Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re:Pikachu surprised face? (Score 2) 10

It'll be a good case study for economists. Here's a young and unregulated market facing cheating and corruption. How many players will leave and how many will first demand rule changes? Will the operator implement rule changes? Will it collapse as players leave, or will they stay despite knowing it's broken?

And will people demand the government step in? Will economists ask that the government not step in so they can continue gathering valuable experimental data?

Comment Re:Ok, but WHY? (Score 4, Informative) 10

Looks like that's at least close to what they're talking about. I was stymied by the Bloomberg paywall, but there's also a link to the paper.

From the abstract: "Wash trading refers to the practice of buying and selling securities without taking a net position, for the purpose of artificially inflating recorded volume. It is prohibited by law in the United States, but evidence suggests that it is widespread on some exchanges, especially those involving cryptocurrencies where trader identities can be shielded."

Comment Re:Does anyone else worry... (Score 1) 72

No more than Yar's Revenge encouraged kids to become space flies.

I think most people, even the young ones, can distinguish between make-believe play and real violence. Most of the games I remember playing during recess centered on gunfights and making up rules for the gunfights. This was well before school shootings began.

Play isn't the problem, it's hate, rage, and hopelessness.

Comment Re:Why? (Score 1) 22

Because sometimes you can't trust that things are what they appear to be. Sure, maybe it claims to be a PDF, but that doesn't mean it isn't actually a disguised executable. Maybe that JPEG is actually a text file filled with financial data someone is trying to exfiltrate, and they had the sense to set the first four characters to JEPG with a matching extension. It won't open, but it'll look like an image to anything that just checks extensions or FourCCs.

If that isn't a concern, then yeah, filter out the easy stuff first.

Comment Re:This is a fine example (Score 1) 22

Sometimes, when a new tool looks useless, it's because you don't have a particular use for it. Someone else might see it and be appreciative about how much time and effort it will save. I saw this and started thinking about how long it took StealthAudit to scan all my endpoints.

Just the other week, my brother-in-law got my wife to buy a little tool for spreading open a spring on my washing machine. $11, over my objection that it was silly to spend any money on something that would probably only be used once when I was pretty sure I could do without it. Boy, was I wrong! That stupid little tool saved a lot of time and effort.

Comment Re:What is that for? (Score 1) 22

Security audits? Structured/unstructured data auditing can be pretty slow and resource intensive. And need to happen on more than just linux systems.

This could make a very tedious task a lot easier. If you've ever had to do PII/PCI/ISO auditing, you probably know what I mean. And since it can probably find malicious executable code masquerading as some benign file, all the better.

Slashdot Top Deals

No directory.

Working...