Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Over Priced! (Score 1) 375

THE MUSIC IS OVER PRICED I AM NOT PAYING $20.00 FOR A SINGLE CD. I will pay a max of $10.00 period! I would prefer CDs to cost $7.00 which would fall under the impulse buy price range. I have over 300 dvds all bought because they where 5 and 10 bucks. Impulse buys. When you start getting to $20.00 a purchase you evaluate its worth and realize its not worth it. They are killing themselves and blaming everything around them.

Comment This has done more damage them people realize (Score 1) 535

I think this issue will cause more damage to the internet community then any one realized. Its going to cause a major split between the Free source hard line fanatics (which I think should all be rounded up and shoot) and the rest of us who still grasp common sense and can live in a world with both free and non free recognizing there is a place for both. Theora is clearly crappy in every way and the only thing to support it on is that it MAYBE is free which its most likely not. Hard line fanatics don't give a dam about how crappy it is except that its free. The rest of us will argue to the bitter end how its not wanted or needed. This could be the tipping point that really creates a split between the internet community as a whole.

Comment Re:And Yet, No Ogg Theora in IE (Score 1) 535

What kind of idiot would want to use Ogg Theora in the first place. Its crappy quality at the best of times. I convert all my DVDs to h.264 and I try to download my movies in h.264 or xvid. I ignore the few and thank god its only a few Ogg Theora rips. Maybe in 15 years Ogg Theora will catch up to current codecs just like it took that long for Linux to catch up to Windows as a usable operating system. In the meantime im using what works best until that happens.

Comment Re:competition (Score 1) 453

And Microsoft offered to cover the license free for Mozilla so that the video issue in HTML would be done with. Google has just set back HTML 5 by years. Additionally the contract for the license has in writting that it will not exceed 10% of current rates at renewal. Most important of all, WebM is not lawsuit proof, they will get sued and those that use it could be named as well. h.264 is pretty safe because its a very large patents pool. The chances of something coming up from that which isn't covered already is low. WebM on the other hand is just google. And google isn't taking the responsibility for any patent suits so every user of it is at risk. And for those that say well no one has sued Theora yet, so what. If they ever get popular and some one worth sueing uses it, it will happen. Google has money so you can bet WebM will result in lawsuits. Simple Solution, browsers support h.264, WebM and Theora, and web sites can decide if they want the best and safest codec h.264 or the risky but politically correct open formats. It is so hard to put support of all 3 into the browsers?

Comment Re:Exaggerated Marketing From A Marketing Company (Score 1) 765

Any one that calls H.264 inferior is absolutly clueless and is almost not worth replying to. And last time I checked Safari and Internet Explorer supported it so I don't know where you get this switching to a nother browser which dosen't support it from. H.264 has good picture quality, for a decent size and hardware support on majoirty of devices. It plays on PS3, Xbox, iDevices, Windows, OS X, Linux and majority of other not worth mentioning MP3 players. It plays on tablets Blackberry and majority of phones. How is it inferior again?

Comment Re:Exaggerated Marketing From A Marketing Company (Score 1) 765

Had... I am dropping Chrome from my 3 PCs and work computer as of today. Already removed it from my home computers. I will be telling every one of my clients to drop Chrome. I will be telling co-workers to drop Chrome. I will be writing a script tomorrow to remove Chrome from all 350 PCs I manage at work which recently replaced FireFox as our second choice browser. Give it a few months as geeks in positions of power drop it and tell people to drop it. I will also be changing everything from Google to Bing, dropping all other Google services. They didn't have to drop support for it. They could have promoted it with out being a Microsoft. Google has become to arrogent as its become larger. Now they will suffer.

Comment Not much of a issue (Score 0, Offtopic) 68

Seems like no one really read the article. Its not a problem with Safari. If a user opens a web page in Safari they dont lose the URL bar. Its in app access to browsing using API's to hide the URL after a page in a App has loaded. Users only get to see it for a few seconds. I still think its a non issue because Apps are so controlled on Apple it would be a stroke of luck for some one to get a App that did abuse that to steal peoples info, it would be busted quickly if it did some how get pass that App Approval nazi's and quickly pulled. If such a rare thing did happen it could spark Apple to use the auto remove back door of any apps of that nature installed for the first time. Sometimes its great using a device that is highly controlled because I have no reason to worry about this at all with the current state of App approvals. The flaw would be horrible on a more open less controlled market space though.

Comment Yes and No (Score 2, Interesting) 293

When an Automatic Update from Microsoft Update or Apples Software update installs a plugin, I have an issue with that like how .net was added to firefox without users knowing. When something installs from a users explicit decision such as installing iTunes or MS Live and it installs a plugin he's wrong. User initiated installs is the permission granted to Apple or Microsoft or Google to install whatever is being offered. If the user fails to read the finer details of what’s being installed or reads the installer options such as, include whatever plugin, it’s not their fault. There is a difference between Automatic non user initiated plugin installs from updates and user initiated software installs that include a plugin. Firefox could easily just audit its plugins from last start to see if anything has been added in the unofficial way and warn the user or by default disable it and ask the user to enable it. Its in there power to do something about it but instead they take the lazy route or political route to complain about it instead. So one must ask what is the Agenda saying Microsoft, Apple and Google are evil when they have the power to code changes to prevent it vs saying the Maker of Internet Explorer and the Maker of Safari and the Maker of Chrome are evil. Oh I think I just answered the Political question with that last line.

Comment Here is a full list I can think of off (Score 1) 600

Go with a Hardware Firewall / VPN device from Cisco for the external connection If you web server is for the external world go with a Linux based system with Apache if its for a internal intranet setup go with IIS which is placed behind the External hardware firewall. A second internal hardware firewall to separate the internal network from the Web Server. While a Single server can handle almost everything your looking for with such a small company I would advise not putting all your eggs in one basket. Go with cheaper servers and multiple servers vs 1 or 2 large powerful servers. Server 1 a File and Print Server with a Raid 5 disk setup. Server 2 Antivirus Server / Deployment Service / Microsoft ISA Server / Certificate Server Server 3 DNS / Active Directory / DHCP / Exchange Server Primary Server 4 DNS / Active Directory / DHCP / Exchange Server Secondary Server 5 Door Access / Security Camera Control (if you have either) Otherwise skip this. Server 6 SQL Server, Application Server and BES if you use Blackberry's, You will want a DAT backup drive for the file server with daily backups. If its a public company you will need 8 weeks worth of daily backup tapes plus monthly backup tapes for 7 years and yearly tapes for 7 years worth of backups to meet SOX compliance. In Active directly do both a Global Group and domain local group for each shared resource. Put people into users in the Global group and attach the Global group to the domain local group which is applied to the actual resources in the file server. Make heavy use of groups to resources vs assigning people directly to folders. Hardware use Dell Desktops, not laptops for the office. Set internal resource asset numbers in the bios, lock out front USB ports and set the bios to only boot from hard drive. Use a good bios password. I prefer Windows XP to Windows Vista and 7 for a business setup. Unless your using any software that requires Windows 7 stick with XP and make sure all users are regular users with no admin privileges. Any programs that require admin users can usually be fixed with a registry change or a rights change on its folders. You will want to create a batch file to secure machines, set logging options to be longer then defaults and remove local admin accounts. I like Trend Office scan over SAV but both are good for central management. KIX is a good login script program with AD for setting up auto mounts of drives based on what groups the user belongs to in AD Force complex passwords and rotation. Make heavy use of Group Policies to secure machines. Use Cat 6 cables if your redoing all your cabling as well and put in at least 2 ports at each work station. Avoid wireless but if you want to use wireless use a internal office setup on radious authentication Use GB port layer 3 switches and activate 802.1x network authentication. Physical protection of servers and networking equipment important to make sure you pad lock all networking points and all hardware to prevent access to ports on back and internal guts. Use large multifunction copier vs personal printers, page per cost is way cheaper. It adds up quickly. Make sure it supports secure print so HR and other confidential users can print secure. Setup all devices with passwords to prevent users from messing things up. UPS battery backup for all the servers and network equipment. Keep a few laptops on hand with encryption as loaner machines so if users need to work from home they can VPN into there work station. Data should never leave the actual business. Never allow work on a laptop since data can get lost or stolen. Set the users home directory to be on the server as a shared drive and lock out there ability to write on any part of the local C drives to prevent users from saving important files on the desktop which wont be backed up unless you use roaming profiles. Using group policies users should be allowed to restart a machine but not shut it down. Virus scan should be nightly with a deep scan once a week. Use a off site company like Iron Mountain to do the offsite tape storage. Dont use wireless keyboards and mice. A dedicated room for the servers should have A/C to maintain a cool operating environment. Additional house keeping stuff to employ if the company is growing Keepass is a good password program Use SAF forms for all levels of access, "Standard Access Form" which lists network resources and hardware resources. Have both manager and HR sign off on each one. Develop a security presentation and every 12 months re run it with every one and sign off on it Develop a electronic communication policy and have every one resign this every year If the business becomes a multi-site company deploy Citrix and keep all data located at the main office. Dont do local file servers at each location because data protection becomes harder and more expensive. Operate on a 4 year life cycle for hardware. Collect hard drives and media vs given them away or tossing them out since the data is still located on them to be found later. Dont forget to get hard drives from devices like copiers to. mac4lifeca@hotmail.com

Comment Big Problem... (Score 1) 282

First thing the military does is take out power and other utilities during the first waves of attack, what power lines will be operational when ground forces move in after the air assaults. This is at best useful for special forces that are sneaking around in a country. Not in a situation like say invading like what was done in Iraq.

Comment Re:It's not aimed really at MS (Score 1) 407

Then google could sue MS, and I don't see why MS would even bother because it makes no difference to them. When I look for solutions at work its gotta work with Exchange and AD because thats what our systems are. Im not about to change everything over to fit a small need in one area. This is no different.

Slashdot Top Deals

New York... when civilization falls apart, remember, we were way ahead of you. - David Letterman

Working...