Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Your Online TV Watching Can Now Be Tracked Across Devices

nabsltd Re:Sounding another death knell for cable companie (118 comments)

if you're not watching the ads, it means jack squat to the producers.

The producers of the show only care tiny bit about advertising, as they get their pay up front (a TV channel/network pays them to produce the content) and from various forms of direct sales (DVD, Hulu, Amazon, etc.). Because much of the value of a show has moved from the first-run airing, networks now partner with producers to produce the show, so that the network also gets a cut of the direct sales.

So, producers care a little bit about ratings and advertising, because if nobody is watching their show, they won't get any more money to make it, but as long as enough people watch in some form that puts money in the producer's pocket, the show will still get made.

yesterday
top

Debian's Systemd Adoption Inspires Threat of Fork

nabsltd Re:its not a claim, its a fact of life. (528 comments)

Sure you can. systemd-ask-password is not even linking systemd.

Which isn't important when all communications between the two is via IPC.

yesterday
top

Debian's Systemd Adoption Inspires Threat of Fork

nabsltd Re:its not a claim, its a fact of life. (528 comments)

I assume you were exaggerating, but just to be clear: it is not necessary to run all of the programs which make up the systemd "brand". With the exception of a few core dependencies like journald, you are free to pick the components you wish to run.

So, you've tried this? Either by compiling one of the "extras" and running it on a system where systemd isn't installed, or by completely removing the extras and running alternatives that give the same functionality?

Didn't think so.

yesterday
top

Debian's Systemd Adoption Inspires Threat of Fork

nabsltd Re:UNIX Philosophy (528 comments)

in fact, since systemd can log from before root-filesystem is even mounted, you get better logging.

The current init system has always done this, buffering up log entries until the logfiles are available. How else do you think dmesg has entries from milliseconds after the kernel starts?

yesterday
top

Debian's Systemd Adoption Inspires Threat of Fork

nabsltd Re:its not a claim, its a fact of life. (528 comments)

The developers of systemd have all of those separate apps and daemons in one code repository, but you can pull each of them out and compile each of them separatly.

But you can't run them separately.

yesterday
top

Debian's Systemd Adoption Inspires Threat of Fork

nabsltd Re:its not a claim, its a fact of life. (528 comments)

One might as well complain about all the basic utilities under the GNU project umbrella.

I can use ls without having to use info, but I can't use systemd-networkd without using systemd. Conversely, there is no logging system other than systemd-journald that works with systemd.

In other words, each individual program that makes up the "systemd brand" must all be installed and running or else none of them work. This is completely different from the current init system, which doesn't care which system logger (for example) you use, and doesn't even require you to use one at all.

So, even though the "systemd brand" is many separate applications, the net result is no different from one monolithic application with many shared libraries.

yesterday
top

Debian's Systemd Adoption Inspires Threat of Fork

nabsltd Re:That's all we need ... (528 comments)

If I didn't know otherwise, I'd say you were tinkering with my Fedora system.

I decided switching to a different distribution would be easier than getting systemd to do what I want.

yesterday
top

Debian's Systemd Adoption Inspires Threat of Fork

nabsltd Re:Honestly, I prefer the one on the left (528 comments)

(2) Most importantly, I can hack that bash script to do whatever I damn well please.

And, although you can hack the "sendmail.service" file shown in that link, your hack will be overwritten the next time sendmail is updated, since the file is in /usr/lib/systemd/system. Also, /usr could be a read-only filesystem.

Instead, to make your hack effective, you'll need to create a file somewhere under /etc/systemd (your guess is as good as mine...the documentation sucks) that will do what you want. Since there is also no documentation about what, exactly, must be in the file (do you need every entry that was in the original, or can you just override what you want to change?), you'll have to play around for a while to see what works.

The right thing to do is for the sendmail package maintainer to place an example user file in the right place, and comment out everything so it doesn't actually overwrite the default, but the comments will let a sysadmin know what to change if they need to. But this is yet another major problem with systemd...it has so damn many config files, that if every package maintainer did this, you'd have hundreds of files in the override directory, even though you only need a few for the changes you want to make.

So, the really right thing to do is to not keep config files of any sort in /usr/lib, but instead put them only in /etc, and then any changes the user makes there are applied as the should be. This is not the systemd way, though, as the systemd maintainers know much better how your system should be run than you do.

yesterday
top

The Largest Ship In the World Is Being Built In Korea

nabsltd Re:Ho-lee-crap (266 comments)

Considering this ship is designed to hold however many thousand cargo containers and the crew to support it, it needs a lot of empty space inside.

According to TFA, the crew while at sea is 15 people, which is nothing compared to the 5,000 or so on a fully-populated-for-war aircraft carrier.

When you add in the fact that a warship is supposed to be able to go for at least weeks at a time without any replenishment, needs a much stronger hull for its size, has a lot more electronics that need special cabling and conduits, etc., commercial vessels are actually quite easy to build in comparison.

2 days ago
top

Making Best Use of Data Center Space: Density Vs. Isolation

nabsltd Re:Blade servers blow (56 comments)

The mongolian clusterfuck is the result of the byzantine cofiguration rules each vendor has for determining a blade's NIC or FC mapping with the blade center's (overpriced) internal switch bays.

Cisco's blades do all of this through software...you can add and delete NICs and fiber channel cards with a couple of mouse clicks on the Java applet that runs in the browser.

4 days ago
top

Torvalds: I Made Community-Building Mistakes With Linux

nabsltd Re:Has it been working so far? (387 comments)

your cars, in your televisions, in your game systems, in your embedded devices...

Now your fanboyism is showing. None of those are significantly Linux-driven, which is mostly because of the GPL.

What are you talking about? Many of those devices do use the Linux kernel, which is all "Linux" really is. The userspace many people think of as "Linux" is really a collection of other software, much of it GNU.

For example, I have two media players, an eBook reader, a TV, a surveillance camera, and an A/V receiver that all use the Linux kernel. On the first three, I can get a shell prompt, and can cross-compile apps to run on them. None of the devices I'm talking about run Android, either.

5 days ago
top

HBO To Offer Online Streaming Without TV Subscription

nabsltd Re:No sh1t sherlock. Unbundle the crap! (139 comments)

I've read the agreements. The cable guy lied to you. They can't unbundle what they pay, but they can unbundle what you pay.

Apparently, you haven't read the agreements in detail. Not only does the cable company have to pay the content provider for the full package, the agreement also says that the cable company has to provide all those channels on some particular tier (like "basic", "expanded basic", etc.) so that the content provider gets to say "available in X% of homes" to keep advertising dollars higher.

So, yes, the cable company could unbundle the channels and only charge you for the channels you want, but you'd still get all the other channels from that content provider based on your "tier". The only way to avoid this would be to have a completely "a la carte" tier. If that happened, though, the content providers would have lower advertising dollars, and would thus have to charge more for their content, which would mean that a la carte would end up at similar prices to what you pay now, unless you truly do just watch one or two channels.

about a week ago
top

Lockheed Claims Breakthrough On Fusion Energy Project

nabsltd Re:On one hand... (564 comments)

On the gripping hand, did anyone else read...

FTFY. Oh, and turn in your geek card.

about a week ago
top

Lockheed Claims Breakthrough On Fusion Energy Project

nabsltd Re:wow (564 comments)

Yeah, you say that now, but when we get more power, you can all but guarantee we'll use more power.

There's a limit to that before the Earth becomes Venus or Mercury.

Basically, the vast majority of the power on Earth right now came from the sun at some point in time. The exception is nuclear reactions (either in power plants or in the rocks in the ground). Right now, these exceptions are a very small part of the total, but cheap fusion would change that dramatically.

Eventually, all the power turns to heat, and too much of it is a very bad thing. Perhaps reducing CO2 (no <sub> tag support...really Slashdot?) emissions by cutting back dramatically on fossil fuel usage would help balance out and allow radiation of heat to space to be more efficient, but it's hard to say when everything is still speculation.

about a week ago
top

Password Security: Why the Horse Battery Staple Is Not Correct

nabsltd Re:Oh great (546 comments)

If you use a commonly used phrase, its the same as using a commonly used password.

As I said, if you "pick the words for your pass phrase from a small, well-known dictionary", you're going to be in trouble. A "commonly used phrase" would be the extreme version of using a limited pool of words.

Though, if it is enough words, and you use some kind of mutator (vary spacing, capitalization & punctuation, use l33t, etc.), even knowing the exact phrase would take a few thousand guesses to find which mutators were used in which position.

about a week ago
top

Password Security: Why the Horse Battery Staple Is Not Correct

nabsltd Re:Oh great (546 comments)

Commonly used passwords are vulnerable to dictionary attacks, that doesn't change when you use passphrases.

Yes, it does, unless you do all the following:

  • Pick the words for your pass phrase from a small, well-known dictionary.
  • Follow the spacing expected by the attacker.
  • Use only the case the attacker expects (all upper, all lower, proper caps, etc).
  • Use only letters and spaces...no punctuation or special characters.
  • Don't do any substitution of characters (no l33t, etc.)
  • Spell every word correctly.

It's easy to create a phrase that is personal to you and won't appear in any Google search. But, even if it does, if you don't just use lowercase letters with the words run together, it will take a long time for the attacker to run through all the permutation tricks on a 40+ character phrase.

And here's a really good one...the part of your post that I quoted would make an excellent pass phrase, since it contains one word that isn't in the *nix words list. Something as simple as making a compound out of "pass phrase" is enough to cause an attacker pain if they use the wrong dictionary. And, when attackers start including every single "word" in their dictionary, it gets even closer to brute force. When you use "Tatooine" and "Mordor" in your pass phrase that doesn't in any other way reference "Star Wars" or LoTR, it's pretty secure: Tucson is hot, but it's no Mordor or Tatooine. Easy to remember, easy to type, but painful to crack.

about a week ago
top

Password Security: Why the Horse Battery Staple Is Not Correct

nabsltd Re: symbols, caps, numbers (546 comments)

It's also a potential DOS for the server if a bunch of people start submitting preposterously long "passwords" anywhere they have a password box.

Nobody's asking for sites to allow you to use your favorite novel as a password, but limiting to some insanely short value is not the right way to solve the problem.

Set a limit of 255 characters for the password, and you won't get any complaints about too short a limit while keeping the computing requirements for the hash creation reasonable.

about a week ago
top

The CDC Is Carefully Controlling How Scared You Are About Ebola

nabsltd Re:One quote *is* the story (478 comments)

this strain of ebola appears to have a 70% mortality rate.

Mortality rates for hemorrhagic fevers are often inversely proportional to the level of medical care available.

Keeping a patient cool and hydrated reduces mortality rate dramatically. Having antibiotics on hand to battle secondary infections is also a big plus. Even a supply of more powerful fever-reducing drugs than aspirin would be considered a luxury in many of the places where Ebola has a high mortality rate.

about two weeks ago
top

The CDC Is Carefully Controlling How Scared You Are About Ebola

nabsltd Re:Ebola threat (478 comments)

Uhh, she was in the process of undressing...

Then, correct procedures weren't followed.

For any truly infectious disease, proper procedure would have health care workers walk into a disinfectant shower (and possibly UV light) before removing protective clothes. Any disease that can survive that sort of thing is going to kill us all anyway.

Then, order of removal is important. In general, headgear is removed first (preferably by another person), then outer gloves, then fasteners released and gear removed, then inner gloves. All this is followed by hand washing (at a minimum). This makes sure that easier paths to infection get as little possible contact from anything that might have had contact with the pathogen.

The nurse screwed up by touching her face with her outer glove, and I suspect that disinfectant showers/UV were not done first.

about two weeks ago
top

BitHammer, the BitTorrent Banhammer

nabsltd Re:It's okay when I do it... (429 comments)

Don't get me wrong, I think BitTorrent is very cool technological achievement. But transferring data between semi-random hosts around the globe and opening hundreds of TCP connections per computer while doing it, is like the ultimate way to clog the pipes.

BitTorrent uses UDP when done correctly, and pretty much becomes the absolute best way to get data to many computers very quickly.

A torrent with few seeders isn't very efficient, but one with many hundreds of well-configured peers is hard to beat on overall transfer speed.

about two weeks ago

Submissions

Journals

nabsltd has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?