Follow Slashdot stories on Twitter


Forgot your password?
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment I run Fedora (Score 1) 151

I'm retired, so my primary device is my home desktop. I run Fedora Linux on both my desktop and my laptop, and it's a bleeding edge testbed for RedHat, so in that sense, even the final version of each release is a "preview version." Of course, I never upgrade both of them at the same time, so that if and when something goes wrong, I'm not completely hosed.

Comment Re:WTF? (Score 2) 180

The Cherokee tribe adopted a written form of their language (a syllabary, not an alphabet as such) developed by Sequoyah in 1825, and their literacy rate rapidly outpaced that of their European neighbors. The really remarkable thing about this is that he was completely illiterate when he started, although unlike most of his people he didn't think that reading and writing were a form of sorcery.

Comment Re:I want to like Donald. (Score 1) 268

Has this moron Thiel looked at their anti-gay agenda even?

I'm sure he has. I'm also sure that unlike you he understands that this is just something that they had to put in to keep the Religious Right from bolting, along with all of that anti-abortion stuff. Nobody in politics expects those planks to go anywhere, but they insist on them to keep their more naive followers (who don't understand) happy.

Comment Re:Uhh, copyright? (Score 1) 71

That was my thought at first. However, if you RTFS (I know, I know, this is Slashdot, where people post first and RTFS later if at all.) you'll find that all it does is identify the font if it can. If you want to use the font, you still have to get a copy of it, and if it's a custom font, you probably won't be able to find it.

Comment Re:Been there, haven't done that (Score 1) 68

Holy cow, you guys are such fanboys... you don't even realize what this software is trying to do.

Yup! It's trying to use social engineering to get around the system's built-in protections. As of now, Linux still has better protections (Even if you let a malware program run it can't get at your system files unless you're stupid enough to run as root) but I'll gladly admit that Windows is much better now than it was ten years ago, even without the third-party protections that Linux doesn't need. And, I'm sure that there are attack vectors against Linux, even holes in things like SELinux or AppArmor. I was just pointing out that this particular way of infecting a machine is nothing more than a moment's entertainment on Linux.

Comment Re:Been there, haven't done that (Score 2) 68

What's really funny is running across one of those fake virus scan malwares when you're running Linux and watching it claim to find all sorts of virus infections in folders that not only don't exist on your machine, they can't because the paths are malformed for Linux. And, even if they try to download and execute their payload it doesn't work because the files aren't marked executable by default. Linux isn't perfect, by any means, but at least it's immune to that kind of attack.

Comment Re:32-bit hardware (Score 2) 378

Now, where it may get harder is finding a 32-bit system that is server oriented since most server builders are looking towards packing in the memory beyond the capabilities of a 32-bit system.

The whole argument is nothing more than a straw man. All you have to do is have a multi-boot system where one of the images is 32 bit. Sure, you won't be able to take advantage of all of the RAM, but it will run, just fine. And, you can have one using a PAE kernel so that you can test programs in that environment as well. (Yes, people do use PAE. It's for when you have more than 4 GB RAM but either don't want to nuke, pave and reinstall a 64 bit system or can't because you can't afford the downtime. All you need to do for that is install a PAE kernel and support packages, reboot into it and later, remove the non-PAE packages. And yes, I'm writing from personal experience.)

Comment Re:Why the Hell didn't Let's Encrypt register it?! (Score 1) 120

Well, for one, they don't have to to be the owner of it. In the US, it's first to use, not first to register.

I don't think so. Back in the '80s I did tech support for a small startup (long gone by now) marketing specialized software to law firms. The owner of the firm was a lawyer and he trademarked the program's name after doing a proper trademark search. About a year after we started selling, we got a Cease and Desist letter from somebody who'd been marketing a completely different, unrelated program under the same name for about ten years, but never trademarked the name. My boss replied, pointing out that they'd never bothered to trademark the name and he had, meaning that he owned the name and they didn't. He also told them that he'd allow them to continue using the name as long as they stopped bothering him and made sure that their customers knew that this was a different program. We never heard from them again.

Comment I have to wonder (Score 1) 232

Considering all of the money that Sony's paid out to lawyers over the years fighting this plus the amount they'll end up paying out to the customers if they're going to end up worse off than they would have if they'd settled before this even came to trial. Maybe, if the total costs of the case are high enough, Sony's stockholders may decide to vote out the current management on the grounds of their failing to protect the company's assets. One can only hope.

Slashdot Top Deals

The reason that every major university maintains a department of mathematics is that it's cheaper than institutionalizing all those people.