Slashdot stories can be listened to in audio form via an RSS feed, as read by our own robotic overlord.
My question is: What are Slashdot readers' preferred tools for analyzing .NET and Java compiled libraries (not source code) for potential security vulnerabilities? Ideally, I would like to know if a library is a security liability before I code against it. For example, Microsoft used to have something called FxCop, but it hasn't been updated for current versions of the .NET framework."
But Silicon Valley claims the talent crisis is now (although there are 19 billion reasons to question SV's hiring acumen). So, what about the women who are here now, asks Dr. AnnMaria De Mars. 'If you are overlooking the women who are here now,' De Mars writes, 'what does that tell the girls you are supposedly bringing up to be the next generation of women in tech that you can overlook 15 years from now? Why do we hear about 16-year-old interns far more than women like me? If it is true, as the New York Times says, that in 2001-2 28% of computer science degrees went to women compared to the 10% or so now — where are those women from 12 years ago? It seems to me that when people are looking at minorities or women to develop in their fields, they are much more interested in the hypothetical idea of that cute 11-year-old girl being a computer scientist someday than of that thirty-something competing with them for market share or jobs. If there are venture capitalists or conference organizers or others out there that are sincerely trying to promote women who code, not girls, I've never met any. That doesn't mean they don't exist, but it means that whoever they are seeking out, it isn't people like me.'"
1.) Run sudoedit and uncomment the line that says "%wheel ALL=(ALL) ALL".
2.) Make sure you're in the wheel group.
If you're a sysadmin, you need to stop people from shooting themselves in the foot. There should be some way of restricting use, right? Just gotta check out the man page.... And that's where I stopped, every time. I've yet to truly understand Extended Backus-Naur Form, and my eyes would glaze over. And so I'd go back to putting some small number of people in the 'wheel' group, and letting them run sudo, and cleaning up the occasional mess afterward. Fortunately, Michael W. Lucas has written Sudo Mastery: User Access Control for Real People." Keep reading for the rest of Saint Aardvark's review.