Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:+1 for VirtualBox (Score 1) 384

There was an old project called PearPC that was able to virualize a PowerPC G4 for virtual non-Intel OS X, but I heard it ran like crud.

Your best bet might be just to pick up a cheap USB KVM and a refurb Intel Mac Mini, doubt it'd cost you more than $400-500 tops, as well as a modern copy of Pagemaker... and just have them working side-by-side. I find for moving stubborn users, having the "migration-target" right on the desk with them for a reasonable transition period ends up being the least painful way, if you have the option.

Comment Re:An Ad? (Score 4, Informative) 348

Not defending either machine, just straightening your facts.

The Acer is more extensible, with user-replaceable battery, savvy-user-replaceable hard drive and RAM (though the RAM is a total pain to get to, not just a door on the back, everything has to come out to get at it) and the possibility for a lot more storage as laptop hard drives get bigger. If it gets stolen, and your data on it is backed up and protected from malcontents, it's $300 and not a huge deal in the grand scheme of things.

The Macbook is much thinner, a little lighter, significantly more powerful with it's 64-bit dual core processor, has reportedly better battery life (Apple's reporting has been pretty close to reality lately) and a full-sized keyboard and almost full-sized multi-touch trackpad (compared to the postage stamp Acer calls a trackpad,) slightly larger screen with quite a bit higher resolution, higher resolution webcam, much faster but more limited storage, can be configured with 4gb RAM (must be done at config time, part of the logic board) and for those that care, Apple's customer service and reliability are rated much higher (per the keynote video.)

Between the two? I'm probably going with the Macbook Air. I don't mind the premium for what I think will be better usability. I'm a larger gentleman with larger hands, and I haven't found a netbook keyboard and/or trackpad yet I want to use for more than a few minutes at a time... too small, slash key and period/comma keys are half size, etc. While the machines are similar in size, the MBAir has it beaten quite soundly in specs. It's really easy to say "haha, Jobs-o made a netbook after putting them down..." but he really didn't. This is no netbook. I had a netbook for two months, gave it to my mother, and I'll never own one again.
Businesses

CIA Drones May Have Used Illegal, Inaccurate Code 279

skids writes "Coders hate having to rush code out the door before it's ready. They also hate it when the customer starts making unreasonable demands. What they hate even more is when the customer reverse engineers the product and starts selling their own inferior product. But what really ticks them off is when that buggy, knockoff product might be used by targeting systems in military unmanned drone attacks, and the bugs introduce location errors of up to 13 meters. That's what purportedly happened to software developer IISi, based on an ongoing boardroom/courtroom drama that will leave any hard-pressed coder appreciating just how much worse his job could get. The saddest part? The CIA assumed the bug was a feature. The tinfoil-hat-inducing part? The alleged perpetrators just got bought by IBM."

Comment Re:Apple's security (Score 2, Insightful) 315

It's mathematically impossible to make a device completely safe from someone who has complete physical control over it. You can encrypt this and that all you like, but it's literally only a matter of time before someone applies enough computing power and breaks said rights-management. Boot loaders can be heavily obfuscated against reverse engineering, but since the device has to actually boot and work at some point, there's a key to the proverbial lock in that haystack somewhere. I hope I'm making sense, coffee hasn't kicked in yet.

And as for jailbreakme.com, yes, that was a genuine surf-and-get-pwned situation that utilized a "one-two punch" of two exploits, one that caused MobileSafari to execute arbitrary code, and the other that allowed the Unix user that MobileSafari runs as to execute a second payload of code as root. THIS "jailbreak" method was a prime example of sloppy coding and a lack of security mindfulness. Apple could have actually taken a page from Microsoft's recent secure coding initiative by renting some computing power and fuzzing files fed to their world-facing services to try to flesh out exploits. The Unix security model offers fantastic security if you a] implement it correctly and b] don't code sloppily. I get that Apple engineers are probably under an insane time-crunch, but still.

These bootloader jailbreaks however are just cat-and-mouse/whackamole between Apple who has to secure a device but yet make the damn thing actually boot, and an indefinite number of hackers with nothing but time. Hope I've cleared up any confusion anyone feels.

Comment Re:Bruce Willis (Score 2, Interesting) 118

He's probably thinking of Fifth Element, in which Tiny Lister plays the president of Earth. Essentially, some unnamed evil force, in the form of an asteroid that can make phone calls, is bent on destroying all life.

I made that sound really silly but it's actually one of my favorite movies of all time.

Comment Re:So It's catching my droid then? (Score 3, Interesting) 386

I consider myself to have pretty good eye-sight, if not 20/20 (no glasses/lenses) and I really can't see a pixel on my iPhone 3G from a measured foot away either. I can from about 3" though. If Apple's going to increase the pixel count by four-fold, I don't think I'll ever see a pixel again...

Comment Re:They force you to lease software (Score 1) 1016

Good point, modern cars do have DRM-protected ECUs. My old Grand National had no such protection though :)

I was more responding to modifying for reason xyz vs. modifying for reason of circumventing copyright measure, and why modifying the consoles was different from making a general modification to a car, even one that might lead to you breaking other laws (like speeding.)

Comment Re:They force you to lease software (Score 1) 1016

It's illegal because the law, in this case the DMCA (http://en.wikipedia.org/wiki/Digital_Millennium_Copyright_Act) specifically criminalizes the circumvention of a copyright measure. Sure this flies in the face of hypothetical fair use, for example, making backups of original games to protect the originals from damage. But he intentionally modified hardware put in place to enforce copyright, and therefore broke the law.

Modifying a car doesn't run afoul of the DMCA. The car is still legal to own and drive, is usable on the road if kept inside the legal speed limit and passes whatever vehicle inspections your local municipality imposes, and is usable on closed tracks and in legal racing situations and the like. Modifying a console so that it no longer handshakes with content to ensure the media is the original factory media; circumventing the console's ability to control access to copyrighted works (to quote the DMCA) breaks the law.

Comment Re:Are you crazy? (Score 1) 564

That's pretty funny, I used to hate on WD as well, until last month when we upgraded all the drives in our SAN to 1.5TB drives and pulled all 18 old WD 250GB drives. In three years, with about a grand total of 40min powered-off time, with constant reads and writes through nights, weekends and holidays, none failed.

Not exactly a real-world scenario relevant to desktop use or even a file server, but I thought it was interesting.

Slashdot Top Deals

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...