Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re: Still bitter about Picasa (Score 1) 17

I have not yet found the proper app on Android to pick photos among my very large collections that wouldn't fit on any phone built in storage currently in existence.

I recently stumbled over https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fente.io%2F . It can even be self-hosted, because it's open source. It looks promising, though I haven't had time to try the self-hosting yet.

Comment Re: Don't care (Score 1) 116

Of course not.
The ancient and still trusted solution is to:
- Create a new user account for that, give the password to that account to the user in question.
- Create a shell script that performs the actions without introducing security issues.
- Put that script as the login shell for that user.
Q.E.D.

Sudo is for whimps.
Trying to rewrite it to be memory safe is like mandating safety goggles for chainsaw operators.
Will it make it safer to use it? Sure, slightly.
Was it safe to begin with? Not really, handling chainsaws is hazardous to begin with.

Comment Re:Don't upgrade. (Score 1) 202

/etc/apt/preferences is your friend. Using a carefully weighted preferences file, I manage to keep dozens of Debian desktops smoothly upgraded and updated for the past 15 years. Never had to reinstall. For all packages you can mix-and-match which ones you pick from oldstable, stable, testing or unstable. The system will graciously adapt and allow all versions and dependencies to peacefully coexist.
My /etc/apt/preferences is attached:

Package: *
Pin: release a=stable
Pin-Priority: 700

Package: *
Pin: release a=testing
Pin-Priority: 650

Package: *
Pin: release a=unstable
Pin-Priority: 600

Comment "Limited amount of data leaked" (Score 4, Interesting) 21

I always find it highly ironic that organisations always seem to claim that the amount of data copied/leaked is limited to ... (fill in any random limited scope).
The problem with data is that when it is copied, it does not easily leave a trail like with a normal house burglary where you can simply count the number of items missing from your known inventory.

So basically, unless you have an independent firewall that logs ALL outgoing traffic in unencrypted form, it is impossible to say anything definitive about the (limited) extent of some data breach.

Comment Re:Forks (Score 2) 50

Forks are (IMHO) one of the biggest weaknesses of Git[hub|lab|other].

It's like complaining that the biggest problem with books is that you can read them and/or (god forbid) copy them.

Since the dawn of times, the single thing that protects against this "biggest weakness" is the ability to inspect the copy/fork, and then, by using your brain, decide if the copy/fork is any good (inspect the commits).

In general, the best solution to show authority, is to selfhost the git repository on your own domain/url/server, and not use something like Github.

Comment Re:What a farce (Score 1) 135

I can't even fathom why the makers wouldn't offer a full 104 key layout as an option.
  Cost cutting doesn't fit, you can always continue to offer the cheap incomplete keyboards, while offering the full 104 at a higher price.

One problem is the mold for the case. It costs something like $2000 to make one. If you have only 10 people wanting that layout, it's $200 extra cost for that keyboard. Another problem was that the person producing these keyboards (yes, it's a one-man show) had to pick what to offer at least four years prior to having anything concrete. So if you embark on this mission without prior experience in manufacturing (abroad), you want to keep the offerings simpler at first. He started it around 2016, it wasn't until May 2020 that he got the quality of all parts to match or exceed IBM's original quality. He now has the experience to make more concrete offerings and possibly more variations because he knows what can be (easily) manufactured.

Part of me even wonders whether a hybrid keyboard wouldn't be popular, with a different/cheaper technology used for the keys that aren't used in touch typing.

One of the problems here is reliability. These keyboards are built to last 40 years. Using cheaper technology for some keys will render those keys inoperable earlier than after those 40 years.

Slashdot Top Deals

1 Mole = 007 Secret Agents

Working...