An Anonymous US Law Enforcement Officer Claims US Wouldn't Arrest Julian Assange
I'm sure that's what the left-wing conspiracy theorists believe, but in reality he shot himself with an AK-47, and there was no need to reload : http://en.wikipedia.org/wiki/Death_of_Salvador_Allende
The STEM Crisis Is a Myth
You do not have a shortage of good applicants, such a shortage is impossible in a market system like we have. What you have is too low a price point.
I wish that were true .. but there really is a shortage of candidates that know jack shit about coding. I work at a large US tech company as a team lead, so I can see the kinds of salaries that we are paying at various levels. And I do a large number of interviews so I get to see the quality of candidates that apply, and make it past the first couple of levels of filters. New grads are already getting six-figure offers, but we still have trouble finding acceptable candidates.
Open Source Mapping Software Shows Every Traffic Death On Earth
This chart is nearly useless, as it doesn't account for the average distance traveled per country. You'd be better off reading the wikipedia page that has those stats : http://en.wikipedia.org/wiki/List_of_countries_by_traffic-related_death_rate
Or looking at trend in deaths / mile over time. For example, the US rate of 1.1 per 100M miles in 2011 is an all-time low : http://en.wikipedia.org/wiki/List_of_motor_vehicle_deaths_in_U.S._by_year
Falun Gong Sues Cisco
Couldn't a similar suit be brought against the developers iptables or squid if those applications are used by an oppressive government? Just answering a question from a user with .cn email address could be turned into "assisting the censorship of dissidents" by an enterprising lawyer..
10,000 Commits To an Open-source Project
I'm up to 15644 commits in total on the Webmin / Virtualmin projects..
Take This GUI and Shove It
The trouble with Linux, and I'm speaking as someone who's used YaST in precisely this context, is that you have to make a choice - do you let the GUI manage it or do you CLI it?
Or you can use a GUI tool that can parse manually created config files and not break settings in them that it doesn't understand, such as Webmin. YaST has its own separate configuration database that it generates the Apache config files from, so any manual changes you make will either be ignored or over-written.
GoDaddy Wants Your Root Password
On a VPS, it really doesn't matter if the hosting company has your root password or not - they can directly access the filesystem to view or modify any files any time they want.
For some virtualization types (like Xen and KVM) it is more convenient for the host to know the root password so they can login to manage the VPS. Without it, filesystem access requires that the VPS be shut down, with is worse for everyone.
For other types like OpenVZ, the host can login as root any time they want, without even knowing the password.
In the case of GoDaddy, they would probably be better off setting up VPSs they sell with an additional root-equivalent account or using SSH keys - that way the customer can keep their root password secret.
Paul Vixie On What DNS Is Not
While I totally agree that overriding NXDOMAIN responses is evil, returning different DNS responses based on the clients location or for load balancing purposes is an extremely useful technique for last companies serving a large amount of web traffic. For example, check out what www.google.com resolves to from different countries or even at different times - depending on where you look it up from and what network links are up, you will get a different set of IPs.
Sure, determining a browser's location from the DNS client source IP is not totally reliable .. but it is accurate enough to significantly improve user-visible responsiveness by avoiding un-necessary cross-planet network traffic. And even if google gets it wrong, they are no worse off than if they never implemented this in the first place.
Bill Ready To Ban ISP Caps In the US
Wrong wrong wrong!
Do you think Comcast has a connection they own all the way to every website you visit? Of course not .. which means that they have to pay higher-tier internet providers for links of various speeds. If Comcast's customers then generate too much traffic for those links, they have to pay more for greater capacity.
And even at the tier-1 ISP level, fibre in the ground or under the ocean only has limited capacity. When that gets used up, they have to lay more fibre .. why else do you think ISPs and telcos have been building new undersea and cross-country cables?
A Cyber-Attack On an American City
Since I live in the area where this happened and it was reported extensively on the local news, I noticed *many* errors in TFA, such as :
- Morgan Hill was not specifically targeted .. the cuts were in San Jose and Santa Clara. At most, Morgan Hill was collateral damage.
- Cables were cut in four different locations, so there was no single point of failure.
- Hosting everything at your site might help in cases like this, but is your mail really more reliable if managed by a part-time sysadmin on a single $1000 box, or at Google where they have triple-redundant everything?
NIST Announces Round 1 Candidates For SHA-3 Competition
your credit cards you carry around? the PIN number isn't stored on the card - but an MD5 hash of the PIN number *is* stored on the card (making replay attacks possible, believe it or not).
I sure as hell hope not! If that was the case, anyone with a card reader could brute-force your PIN in under a second by taking the MD5 hash of all 4 digit numbers, and comparing them to be hash that is supposedly on the card.
(Useful) Stupid Unix Tricks?
You'd be surprised how often I have seen experienced programmers manually type out long commands or directory paths, instead of using tab completion. Sometimes I have to restrain myself from ripping the keyboard from their hands and using tab to enter the path myself in a 10th of the time.
jcam2 hasn't submitted any stories.
jcam2 has no journal entries.