Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment Re:Why didn't they fix it? (Score 3, Insightful) 383

You've obviously never worked at a Fortune 500 company. The simplest things take weeks, if not months, to requisition. Then add submitting a labor request to have it installed. Add in a helicopter trip to get the tech and the equipment to the rig and you've got massive delays. Seems like they need expedited procedures for life-critical safety systems. (Sorry that was obvious wasn't it).

Image

St. Louis Museum Offers Thrills, Chills, and Lawsuits 140

theodp writes "Despite the whiff of danger, or perhaps because of it, the WSJ reports that the City Museum is one of St. Louis's most popular attractions. Housed in a 10-story brick building, the City Museum shows none of the restraint or quiet typical of most museums. It boasts a five-story jungle gym with two real-life jets kids can climb on, an enclosed Monster Slide that drops riders the length of three staircases, and a rooftop Ferris wheel. Sure, there are the occasional severed fingers and skull fractures, but museum founder Bob Cassilly contends that it is as safe as it can be without being a bore. 'They [lawyers] are taking the fun out of life,' says Cassilly, adding that 'when you have millions of people do something, something's going to happen no matter what you do.'"

Apple Changes the APSL Rules 177

aitikin writes "Apple recently changed their license for the OS X kernel. According to semthex's post, Apple has reworded the APSL to prevent him and others from open sourcing the kernel hacking under the APSL: 'This file contains Original Code and/or Modifications of Original Code as defined in and that are subject to the Apple Public Source License Version 2.0 (the 'License'). You may not use this file except in compliance with the License. The rights granted to you under the License may not be used to create, or enable the creation or redistribution of, unlawful or unlicensed copies of an Apple operating system, or to circumvent, violate, or enable the circumvention or violation of, any terms of an Apple operating system software license agreement.'"

Best Method For Foiling Email Harvesters? 506

pjp6259 writes "One of the common ways that spammers generate email mailing lists is by harvesting email addressess from websites. But in many cases you also need to make it easy for your customers to reach you. I have found three common solutions to this problem: 1.) Use an image to replace your email address. 2.) Use ascii encodings for some/all of the characters. 3.) Use javascript to concatenate and/or obfuscate your email address. Which of these methods are most effective? Are email harvesters able to interpret javascript? What do you use?"

Slashdot Top Deals

Never call a man a fool. Borrow from him.

Working...