×

Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

Comments

top

Ask Slashdot: Is Non-USB Flash Direct From China Safe?

John_Sauter non-free formatter is risky (178 comments)

The SD Association has a special formatter which avoids this problem.

Interesting that the special formatter is only available for Microsoft Windows and Apple Macintosh, and apparently only in binary form. Even if I had such a computer I would not be comfortable formatting my disk with non-free software. Who knows, it might be putting an encrypted child porn picture on a hidden part of the disk, exposing me to the risk of prosecution. No thanks.

about two weeks ago
top

No, You Can't Seize Country TLDs, US Court Rules

John_Sauter euphemism (120 comments)

Basically it works like this. 1) Amy has a contract to wash Bob's car for $100 month. 2) Carl sues Bob for murdering his dog. 3) The courts can not give Carl a contract with Amy. The courts can only award Carl with property and money taken from Bob. Basically the courts can't force Amy to work with Carl. They can't force ICANN to work with the plantiffs.

A very thought-provoking post. I had trouble understanding why Bob would pay $100 a month to have his car washed, until I realized that washing his car is a euphemism. Upon realizing that, your argument became much more persuasive.

about two weeks ago
top

Washington Dancers Sue To Prevent Identity Disclosure

John_Sauter Re:Yes, but the real problem is being ignored. (461 comments)

Too bad the license costs $75/year. If it were free, we could fix this problem really quickly by everyone applying for stripper licenses.

Hell, $75/annum is only six bucks a month. I'd get one if I lived there, just for the novelty value....

In 2002 I found the same licensing regime in Houston, Texas. One of the dancers I talked to said she worked illegally because she knew that registration created a public record, which could follow her the rest of her life. In response, I registered as a nude dancer. The people at the licensing bureau were remarkably polite, even though an audience would pay to not see me nude. I still have the identity card: call me 007735 Robert.

about three weeks ago
top

First Shellshock Botnet Attacking Akamai, US DoD Networks

John_Sauter Re:Only the beginning (236 comments)

...You can check if you've been scanned for exploitable CGIs using something like (adjust apache logs path accordingly):

grep cgi /var/log/apache2/access*|egrep "};|}\s*;"

And you can check if your bash is vulnerable using:

env x='() { :;}; echo vulnerable' bash -c 'echo Testing...'

If 'vulnerable' appears, it is.

Thank you for the grep. When I ran it on my little web site I found I had been probed. The log line looked like this:

89.207.135.125 - - [25/Sep/2014:01:53:59 -0400] "GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 224 "-" "() { :;}; /bin/ping -c 1 198.101.206.138"

I wonder what would happen if we all starting pinging that last IP address.

about 2 months ago
top

The FCC Net Neutrality Comment Deadline Has Arrived: What Now?

John_Sauter Re:What now? (131 comments)

Damn that's not a good sign then.

Our puritanical culture condems sexual entertainment. I don't agree: I think hiring a prostitute is much more fun than watching a violent movie or attending a loud concert. However, to each his own.

about 2 months ago
top

The FCC Net Neutrality Comment Deadline Has Arrived: What Now?

John_Sauter Re:What now? (131 comments)

Out of curiosity, what is the least corrupt part?

The section of the Secret Service that protects the President.

about 2 months ago
top

German Court: Google Must Stop Ignoring Customer E-mails

John_Sauter Re:solution (290 comments)

A budget is a statement of what's important. (A more-or-less clerical friend of mine said that the most important theological document a church has is its budget.) If a company is required by law to do something, then that something will be held to be important, and an unwillingness to devote the resources to doing it will not necessarily fly with the judge.

That is why you hire the judge's granddaughter. The judge will be reluctant to declare the effort insufficent, because she won't want her grannddaughter to lose her cushy job.

about 2 months ago
top

German Court: Google Must Stop Ignoring Customer E-mails

John_Sauter Re:solution (290 comments)

Sure that works in Germany?

Well, it works everywhere else, why not in Germay?

about 2 months ago
top

German Court: Google Must Stop Ignoring Customer E-mails

John_Sauter Re:solutionn (290 comments)

And within a few days the girl will file a report informing about the volume of work she is facing and the number of subordinates she needs to hire to get the work done, along with the suggested salary for herself and the subordinates. All of it to be paid by Google, of course.

And her supervisor will reply that there is no money in the budget for hiring more people, so she should do the best she can with the resources she has been allocated.

about 3 months ago
top

German Court: Google Must Stop Ignoring Customer E-mails

John_Sauter solutionn (290 comments)

Google should hire the judge's granddaughter to read and respond to the e-mails.

about 3 months ago
top

Information Theory Places New Limits On Origin of Life

John_Sauter Re:Life may be common, but not always as we know i (211 comments)

....if we were to find a planet filled with plants made up of D amino acids and left-handed DNA we may find ourselves unable to consume those plants for nutritional value.

More importantly, they would not be able to consume us for nutritional value.

about 3 months ago
top

Stallman Does Slides -- and Brevity -- For TEDx

John_Sauter Re:how I prepare a presentation (326 comments)

I'm still saying you are the competent exception. If you took one class in public speaking and are an expert, you are not the standard student. You are a savant. Where I worked we had technical editors, visual editors, and general content people who went to school to learn how to communicate ideas professionally and if you are performing at their level you are possibly in the wrong line of work.

Just because I can prepare a presentation that people will listen to does not make me a professional. When I started doing it, the ability to communicate with customers effectively was considered part of the normal duties of a software engineer. Today's professional communicators will invite you to a free dinner and sell you a timeshare. I'm not in their league.

about 3 months ago
top

Stallman Does Slides -- and Brevity -- For TEDx

John_Sauter Re:how I prepare a presentation (326 comments)

....A trained communicator in the loop is a very good idea.

I would disagree with you only on this point, and only slightly. I would say that a trained or experienced communicator in the loop is a very good idea. I have never had any formal training in communication, beyond a class in public speaking in summer school.

about 3 months ago
top

Stallman Does Slides -- and Brevity -- For TEDx

John_Sauter Re:how I prepare a presentation (326 comments)

I have a similar background, except we had an editor who approved all slides. She was a ruthless, heartless person who lacked a soul while wielding a red pen like calvaryman's saber as she edited. In other words, the perfect editor. To this date, I cringe at a presentation withe text less than 16 pt and more than 20 words on a slide. When I see a sentence with a period on a slide I remember her admonition "Women have periods, slides don't."

I would liked to have met her. As far as I know my slides never had any approval process, but I think your editor would have liked them.

about 3 months ago
top

Stallman Does Slides -- and Brevity -- For TEDx

John_Sauter how I prepare a presentation (326 comments)

I started doing presentations back in the days of 35-mm slides. I didn't have to prepare them myself—I sent the text to the corporate slide presentation department, and they sent me back the slides.

I prepared my presentation by first writing out what I wanted to say, word for word. I then distilled that document into a few topic lines, which I had made into slides, generally about three topics to a slide. At this point I discarded the original manuscript. When I gave the presentation I glanced at each slide to remind me of what I wanted to say, then spoke extemporaniously.

Today I prepare the slides myself using LibreOffice Impress, the free equivalent of Microsoft PowerPoint, but I use the same method.

about 3 months ago
top

Getting Into College the Old Fashioned Way: With Money

John_Sauter Re:Not worth it (161 comments)

At first I wanted to write off your post as just typical, cynical slashdotterism. But I re-read it and - well, I realize that you are probably right, particularly in the IT field (it could be argued that if you want to work in academia, school names _do_ matter).

Reading your post carefully, I see you aren't saying that "college is worthless, blah blah blah" but rather that the differences between the universities for undergrad ain't what they used to be. As another commenter here noted (paraphrasing) information has been liberated by the Internet so University isn't the only way to attain subject matter knowledge anymore, closing the gaps between schools.

However, I continue to believe that if a person goes through 4+ years of accredited university experience, learns how to follow directions, learns how to deal with smart people & foolish people, and discovers that they have a passion for something (be it computer science or otherwise) is a person better prepared to be effective in the working world than otherwise. And if that's university's main benefit, then dammit I guess I have to agree that it matters less where you do it.

Grad school is probably a different story but for undergrad & the kind of jobs you will be getting with an undergrad degree - I think you got it right.

To provide a different perspective, I had the incredible good fortune to attend a top-tier university. In my four undergraduate years, I got to program four of the five computers on campus: an IBM 7090, a Burroughs B5000, a DEC PDP-1 and a DEC PDP-6. After leaving the university, I spent the next 40 years working in the computer industry. I doubt I would have been able to do that had I attended a lesser institution with no approachable computers. Today computers are everywhere, but I suspect there is some other technology present at the top-tier universities that will be very important in the future.

Also, I got to know and work with some of the most intelligent people in the world. That experience is very humbling: I used to think I was pretty smart—I learned I wasn't. That's a valuable life lesson.

about 3 months ago
top

Ask Slashdot: What Are the Strangest Features of Various Programming Languages?

John_Sauter end of line codes (729 comments)

Probably the same way that most popular operating systems store text files as a list of lines separated by newline characters, encoded as 0x0A on UNIX or Windows but 0x0D on Apple II or classic Mac OS. VMS is an exception in that its "non-stream" text files have each line prefixed by its length.

The conventions for line endings are based on history. DEC's operating systems and operating systems descended from them use CRLF because that is what you had to send to an ASR-33 teletype at the end of an output line. UNIX and its descendents use NL, which has the same code as LF, because they were targeted at later printers.

By the way, the VMS record length field was 16 bits, avoiding the limitation of 255 characters in systems which used only 8 bits for the string length.

about 3 months ago
top

Ask Slashdot: What Are the Strangest Features of Various Programming Languages?

John_Sauter Re:Null Terminated Strings (729 comments)

- strings terminated by a binary zero rather than their physical size. Who the hell thought that would be a good idea? Well, age old argument. Basically a matter of taste or sadly a historical "evolution".

I'm pretty sure null-terminated strings come from the days of punch cards/punch tape where an unpunched area is read as null (binary zero). Wherever the data-entry clerk stopped typing was the end of the string and the string could be appended to latter (impossible with a non-zero end-of-string symbol or a string length in the header which can't be rewritten on card/tape).

Actually, an unpunched column on a card was a space. You are right about paper tape.

about 3 months ago
top

How the Outdated TI-84 Plus Still Holds a Monopoly On Classrooms

John_Sauter not your typical slashdotter (359 comments)

...I still have the HP 48G I used in college. Now my son brings it to middle school and uses it to pick up chicks.

If your son is picking up chicks in middle school I deduce (a) he is approximately age 12 to 14, (b) you taught him well, and (c) he is not the typical slashdotter.

about 3 months ago
top

Ask Slashdot: How Dead Is Antivirus, Exactly?

John_Sauter Re:cryptolocker solution (331 comments)

There is a solution for this class of malware, but it isn't anti-virus. Since cryptolocker only damages user data, the operating system should provide a secure and automatic backup of the user's data. Any time a user's file is changed, the new version is recorded on the backup, with its date. From the user's point of view, the backups are read-only, so malware can't damage them, and the user can retrieve an old version of a file at any time.

I hope you are aware that this could go wrong in terrible ways: there are some files that you actually want to have only in encrypted state. If your operating system always keeps a backup of their unencrypted versions, you may be secure against certain kinds of ransomwares, but open to all kinds of other data leakage.

Actually, I'm not. I was imagining that my PC, including its secure backups, is under my control. If I take a portable computer out into the world, I don't take the backups with me; they stay in my secure location. If I modify files while I am away, there might be a way for them to be sent back home, but if there isn't the data is backed up when I return.

What am I missing?

about 3 months ago

Submissions

John_Sauter hasn't submitted any stories.

Journals

John_Sauter has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?