Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment Why not just use Excel then? (Score 1) 66

If a system breach means all the KeePass data is vulnerable, then what's the point of KeePass? Because it primarily takes a system breach to get the file in the first place. If with access the database can be forced to export the data to plain text, I might as well store all the data in clear text in Excel (besides the obvious protects from simple prying eyes). At the very least, KeePass should force the config file to have limited access, and force the install into a secure folder. I for one think it's a valid report, if only because it notifies me it's a problem.

Comment So they can be outsourced? (Score 1) 233

While you can certainly make a good salary as a computer programmer, the greater likelihood is that the low-level entry work in computer programming that many of these people could be candidates for is also extremely vulnerable to outsourcing. It's like training the retail workers to be factory workers, but worse.

Comment I can understand why (Score 2) 102

I've been involved in projects that included donations of ride-sharing bikes. Ride-sharing bikes appear good, rugged bikes. First, they're a bitch to work on for the average person. Everything on them uses different tools than "normal"; tools the average person doesn't have in their home. They also use puncture-proof tires on rims that might or might not support replacing them with "normal" tires. Their generic geometry also makes them not very good bikes. They also all have some security system that has to be removed for them to be rideable without the app. Finally, they get beat all to heck. So there's a lot of problems with them, and they must be under constant repair. The frames get cracked, the baskets bent. It generally takes 1-2 hours to refurb one of those bikes. Someone has to take that on (not to mention have a place to store them) during any renovation project. When I acquired that project I didn't understand just throwing them out. Now I do.

Comment Laptops (Score 1) 262

For a laptop, I just enable to Power-on and disk password (and lock admin). That's going to stop 99.99% of the thieves (and protect the data from them), and, better yet, give the thieves a laptop that isn't good for much at a pawnshop, so they're less likely to return for a second pass. Any systems are imaged (clonezilla) with the images stored off site, and the data is backed up (and on a weekly basis swapped with off-site backup (taking drive to work after confirming routine with employer).
Social Networks

Meg Whitman Campaign Shows How Not To Use Twitter 147

tsamsoniw writes "California gubernatorial candidate Meg Whitman's campaign team attempted to share with her Twitter followers an endorsement from a police association. Unfortunately, the campaign press secretary entered an incorrect or incomplete Bit.ly URL in the Tweet, which took clickers to a YouTube video featuring a bespectacled, long-haired Japanese man in a tutu and leggings rocking out on a bass guitar. And for whatever reason, the Tweet, which went out on the 18th, has remained active through today."

Comment Go with simple. (Score 1) 264

I too inherited an aging infrastructure, and have mostly replaced all of, well, everything, with mostly what you're talking about, so have faced some of the decisions you're looking at, and used VMWare for much of that upgrade.

Home Office (in this context): Dual vmware servers, each having generally the VM instances:
System:
Guest #1: Windows 2008: Domain controller, DHCP, DNS, WINS
Guest #2: CentOS: Radius
Guest #3: CentOS: WWW, FTP

Network a dual link running BGP, with VPNs to each of the remote sites, which have their own server for DNS (a slave) and DHCP (in case the VPN link is down).

Using VMWare for services that aren't redundant as well. All VMs back up to the other VMWare server (with Ranger) so I can bring up guest VMs if their VMWare server fails. Virtualization gives me very easy DR (instead of having to recover an OS, I only have to recover a VM), easy hardware upgrades (migrate the VM), and generally the services are redundant for OS and hardware maintenance so I can patch and reboot without disrupting most services.

More complex than that in practice, but you get the idea.

Networking

Directory Service Implementation From Scratch? 149

An anonymous reader writes "I work at a small but growing startup company. Currently, our directory and authentication information is scattered across many systems and wikis, and is becoming increasingly difficult to manage. We are looking at centralizing this information in a directory service to minimize administrative overhead as we continue to grow. The service must support basic directory searches, as well as user authentication for Linux and Windows hosts. Although we are primarily a Linux shop, there are a handful of Windows systems that will be on a Windows Active Directory domain. Most directory servers seem to support integration with other directory servers, however it seems like it may be easiest to just use Active Directory for everything. Are there any pitfalls with this approach? If you had the chance to redesign your enterprise directory service without regard for legacy services, how would you do it?"

Comment So now torrents mean WoTC doesn't lose money. (Score 1) 501

So when I wanted old DND material, I could go online, and purchase the PDF and WoTC made money. I can't buy them directly from WoTC because old modules / campaign materials aren't published anymore.

Buying them used (say ebay) makes no money for WoTC. Downloading them from a torrent makes no money for WoTC.

Brilliant. WoTC has removed any way I can purchase them and have WoTC make money (and encourage me to look for other sources). Since I can't obtain them in a way that WoTC makes money, WoTC doesn't lose money if I get them another way. So they shouldn't be able to claim losses, since I can't buy them otherwise.

Slashdot Top Deals

"Stupidity, like virtue, is its own reward" -- William E. Davidsen

Working...