Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Apt (Score 1) 183

I think you'll find that if you let that Windows application of yours run as it was intended (ie. with enough space on c:, with full administrator privileges, etc.), it will just work. You don't need to rely on some Microsoft repository administrator to make that choice for you.

Regarding compatibility, why is it "you are only allowed to install our version of program X" instead of "I see you have installed program X, I'll make myself compatible with it"? Why is it "you are only allowed to run our software X and software Y" instead of "I see you have both software X and Y, I'll make them interoperate better"?

Comment Re:Apt (Score 1) 183

And my point is that the people making the software are not always familiar with every distribution

And neither should they be. They should be able to write their software and have it run as intended on every distribution that is able to run it.

Comment Re:Parallel is here to stay but not for every app (Score 1) 321

I have 2GHz dual-core AMD, several years old. My OS may be doing hundreds of task all the time, but those tasks amount to 2-4% of CPU time. I could have all those tasks running on one core and use only 4-8% of that core's time, and literally have the other core waiting for me to press a button. How is adding 14 idle cores to this equation going to improve the responsiveness to my key press? Answer: it's not.
Security

New Denial-of-Service Attacks Threaten Wireless Data Networks 31

alphadogg writes "Forget spam, viruses, worms, malware, and phishing. These threats are apparently old-school when compared to a new class of denial-of-service attacks that threaten wireless data networks. The threats were outlined in a talk in NYC Thursday by Krishan Sabnani, vice president of networking research at Bell Labs, at the Cyber Infrastructure Protection Conference at City College of New York. Sabnani said they are the result of inherent weaknesses in Mobile IP, a protocol that uses tunneling and complex network triangulation to allow mobile devices to move freely from one network to another. 'We need to especially monitor the mobile networks — with limited bandwidth and terminal battery — for DOS attacks,' Sabnani said, adding that the newest DOS attacks on wireless networks involve repeatedly establishing and releasing connections. These attacks are easy to launch and hard to detect, he said."

Slashdot Top Deals

"You know, we've won awards for this crap." -- David Letterman

Working...