener. What about IT security professionals? Having worked as an IT security consultant for several years, I now wonder if my job has a negative influence on my happiness, because it constantly teaches me to focus on the negative side of life: I always have to think about risks and identify all sorts of things that could go wrong. As an auditor I search for errors that others have made and haughtily tell them. As a penetration tester I break systems that system engineers and administrators have laboriously built. I assume inside threats and have to be professionally suspicious. The security mindset surely helps me in my job, but is it good for me on the long run? What kind of influence has being an IT security professional had on your general attitude towards life? What helps you stay out of pessimism and cynicism? Is protecting existing things really as good as building new ones?"
The Internet

Telecom Rollouts Raise Ire Over Utility Boxes 284

Anti-Globalism points out this AP story, which notes: "As cable and phone companies race to upgrade services or offer video for the first time, they're doing it by installing equipment in boxes on lawns, easements and curbs all over American neighborhoods. Telecommunications rollouts have always been messy, but several towns and residents are fighting back with cries of 'Not in my front yard!' AT&T Inc.'s nearly fridge-sized units, which route its new U-verse video product to customers, are drawing particular ire. A few caught fire or even exploded. AT&T said it has fixed that by replacing the units' backup batteries."

Microsoft Releases Photosynth 247

Spy Hunter writes "Photosynth has graduated from a 'tech preview' to a complete service. Now you can upload your own photos and have them automatically transformed into a 'synth': a 3D fly-through reconstruction of your home, your vacation, or anything else you can take pictures of. Learn more about Photosynth at the official blog, see what Walt Mossberg has to say about it, or just go try it out right now." According to Mossberg, Photosynth works on PCs using IE or Firefox, but not yet on Macs. We've been discussing Photosynth since its introduction.

Shrinky Dinks As a Threat To National Security 257

InflammatoryHeadlineGuy writes "What do Shrinky Dinks, credit cards and paperclips have in common? They can all be used to duplicate the keys to Medeco 'high-security' locks that protect the White House, the Pentagon, embassies, and many other sensitive locations. The attack was demonstrated at Defcon by Marc Weber Tobias and involves getting a picture of the key, then printing it out and cutting plastic to match — both credit cards and Shrinky Dinks plastic are recommended. The paperclip then pushes aside a slider deep in the keyway, while the plastic cut-out lifts the pins. They were able to open an example lock in about six seconds. The only solution seems to be to ensure that your security systems are layered, so that attackers are stopped by other means even if they manage to duplicate your keys."

Google Has All My Data – How Do I Back It Up? 215

shadeshope writes "Slowly but surely Google has taken over my computing life. How can I back it up? Bit by bit with their mantra, hip image and brilliant services, Google has gained my trust and all my data. I am doing almost all of my computing in the cloud. Google Reader, Calender, Email, Docs and Notes have become my tools of choice; even to the point where my day book, research notes, etc., are all on Google's servers. It was just so easy, enabling me to effortlessly work from multiple computers, operating systems and locations. I know, I know, this is foolish — all my eggs are firmly in one basket. It has crept up on me. As a long-time computer user and committed pessimist, I have used many schemes over the years to ensure my data is safe. Now I have ceded all control to Google. How can I regain some control and back this all up? Is there a one-touch solution that will take all my data from the various online apps and archive it on my home server?"

Slashdot Top Deals

Enzymes are things invented by biologists that explain things which otherwise require harder thinking. -- Jerome Lettvin