Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment OpenNTPD (Score 4, Informative) 142

OpenNTPD just ignored the leap second

OpenNTPD has clearly been written by someone who doesn't understand NTP. For example, it advertises incorrect root delay and disperson values, which can cause clients to fail to achieve a majority vote, or to pick the wrong peer to synchronise against. (Earlier versions were even worse, they advertised themselves as being at stratum 0, which could cause synchronisation loops; this has thankfully been fixed, but it doesn't inspire much confidence in the authors' competence.)

I've also found OpenNTP to fail to regulate the local clock on dodgy hardware (it would oscillate wildly, with an amplitude of 3 seconds or so), in situations where the reference ntpd coped just fine.

Folks, do yourself and everyone a favour -- run the reference NTP, run chrony, heck, run some SNTP client, but please avoid OpenNTPD.

Comment Re:Business opportunity (Score 1) 233

Linux configs vary a bit more in that v6 is not typically enabled by default

IPv6 is enabled by default on all Linux distributions known to me, and that has been the case for five years or so.

(Your confusion may stem from the fact that, unlike Windows, Linux distributions do not enable the Teredo protocol by default. But that's a different matter.)

--jch

Comment Re:Business opportunity (Score 1) 233

we can't just 'toss this machine out and buy new' (it's a 175k machine) [...] newer versions of Windows don't support the software that run on these computers

So you invest $175,000 without making sure you'll get software updates?

I rest my case -- it's your own fault.

--jch

Comment Re:What? They are still making Atom? (Score 2) 59

Microsoft somehow has the power to make everyone cripple their implementation of Atom to 2GB or less RAM supported

Can you cite an article showing how Microsoft is responsible? Google 2 gb atom limit microsoft failed me.

The following table specifies the limits on physical memory for Windows 7.
...
Windows 7 Starter 2 GB N/A

http://msdn.microsoft.com/en-us/library/windows/desktop/aa366778(v=vs.85).aspx

Comment Re:Business opportunity (Score 3, Informative) 233

Where is all the fucking Enterprise hardware and firmware updates to support it?.

Most large companies have been requiring IPv6-capable gear for the last 4 years or so, while the DoD mandages IPv6 support since 2005.

Because of that, most recent hardware and software is IPv6-capable. Cisco IOS, for example, has been doing IPv6 since 2001. Microsoft servers have been able to work over IPv6 since Server 2003. Mac OS X since 10.4, Linux since the 2.4 series.

If you're still stuck with IPv4-only hardware or software, it's your fault.

--jch

Comment Re:Angry Voters (Score 1) 255

Serious questions about this law: is it connection based, or account holder based?

Subscriber based -- the disconnection is linked to the real-world identity of the subscriber. (In France, you cannot even buy a pre-paid telephone SIM without showing id.)

In case of the second: you're landlord and account holder of the Internet connection of the flat you let out, tenant downloads stuff, gets three strikes, and gets disconnected, will they also disconnect your personal connection?

In principle, yes.

You may want to read http://en.wikipedia.org/wiki/HADOPI .

--jch

Comment Re:Tor? (Score 1) 111

Tor is not only for hiding your identity from the server; it's also useful for preventing your ISP from learning who you're connecting to, and for tunnelling aroud any firewalls that might be in place (as long as tor itself isn't blocked).

For example, I commonly use ssh over tor. Since I'm authentifying to the server, I'm obviously not hiding from it, but I prevent my ISP from knowing where I ssh to.

-- jch

Comment Re:Bazaar (Score 1) 442

Yet another DVCS article that doesn't mention Bazaar at all.

Neither does it mention Darcs, Mercurial or GNU Arch.

-- jch (who prefers Darcs himself, but has been switching to Git for compatibility with the rest of the universe)

Comment Re:Pretty much never? (Score 2) 203

F[ine] magnet links, how do they work?

The magnet link contains a hash of the .torrent file, which happens to be the key to search for in the DHT (it's in the btid field of the magnet link). The local peer consults the DHT, and finds some peers that participate in the desired swarm; it then downloads the .torrent file from those peers. After checking that the torrent matches the expected hash, the local peer just does normal trackerless operation.

-- jch

Comment Re:Sneakernet (Score 1) 203

With DHT, you wouldn't even need a tracker

Actually, you don't even need the DHT. Most BitTorrent clients implement "local network discovery", a protocol extension that allows them to automatically and quickly discover peers participating in the same swarm on the local LAN segment. It's usually disabled by default, for obvious privacy reasons, so you'll want to hunt for the features in your preferences dialog.

--jch

Slashdot Top Deals

Everything should be made as simple as possible, but not simpler. -- Albert Einstein

Working...