Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment One more thing to uninstall on a new system (Score 1) 548

This is one more thing that will need to be uninstalled on a new system when removing 50 or so packages, disableing most of the unnessary cron jobs and services. Not to mention the instalation of all the packages that need to be installed but can not be put in the default instalation because of the RIAA.

Comment Why have security when a very limited range should (Score 1) 260

Surley the best solution to this is no security at all and just use a very low power signal. How far should it need to go between the tyre and a fixed point on a car (a few cm at the most I think). Would it even be possible for the sensor to be connected to the cars computer via a cable and just eliminate the wireless security hole. Then they just need to have the reciever ignore any signal with values outside the valid range.
Ubuntu

Canonical Begins Tracking Ubuntu Installations 548

suraj.sun passes along this excerpt from Phoronix: "Just uploaded to the Ubuntu Lucid repository for Ubuntu 10.04 LTS (and we imagine it will appear shortly in Maverick too for Ubuntu 10.10) is a new package called canonical-census, which marks its initial release. Curious about what this package provides, we did some digging and found it's for tracking Ubuntu installations by sending an 'I am alive' ping to Canonical on a daily basis. When the canonical-census package is installed, the program is to be added to the daily Cron jobs to be executed so that each day it will report to Canonical over HTTP the number of times this system previously sent to Canonical (this counter is stored locally and with it running on a daily basis it's thereby indicating how many days the Ubuntu installation has been active), the Ubuntu distributor channel, the product name as acquired by the system's DMI information, and which Ubuntu release is being used. That's all that canonical-census does, at least for now. Previously there haven't been such Ubuntu tracking measures attempted by Canonical."

Comment Re:Auto-car. (Score 1) 509

You already almost have this in America. With cruse control, automatic gearboxes and all the other gadgets inside your cars all that is left for the driver to do is steer (once every 100 miles or so). I would much prefere to drive my manual small car in England down twisty roads where I actually have to drive.

Submission + - The recovery disc rip-off (pcpro.co.uk)

nk497 writes: The chances of finding a recovery disc at the bottom of a PC box is getting slimmer, as vendors instead take the cheaper option of installing recovery software on a hard disk partition, leaving the buyer with no physical copy of the operating system they paid for if (or when) the hard disk fails. Users can burn a backup disc, but many aren't as diligent as they should be. While some PC vendors will offer a free or cheap disc at the time of purchase, buying one — or even tracking one down — after the fact can be expensive and take weeks to arrive. “I’ve had a lot of people that have had this problem,” said David Smith, director of independent maintenance company Help With Your PC. “One customer recently found his hard drive had gone, but by the time he’d paid £50 for the recovery disc, paid for a new hard drive and paid for the labour of installing the device, it made more sense to buy a new machine.”
Security

Attacking Game Consoles On Corporate Networks 79

A pair of security researchers speaking at DefCon demonstrated how video game consoles, which are becoming increasingly common break room or team-building toys, can open vulnerabilities in corporate networks. "[They] found that many companies install Nintendo Wii devices in their work places, even though they don’t let you walk into the company with smartphones or laptops. (Factories and other sensitive work locations don’t allow any devices with cameras). By poisoning the Wii, they could spread a virus over the corporate network. People have a false sense of security about the safety of these game devices, but they can log into computer networks like most other computer devices now. In the demos, the researchers showed they could take compromised code and inject it into the main game file that runs on either a DS or a game console. They could take over the network and pretty much spread malware across it and thereby compromise an entire corporation. The researchers said they can do this with just about any embedded device, from iPhones to internet TVs."

Slashdot Top Deals

Software production is assumed to be a line function, but it is run like a staff function. -- Paul Licker

Working...