Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Microsoft's Ticking Time Bomb Is Windows XP

LO0G Re:Needless expense (829 comments)

Microsoft DOES charge for extended support for old products. It's called a Custom Support Agreement (CSA). I believe it's expensive, but you CAN get support for really old products.

about 8 months ago
top

Ask Slashdot: Linux Security, In Light of NSA Crypto-Subverting Attacks?

LO0G Re:Ken Thompson, Anyone? (472 comments)

Here's the problem: When did you last perform this analysis? If you didn't do it, when did someone else last do it? How do you know you can trust the person who claims to have last done the analysis?

Ultimately you MUST trust someone. Because all modern systems are far too complex for any one person (or team of persons) to fully understand and analyze. It would NOT be unreasonable to spread a single backdoor across multiple components (especially if the implementation of those components isn't the best documented code). Such a backdoor would be extremely difficult to find even WITH assembly and source code auditing.

1 year,12 days
top

Love and Hate For Java 8

LO0G Re:Finally Fixing the Date stuff (434 comments)

Interesting. I've always used "syntactic sugar" to mean language features that are fundamentally implemented in the front end. For example C++ lambdas are effectively syntactic sugar - it's a clean syntax that wraps an anonymous class declaration (with the lambda capture values being class members and the lambda body being an "operator()" method).

Another example is C++ reference parameters - under the cover most C++ compilers implement reference parameters as pointer to type parameters and the reference parameter access is syntactic sugar for pointer indirection.

These examples are simplifications but they serve to demonstrate my thinking.

about a year ago
top

Microsoft Reacts To Feedback But Did They Get Windows 8.1 Right?

LO0G Re:Start Button in 8.1 is useless. (543 comments)

Or right click in the bottom left corner of the screen and select "command prompt" or "command prompt (admin)" (you can replace command prompt with powershell if you're so inclined). Or "Win+R cmd".

Win+R cmd works fine on XP, Vista, Win7, Win8 and Win8.1, the right click thingy works on 8.0 and 8.1.

about a year ago
top

First Looks At Windows 8.1, Complete With 'Start' Button

LO0G Re:Not good enough (800 comments)

Funny, I've always used CTRL-ALT-DEL -S, uparrow once then enter. Or mouse up instead. It's way easier than the whole charms bar thingy.

about a year ago
top

Billionaires Secretly Fund Vast Climate Denial Network

LO0G Re:Cuts both ways (848 comments)

You just pushed a major hot button. Where's the evidence of massive voting fraud? Please note: I don't mean voter registration fraud - the incentives that enable voter registration drives provide a significant incentive for voter registration fraud (cf: Acorn and the recent GOP sponsored voter fraud in the 2012 election).

However in a presidential election year, there are vanishingly small numbers of in-person voter fraud. In several elections where fraud was claimed (Washington's governors race in 2004, Minnesota's senatorial race in 2008), very few actual cases of fraud were uncovered.

In the US, there is almost no evidence of in-person voter fraud. If there were, I could see a need for voter ID laws. But there isn't. So what is the point of voter ID laws? Why would politicians be sponsoring legislation to address a non-existent problem?

One theory about why voter ID laws are proposed is that voter ID laws provide a barrier to people who don't have a government sponsored ID (since you need to have a government ID to vote and getting the ID can be difficult). It turns out that the set of people without government sponsored ID tend to live in urban areas (where the need for a drivers license is ameliorated by mass transit). And guess what: Urban voters tend to vote Democratic.

about a year and a half ago
top

Opera Picks Up Webkit Engine

LO0G Re:Monoculture (314 comments)

How exactly does this work? If we had a monoculture (like we had with IE6), people code to the monoculture, standards be damned. If WebKit implements a standard badly, no amount of complaining by Microsoft and Mozilla will cause the WebKit folks to change their browser rendering to be compliant. And just like what happened with IE6, web developers will ignore the standard in favor of the WebKit implementation. We're ALREADY seeing this happen - webkit has sufficient market share that sites don't bother building standards compliant version of their mobile site, they just write for webkit and consider their work done.

History has shown that if you have a monoculture, standards are irrelevant - the only thing that matters is the one implementation.

about a year and a half ago
top

Everything You Know About Password-Stealing Is Wrong

LO0G Re:Banking passwords are overrated (195 comments)

According to the article, at least in the US you're required to show up at a bank in-person to create the account, which means they have a picture of you from the security cameras creating the account. Oh and you need a bunch of forms of ID to create the account.

One of the key pieces of evidence they use is that banking passwords go for pennies - if it was as easy to get the money as you say it is, the account passwords would be worth more money.

about a year and a half ago
top

Everything You Know About Password-Stealing Is Wrong

LO0G Re:Banking passwords are overrated (195 comments)

How do you do that transfer without leaving an audit trail? That's the whole point of the article - the transfer is only interesting if they can somehow break the audit trail between your bank account and their bank account.

The common method for this is to use a money mule - the money mule wires the money from your bank account to the mule's bank account. The mule then sends a money wire to the bad guy keeping 10% for themselves.
Fast forward a couple of days when you find the theft. You report it to the bank, they trace the transfer to the mule's account and remove the money from the mules account. Now the bank's reimbursed you for your money (which the federal government requires them to do), , the mule's out the money they stole and the bad guy's got the money. Effectively the bad guy has stolen from the mule, not from you.

about a year and a half ago
top

Varnish Author Suggests SPDY Should Be Viewed As a Prototype

LO0G Re:While I hate the transfer syntaxes we have (136 comments)

Yeah, maybe something like ASN.1.

Oh wait....[1]

[1] If you don't get this, you've never actually dealt with ASN.1.

more than 2 years ago
top

ADA May Force Netflix To Provide Closed Captioning On Content

LO0G Re:Is that serious, or a straw man? (694 comments)

First off: IANAL. Having said that, my $.02:

Was everything sold in the pet store made within the state? Is the credit card processor for the store and all its operations in-state? Both of these seem highly unlikely. The locally owned pet store is still engaging in interstate commerce even though its not obvious.So the commerce clause probably applies to the local pet store. But that's irrelevant because the 14th amendment is primary for the ADA.

And the 14th amendment has two pieces that are relevant to the ADA: The first says that people need to be protected equally.(the "equal protection clause" in section 1). The second says that congress has the right to enforce this law (section 5). The ADA says that handicapped people deserve equal protection under the law in all the states and Section 5 gives Congress the right to pass laws that affect in-state public entities.

Note the last part - as I understand it, the ADA only applies to public accomidations. So if you have a members-only club which is not open to the public, you don't have to comply with the ADA - this is the same legal basis that allowed the Augusta golf club to prevent african american members until 1990 and continues to allow them to ban women. As a members-only club, they don't have to comply with the 14th amendment.

more than 2 years ago
top

ADA May Force Netflix To Provide Closed Captioning On Content

LO0G Re:Is that serious, or a straw man? (694 comments)

Here's a hint:

(4) to invoke the sweep of congressional authority, including the power to enforce the fourteenth amendment and to regulate commerce, in order to address the major areas of discrimination faced day-to-day by people with disabilities.

The law cites the 14th amendment (equal protection) and the commerce clause.

more than 2 years ago
top

Aero Glass UI No More On Windows 8

LO0G Re: Obligatory (426 comments)

Push the power button, it shuts down quite nicely. Or close your laptop's lid.

If you want, you can use Control-Alt-Delete, Alt-S then up and down to pick which of the 3 menu items pops up on the power button.

If you'd rather use the command line, the "shutdown" command still works just fine.

Almost the mechanisms to shut down windows over the past decade or so are still there. The only thing that's missing is the "shutdown" button on the start menu. The one that spawned all those "You have to use Start to shut down windows" jokes?

more than 2 years ago
top

Lenovo Ordered To Refund 'Microsoft Tax'

LO0G Re:I wonder .. (475 comments)

A variation of your car analogy: I buy a car, but I decide that I don't like the tires that come with the car. Can I get a refund of the cost of those tires if I choose to use different ones?

more than 2 years ago
top

Google Caught Misbehaving By Kenyan Startup

LO0G Re:Do no evil indeed (383 comments)

Check the dreamwidth.org post I cited - mjg calls out (in the comments) that there IS a challenge that the OEM needs to include the distro's cert in the box, but that doesn't mean that Linux is locked out - the Linux distro just needs to work with the OEM to ensure that the cert for the distro is included in one of the set of certs that is included in the box:

"Re: Is there any way for the end-user to load their own keys?
Date: 2011-09-24 02:10 am (UTC)
From: mjg59
Not inherently. It's actually reasonably hard to do - inserting new keys requires that those keys themselves be signed by the private half of one of the keys in the KEK database, so you'd need to give your key to someone who *does* have an entry there (either the OEM or Microsoft), have them sign it and then pass that into the variable database"

I'm not saying that there aren't challenges, but it's NOT impossible. "Requires that the Linux distribution owner work with the OEM" is far from "locked out".

more than 2 years ago
top

Google Caught Misbehaving By Kenyan Startup

LO0G Re:Do no evil indeed (383 comments)

Where did they say that? What I read in all the excerpts was that the competing OS needed to built according to the rules that Intel defined when they defined UEFI secure boot.

That's not "impossible" - According to this, it should be possible. And this says it should take about a week's worth of work for any distro to support it.

That's FAR from "impossible".

more than 2 years ago
top

Google Caught Misbehaving By Kenyan Startup

LO0G Re:Do no evil indeed (383 comments)

I'll bite Mr. AC (I shouldn't, but I will): References to Microsoft "[pulling] this crap everyday and everywhere"? Preferably something within the past 1-2 years?

If you're going to make a strong claim like that, you had better be able to back it up.

more than 2 years ago
top

The Condescending UI

LO0G Re:Users disagree with him (980 comments)

To add a worksheet in Excel 2007, I go to the bottom of the document (where the worksheet tabs are listed). The one on the far right has a tooltip which says "Insert Worksheet (Shift+F11)". That seems much more efficient than the "home/cells/format" thingy you described.

more than 2 years ago
top

Windows 8 To Reduce Memory Footprint

LO0G Re:Sounds good - but so did Cairo (306 comments)

We're not talking about Exchange here, we're talking about *Windows*. Steven Sinofsky, the head of Windows is notorious about not saying anything about features before they're fully baked.

more than 2 years ago

Submissions

LO0G hasn't submitted any stories.

Journals

LO0G has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>