×

Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

Comments

top

Your days are numbered, so long PIN

stoborrobots Usernames, not passwords (1 comments)

When will people learn?

Biometrics replace usernames, not passwords/PINs...

2 days ago
top

Uber Capping Prices During Snowmageddon 2015

stoborrobots Re:So what will this accomplish? (152 comments)

... but anybody with a need to drive could pay the $20/gallon to drive...

That's quite a big assumption that everyone who supports the emergency surge pricing idea is making - that those who need the service will be able to afford the hugely-inflated price.

2 days ago
top

Jim Blasko Explains 'Unbreakable Coin' (Video 2 of 2)

stoborrobots Re:ok. i'll play. "my experience is... (39 comments)

At the very least, large companies need to anticipate short-term stability, which is I think what the quote was getting at.

A small company, for which a day's takings in Bitcoin is only a fraction of the day's Bitcoin-to-local exchange volume can easily cash out immediately, and so has no need to have an expectation of long-term or short-term stability.

A large company typically cannot convert a large amount of Bitcoins to local currency instantaneously without destabilising the exchange rate, so they need to have an expectation of short-term (e.g. month-long) stability in order to manage the transaction volume against the local exchange markets.

Making (largish) loans in a currency implies expectation of decade-long stability.

about a week ago
top

Oracle Releases Massive Security Update

stoborrobots Re:Which "those" are "these"? (79 comments)

Also, for a tech site, this lack of comprehension is offensive:

may be remotely exploitable without authentication and can possibly be exploited over a network without the need for a username and password

The two halves of this sentence say exactly the same thing, but present it as two statements.

about a week ago
top

NSA Official: Supporting Backdoored Random Number Generator Was "Regrettable"

stoborrobots Re:No admission of guilt (106 comments)

He never admits that the NSA actually engineered the backdoor into the algorithm, he only states that he regrets supporting the algorithm after other people pointed out it was backdoored.

It's entirely possible that they did not engineer the backdoor - that might have come from the original creator.

It's further possible (although I would hope it's not the case) that they did not find the backdoor before it was publicly disclosed.

Either way, they should have stopped endorsing the algorithm as soon as they knew it was weak, whether that was at public disclosure or earlier.

That they continued to claim it was secure after it was publicly known to be weak is a complete failure on their part, and they are DEFINITELY culpable for that.

We BELIEVE that they probably put it there, in which case, they're even more culpable, but we don't know that for certain...

about two weeks ago
top

Professor: Young People Are "Lost Generation" Who Can No Longer Fix Gadgets

stoborrobots Re:Its a cost decision (840 comments)

On the one hand, I agree - I know lots of people our age who don't know how to change their oil or oil filter.

On the other hand, I know many people of all ages (from 16 through 70) who don't know how to do that.

At a guess, I'd average it at about 10% in any age group who could. I'm one of the few my age; my dad is one of the few his age. Only two of my uncles or aunts could; only a couple of my cousins. A few of my friends can, but that's only because I hung out with a bunch of motorheads when I was younger...

about three weeks ago
top

US CTO Tries To Wean the White House Off Floppy Disks

stoborrobots Re:From the summary (252 comments)

How about a USB sd card reader? Most of my SD cards have working write protect switches...

about three weeks ago
top

Netflix Begins Blocking Users Who Bypass Region Locks

stoborrobots Re:What's the motive (121 comments)

It's Foxtel and Yahoo!7/Ninemsn/Ten, (and the other similar players) who are the instigators here.

  • Foxtel buys the right to show Breaking Bad and Orange Is The New Black on Australian pay TV.
  • Some Australian consumers choose to watch those shows on Netflix.
  • Foxtel loses the ability to attract those consumers, so they complain to the studios that they are losing customers that they bought (the Aussie pay TV market) because of another customer of the studios (Netflix), and threaten not to buy any new shows from the studio.
  • Since the agreement between the studios and Netflix stipulated that they would only show those programs in certain regions (not including Australia), the studios complain to Netflix that they are costing the studios money, and threaten not to sell any new shows to Netflix.
  • Netflix is forced to take action against subscribers suspected of being Australian.

And there's something really terrible about that sequence of events, but I don't know how to make it any better...

about three weeks ago
top

Writer: How My Mom Got Hacked

stoborrobots Re:What's the new hole? (463 comments)

I agree with most everything you said but:

Oh and of course I use a standard user account. I have that and an admin account which is occasionally annoying with UAC but this helps and puts in another layer of security as now the payload will need to bypass this.

This one is a furphy. The ransomware runs as a low-privilege process, and encrypts your data files - which are exactly the ones your standard user account has access to overwrite. Yes, your system is protected from overwriting critical system files, but this won't stop the ransomware.

about three weeks ago
top

NetworkManager 1.0 Released After Ten Years Development

stoborrobots Re: Should be interesting (164 comments)

Thanks for the tip! I figured it probably could, but the debian build of NM has PolKit as a hard dep, unfortunately. Haven't got around to looking at what it would take to build from source.

In the short term, WiCD is doing 95% of what I need, so I will stick with it.

I hope to be able to contribute something useful, so will either eventually contribute a polkit-averse NM build for debian, or add MBIM support for WiCD.

about 1 month ago
top

NetworkManager 1.0 Released After Ten Years Development

stoborrobots Re:Should be interesting (164 comments)

(And I'm working on making the usb modem use cases work more smoothly...)

about a month ago
top

NetworkManager 1.0 Released After Ten Years Development

stoborrobots Re:Should be interesting (164 comments)

Ran Debian with NM and KDE for the last couple of years as well. Purged it recently in order to remove systemd (NM depends on PolKit which depends on pam-systemd for login session management), and replaced it with WICD.

WiCD is not quite as smooth as NM for usb modems, but for wifi and wired ethernet, it does the job.

about a month ago
top

Over 9,000 PCs In Australia Infected By TorrentLocker Ransomware

stoborrobots Re:Sandbox before browsing (83 comments)

Full sandboxing is the only way to do so.

How do you attach documents to an email in a full-sandboxed world?

How do I receive a document by email, update it with my comments, and pass it along to the next reviewer?

about a month and a half ago
top

The Case For Flipping Your Monitor From Landscape to Portrait

stoborrobots Re:Read one, write other (567 comments)

... sheer sales numbers tell the whole story. Desktop PC sales are pathetically low these days...

Actually, they only tell half the story. Approximately 0% of the regular PC users I know have acquired a new PC in the last 5 years - they bought a Core2Duo or i5 back in 2008 and it still does 100% of their home-based internet-using requirements. Yes, they sometimes use tablets or phones in addition, but that hasn't replaced their use of their PCs, just added to it...

Corporates, as you indicated, buy new PCs regularly, but home use (other than gaming) hasn't needed a new PC for many moons...

about a month and a half ago
top

Bellard Creates New Image Format To Replace JPEG

stoborrobots Re:Compare to... (377 comments)

While my inclination is towards BPG, the argument could be made that it would be superior to implement a javascript decoder for those other file formats, if they provided better quality at lower file sizes...

about a month and a half ago
top

Google Releases Android Studio 1.0, the First Stable Version of Its IDE

stoborrobots Re:Can this be... (115 comments)

IDEA, which this is based on, is a long-standing J2SE/J2EE IDE which has had a decent reputation. Whether the Android-customised version is still able to facilitate J2SE/J2EE development will remain to be seen, but I can't imagine why that would be difficult...

about 1 month ago

Submissions

top

GAO finds inadequate planning and oversight caused HealthCare.gov cost blowout

stoborrobots stoborrobots writes  |  about 5 months ago

stoborrobots (577882) writes "The Government Accountability Office has investigated the cost blowouts associated with how the Centers for Medicare & Medicaid Services (CMS) handled the Healthcare.gov project. It has released a 60-page report entitled Healthcare.gov: Ineffective Planning and Oversight Practices Underscore the Need for Improved Contract Management, with a 5 page summary. The key takeaway messages are:
  • CMS undertook the development of Healthcare.gov and its related systems without effective planning or oversight practices...
  • [The task] was a complex effort with compressed time frames. To be expedient, CMS issued task orders ... when key technical requirements were unknown...
  • CMS identified major performance issues ... but took only limited steps to hold the contractor accountable.
  • CMS awarded a new contract to another firm [and the new contract's cost has doubled] due to changes such as new requirements and other enhancements...

Larry Seltzer has more over at ZDNet."
Link to Original Source

top

Sea-Tac Airport runway access, no questions asked!

stoborrobots stoborrobots writes  |  more than 6 years ago

stoborrobots (577882) writes "The Seattle Times is reporting an incident where two civilians got unescorted access to the runway at Sea-Tac Airport in a van with names unasked, ID unchecked, and vehicle unsearched.

When [retired Army lieutenant colonel Greg Alderete] realized he had driven a van onto a runway tarmac at Sea-Tac airport — and that no one had asked his name, checked his ID or searched his vehicle — well, he just about lost it."I was appalled," Alderete says. "If you go in the airport's front door, they take away your tube of toothpaste. But the back door? That's the weakest security of any critical facility I've ever seen."
"

Link to Original Source

Journals

stoborrobots has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?