Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Did it this morning. (Score 1) 169

Windows 11 Pro OS Build 22000.51

Had a few interface reloads, where the task bar goes blank and reloads, but otherwise smooth sailing.
It's attractive, fast to use and fast to shutdown and start.
Unfortunately it didn't fix the issue where if I run Excel it kills the PC and it needs a manual power off to restart.

Submission + - Replacement for Mozilla Thunderbird? 3

maxcelcat writes: I've used Thunderbird for about a decade, and Netscape Mail before that (I have an email from 1998 from Marc Andreessen, welcoming me to Netscape Email, telling me different fonts can add impact to my emails).

Thunderbird has served me well, but it's getting long in the tooth.

Given the lack of development and the possibility that it's going End of Life, what should I use instead? I have multiple email accounts and an archive of sixteen years of email. I could get a copy of Outlook, but I don't like it.

Things I like about Thunderbird:
  • Supports multiple email accounts
  • Simple interface
  • Storage structure is not one monolithic file
  • Plain Text email editor
  • Filtering

Things I don't like:

  • HTML email editor
  • Folders are hard to change and re-arrange

Submission + - Busybox Deletes systemd Support

ewhac writes: On 22 October, in a very terse commit message, Busybox removed its support for the controversial 'systemd' system management framework. The commit was made by Denys Vlasenko, and passed unremarked on the Busybox mailing lists. Judging from the diffs, system log integration is the most obvious consequence of the change.

Submission + - This $9 computer might be more useful than Raspberry Pi (networkworld.com)

colinneagle writes: A small team of engineers and artists that make up Next Thing Co. launched a Kickstarter campaign today for Chip, their $9 single-board computer that boasts Wi-Fi, Bluetooth, and a larger processor than Raspberry Pi's most powerful models.

The tiny device runs a 1 GHz R8 ARM processor, and comes with 512MB of RAM and 4GB of storage. In comparison, the Raspberry Pi B and B+ models feature a 900 MHz quad-core ARM Cortex 7 processor. The Chip comes with a built-in composite output to connect to monitors and supports adapters for VGA or HDMI. It runs Debian Linux and comes preloaded with the Scratch programming language for those who might be new to coding.

Most noteworthy, though, is the Pocket Chip – a small device with a crude-looking screen and hard-key keyboard that plugs into the Chip and makes for portable computing. It may not be an iPhone killer, but it's an impressively inexpensive mobile form factor.

Submission + - Strange Stars Pulse to the Golden Mean (quantamagazine.org)

An anonymous reader writes: What struck John Learned about the blinking of KIC 5520878, a bluish-white star 16,000 light-years away, was how artificial it seemed.

Learned, a neutrino physicist at the University of Hawaii, Mnoa, has a pet theory that super-advanced alien civilizations might send messages by tickling stars with neutrino beams, eliciting Morse code-like pulses. “It’s the sort of thing tenured senior professors can get away with,” he said. The pulsations of KIC 5520878, recorded recently by NASA’s Kepler telescope, suggested that the star might be so employed.

A “variable” star, KIC 5520878 brightens and dims in a six-hour cycle, seesawing between cool-and-clear and hot-and-opaque. Overlaying this rhythm is a second, subtler variation of unknown origin; this frequency interplays with the first to make some of the star’s pulses brighter than others. In the fluctuations, Learned had identified interesting and, he thought, possibly intelligent sequences, such as prime numbers (which have been floated as a conceivable basis of extraterrestrial communication). He then found hints that the star’s pulses were chaotic.

But when Learned mentioned his investigations to a colleague, William Ditto, last summer, Ditto was struck by the ratio of the two frequencies driving the star’s pulsations.

“I said, ‘Wait a minute, that’s the golden mean.’”

Submission + - How many fundamental constants does it take to describe our Universe?

StartsWithABang writes: Our Universe is the way it is for two reasons: the initial conditions that it started off with, and the fundamental particles, interactions and laws that govern it. When it comes to the physical properties of everything that exists, we can ask ourselves how many fundamental, dimensionless constants or parameters it takes to give us a complete description of everything we observe. Surprisingly, the answer is 26 (not 42), and there are a few things that remain unexplained, even with all of them.

Comment Re: Cataloging write-only archives (Score 1) 259

Speak for your self, my emails go back to 1988 and even worse are in a propriator format - Outlook front end on Exchange backend, but odly enough I can get em on my OSX PC at home and my andriod phone when I'm anywhere else, don't bet on formats for important stuff going out of sytle any time soon.

Comment Re:Will Microsoft ever learn? (Score 2, Insightful) 209

This, This, this, I liked Aero, I had a PC that could run it, I like buttons that look like buttons that click whan you push em and have a bit o shiney hi-light.
I like translucent effects and stuff showing through.
Who really likes flat blah square windows with little indication as th who has focus and whats on top.

Submission + - Ask Slashdot: After TrueCrypt (slashdot.org)

TechForensics writes: (Resubmitted because was not identified as "Ask Slashdot"

We all know the TrueCrypt story-- a fine, effective encryption program beginning to achieve wide use. When you see how the national security agency modified this tool so they could easily overcome it, you'll probably understand why they don't complain about PGP anymore. The slip that showed what was happening was the information that NSA "were really ticked about TrueCrypt" either because they couldn't circumvent it or found it too difficult. From the standpoint of privacy advocates, NSA's dislike for TrueCrypt was evidence it was effective.

Next, NSA directly wrapped up the makers of TrueCrypt in legal webs that made them insert an NSA backdoor and forbade them from revealing it was there. It's only because of the cleverness of the TrueCrypt makers the world was able to determine for itself that TrueCrypt was now compromised. (Among other things, though formerly staunch privacy advocates, the makers discontinued development of TrueCrypt and recommended something like Microsoft Bitlocker, which no one with any sense believes could be NSA – hostile. It then became logically defensible, since NSA was not complaining about PGP or other encryption programs, to posit they had already been compromised.

This is the situation we have: all of the main are important encryption programs are compromised at least in use against the federal government. Whether NSA tools are made available to local law enforcement is not known. This all begs the question:

Does the public now have *any* encryption that works? Even if we can see the source code of the encryption algorithm the source code of the program employing that algorithm must be considered false. (TrueCrypt was the only program NSA complained about.) In the case of other software, it becomes believable the NSA has allowed to be published only source code that hides their changes, and the only way around that may be to check and compile the published code yourself. Half the public probably doesn't bother.

Okay, Slashdot, what do you think? Where do we stand? And what ought we to do about it?We all know the TrueCrypt story-- a fine, effective encryption program beginning to achieve wide use. When you see how the national security agency modified this tool so they could easily overcome it, you'll probably understand why they don't complain about PGP anymore. The slip that showed what was happening was the information that NSA "were really ticked about TrueCrypt" either because they couldn't circumvent it or found it too difficult. From the standpoint of privacy advocates, NSA's dislike for TrueCrypt was evidence it was effective.

Next, NSA directly wrapped up the makers of TrueCrypt in legal webs that made them insert an NSA backdoor and forbade them from revealing it was there. It's only because of the cleverness of the TrueCrypt makers the world was able to determine for itself that TrueCrypt was now compromised. (Among other things, though formerly staunch privacy advocates, the makers discontinued development of TrueCrypt and recommended something like Microsoft Bitlocker, which no one with any sense believes could be NSA–hostile. It then became logically defensible, since NSA was not complaining about PGP or other encryption programs, to posit they had already been vitiated.

This is the situation we have: all of the main or important encryption programs are compromised at least in use against the federal government. Whether NSA tools are made available to local law enforcement is not known. This all begs the question:

Does the public now have *any* encryption that works? Even if we can see the source code of the encryption algorithm the source code of the program employing that algorithm must be considered tainted. (TrueCrypt was the only program NSA complained about.) In the case of other software, it becomes believable the NSA has allowed to be published only source code that hides their changes, and the only way around that may be to check and compile the published code yourself. Half the public probably doesn't bother. (Would it not be possible for the NSA to create a second TrueCrypt that has the same hash value as the original?)

Okay, Slashdot, what do you think? Where do we stand? And what ought we to do about it?

Slashdot Top Deals

What good is a ticket to the good life, if you can't find the entrance?

Working...