Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!



Google Security Expert Finds, Publicly Discloses Windows Kernel Bug

tringstad Re:But not to give them a chance to correct it fir (404 comments)

The only reason not to do would be if you knew someone was already taking advantage of the vulnerability in the wild.

Or worse, if you didn't know someone was already taking advantage of the vulnerability in the wild.

Not telling the sysadmins of the world that their systems are potentially at risk is a far worse crime than telling the attackers that they assuredly are.

about a year and a half ago

How the Syrian Electronic Army Hacked The Onion

tringstad Re:The trouble with using Google accounts (91 comments)

...a mobile phone capable of receiving SMS messages...

I have yet to see an implementation of 2-factor authentication that uses this method; only poorly written articles by journalists who have misunderstood what they've read, and repetition of said articles by misinformed slashdot commenters.

Can you provide evidence of one that does?

about a year and a half ago

Ask Slashdot: Old Technology Coexisting With New?

tringstad Re:A few items (338 comments)

That's called 10base2 when you run it on coax.

Correct. Good catch. It has been a long time.

I've seen 10baseT run on cat3.

Was it in the 80s?


more than 2 years ago

Ask Slashdot: Old Technology Coexisting With New?

tringstad Re:A few items (338 comments)

Where were you that you were using 10baseT ethernet in the 80s?

Although it technically existed, the standard wasn't published until 1990. I personally didn't have any interaction with it until around 1992.

I have never seen with my own eyes anyone using 10baseT over Cat 3 cabling. I've heard rumors, but never seen it. In my experience, prior to the introduction of Cat 5 most people who were using 10baseT were doing so over coaxial cable.

Cat 5 cabling wasn't introduced until 1991 or 1992, and wasn't widely available for commercial use until sometime in the mid 90s.


more than 2 years ago

Kickstarted Oculus Rift VR Headset Shipping In March/April

tringstad Re:Will it work with glasses? (93 comments)

Impossible? Care to explain why?

Carmack seems to think otherwise:

"While the headset is light and fits well, the player can't wear glasses under the current design. If you move the display further from your head you lose field of view. There are things they can do with sharpness in the software, or they can create adjustable optics that remove the need for glasses, but those are problems that will be solved in the retail version. "Astigmatism I could correct for with a fragment program," Carmack told me without skipping a beat. This is the world we live in; your vision problems can be solved in software."


more than 2 years ago

UPEK Fingerprint Reader Software Puts Windows Passwords At Risk

tringstad Re:Never rely on a single authentication method. (122 comments)

if biometrics are used to back up the assertion of the username ...

Biometrics is intended to replace the username, not "back it up".

... in a supplied username/password combo (in 2-factor authentication) ...

Username/password combinations are NOT 2-factor authentication. 2-factor authentication is more along the line of the OP's first two examples of something you have plus something you know. For instance, my gmail account is secured using Google's 2-factor implementation and my smartphone:


... they feel a little more like authentication than identification to me.

Hopefully this is no longer the case.

more than 2 years ago

LinkedIn Password Hashes Leaked Online

tringstad Re:A New Euphemism! (271 comments)

What are you suggesting it is a euphemism for?

We can't call it stealing while simultaneously taking the stance that copying MP3s (or any other data) isn't stealing because the original data has not been lost to the original owner.

more than 2 years ago

Judge Rules Pi-Based Music Is Non-Copyrightable

tringstad Re:Infinity (183 comments)

I think what you're saying doesn't apply to Pi, because Pi is not random.

My understanding is that it is infinite, and it never repeats. Wouldn't it therefore have to contain every possible pattern?

more than 2 years ago

Internet Use Found To Affect Memory

tringstad Re:A Smart man once said... (207 comments)

You should maybe re-read the quote because it implies exactly what you said.

It does not say, "Don't memorize something that is in a book."

Without building a framework of knowledge to begin with, you would not know how or where to look up what you don't need to memorize.

more than 3 years ago

Open Government Brainstorm Defies Wisdom of Crowds

tringstad Re:marijuana legalization issue was Painful to Wat (709 comments)

If you believe that you can be in a society and not affect other members of your society (especially the young, impressionable ones, and the ones that aren't so happy with their status quo), then you've been sober and plain ignorant way too long.

There, fixed it proper. Argument remains the same.


more than 5 years ago

A History of Rogue

tringstad Re:Modern version (240 comments)

You are the man. Best 99 cents I've ever spent in my life.

I bought it a week or two ago, and not many nights have gone by that I haven't played it at least for a little while sitting at the bar waiting for friends to show up.

I have to admit though, the one thing I don't like about it is the graphics. The lack of ASCII definitely makes the game feel oddly different even though the mechanics are the same.

Now go make me a NetHack port... I'll pay triple for it!


more than 5 years ago

Free IMAP On Gmail

tringstad Re:That's easy to do with labels! (440 comments)

The problem (annoyance really) with this is twofold:

1. Your Labels list on the left hand side of Gmail becomes bigger than necessary. I want to see Clients and Friends on the quickpick list there, but I don't want to see Joe, Mark, and Betty.

2. You cannot "drill down" through your labels as you can with folders, because there is no hierarchy.


P.S. I use my labels as the parent described, and keep my inbox empty of all items unless they require attention. I just wish they had a heirarchy.

more than 7 years ago


tringstad hasn't submitted any stories.


tringstad has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?