Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re:Melanoma is also possible without sun (Score 1) 148

Cancer is caused by cell generation/mutation that went wrong and can happen at any time - usually later in life, causing uncontrollable growth and with melanoma and many other cancers the ability to detach and spread to other parts of the body.
When you're in the sun, you're damaging those cells *increasing* the chance of the damaged cells mutating into the above.

The sun isn't the sole cause.

Comment Re:Dr. Mercola recommends (Score 1) 148

In 46C heat in the centre of Australia, as a pale person. I dare you to do that daily. That would prove your doctor to be a quack
It's all about your environment. If it's the middle of winter, you need more sun time than the middle of summer, assuming you're not close to the equator of course ;)

Comment Re:Thats what you get for running systemd (Score 1) 306

Yes, but many have suffered through those bugs and now the software is mature with few bugs. Why suffer through it again? I feel Alan's quote which went something like: "Those who fail to understand Unix reinvent it - poorly". Seems Systemd suffers from this issue.

Comment Re:I guess they didn't consider ageism... (Score 1) 128

Can you hypothesise why this would be the case? You're right, you can be a doctor till you're 90+ yet a 50 year old software developer is a "dinosaur", however in my experience both are typically "old fashioned", don't follow the latest trends in their respected fields, etc. (Generalising, of course) - but for hells sake my doctor didn't believe adhd existed, so refused it as a medical condition and I went untreated as a kid which I believe has negatively impacted by life.

I guess it could be the fast pace of technology and how quickly it evolves. Medicine's advancements are glacial comparatively speaking for the most part.

Comment Re:how do you manage? (Score 1) 382

I'm sorry to hear about your husband, really. However two questions, would he have had the same issues if he had gone to the emergency room at your local hospital and did he die due to the wait time or was he terminal anyway? Anecdotal evidence is purely anecdotal. If I had breathing issues I'd personally go to the doctor that day, failing that to the hospital.

Comment Re:how do you manage? (Score 1) 382

I really hope neither you nor any of your family get serious and expensive to treat cancer or another disease. That would mean you'd be relying on others taxes, or others health insurance premiums. You seriously don't want to use other peoples premiums for your own/family healthcare, right?! On the flip side, don't you get angry that others are using your premiums for their healthcare? Socialised healthcare is like private health insurance as in everyone pays, except without the profits, corporate greed, pharma & hospital price gouging, etc.

Comment Re:Legislation Amendment (Score 1) 87

It's full title is "Telecommunications and Other Legislation Amendment (Assistance and Access) Bill". The "other legislation" bit means that, in the future, other online services can be forced to install a back-door.

I've read most of the legislation draft, and if you read division 7 it says:

Division 7 — Limitations 317ZG Designated communications provider must not be required to implement or build a systemic weakness or systemic vulnerability etc.
(1) A technical assistance notice or technical capability notice must not have the effect of:
a requiring a designated communications provider to implement or build a systemic weakness, or a systemic vulnerability, into a form of electronic protection; or
b preventing a designated communications provider from rectifying a systemic weakness, or a systemic vulnerability, in a form of electronic protection.
(2) The reference in paragraph 1 a to implement or build a systemic weakness, or a systemic vulnerability, into a form of electronic protection includes a reference to implement or build a new decryption capability in relation to a form of electronic protection.
(3) The reference in paragraph 1 a to implement or build a systemic weakness, or a systemic vulnerability, into a form of electronic protection includes a reference to one or more actions that would render systemic methods of authentication or encryption less effective.
(4) Subsections (2) and (3) are enacted for the avoidance of doubt.
(5) A technical assistance notice or technical capability notice has no effect to the extent (if any) to which it would have an effect covered by paragraph

Wouldn't that mean that they cannot ask companies to build backdoors as that would weaken their systems?

Please use fewer 'junk' characters?? I've had to remove a lot of parenthesis from the legislation, so that's why it looks a little "off".

Comment Re:I'm surprised they're using outside product (Score 1) 160

You've forgotten about business critical applications. Granted more and more are going cloud, so then a switch to Linux is possible, but there is still a plethora of Windows only options (even many cloud ones are just remoteapp/citrix xenapp). Microsoft Office is also a compelling reason for those already ingrained in their ecosystem.

Comment Re: Cleartext passwords (Score 1) 59

Second, no one keeps their firmware up to date, even if there exists firmware that does have all the fixes. The really fun part, companies that *do* routinely upgrade firmware get bitten when the vendor breaks them, and does so without a good rollback facility (after all, "downgrades" are a security risk, so a key change with a firmware update that *also* happens to be bad for your configuration, well sucks to be you).

Good example, I worked for a company that upgraded their HP branded Xenserver servers ILO firmware. When the servers rebooted it'd cause a kernel panic, nothing worked due to a bug in ILO or kernel module. Once we disabled the kernel module it booted again.

Comment Phone unlocking? (Score 2) 91

However, facial recognition tech such as Apple's Face ID, which does not rely on visible light and uses depth perception, would not be tricked by juggalo makeup.

I read TFA sadly, but I don't understand why this sentence is in there - probably clickbait. The whole article is about surveillance and online face matching technology, and fooling it so it cannot identify you.

What I understand is if you wear the make-up and try to unlock your phone that uses image recognition, then it'll fail. You cannot unlock any phone using make-up. Besides there are easier methods.

Slashdot Top Deals

1 Billion dollars of budget deficit = 1 Gramm-Rudman

Working...