Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security

WikiLeaks Defenders Threaten Amazon 703

healeyb writes "CNN is announcing that, starting at 11 AM EST, the hackers (coined Operation Payback) responsible for the DDoS attacks on MasterCard, Visa, PayPal, and PostFinance have promised to commence an attack against Amazon for their revocation of the WikiLeaks EC2 account. They released a do-it-yourself hacking tool online Thursday so other people can help with the attacks they say took down the websites of MasterCard and Visa..."

Comment Re:Is it really only a matter of scheduling? (Score 1) 472

Shouldn't the size heuristics be in kernel space? Why should cp be analysing the RAM on the system? Take a look at the obscene hacky amount of heuristics userspace ends up with here, for example: http://insights.oetiker.ch/linux/fadvise/

IMHO, POSIX_FADV_SEQUENTIAL should be sufficient, but it doesn't seem to do anything useful (wrt. the page cache). I'm using POSIX_FADV_DONTNEED continuously on just-read pieces of file for an md5sum-type program (moderate CPU on a one-off sequential read), and this seems to work, but I'll also need to do the Oetiker mincore hack as referenced above in order to avoid evicting files out of the page cache if they were in there before.

This is a massive hack though; why shouldn't POSIX_FADV_SEQUENTIAL suffice? IMHO the kernel should do the following heuristic on POSIX_FADV_SEQUENTIAL: for large files don't cause cache misses to populate the cache. And cp could then do a single posix_fadvise and be done with it.

Comment Re:False assumption (Score 1) 814

How do I get my editor to do that for me? Or am I supposed to hold down the space bar every time I want to line things up like that?

Also, how wide does my screen have to be? I like the 80 character standard. If the tabs have variable width, then what happens when I view someone's code with a tab width of 8 when he wrote it with 4? Everything wraps horribly? No thanks.

Comment Re:Diesel (Score 1) 1141

Just a thought. Here in Europe I drive a TDi and get 40-60 mpg depending on how hard I drive it.

However, I took a while getting the hang of it. The turbo only kicks in at about 2500 rpm, and only after a delay. If I want real acceleration this involves being in the right gear and getting the engine revved up in advance.

How much more difficult/impossible would this be in an automatic? A kick down won't work as well as there will still be a turbo lag.

In Europe this is easy: everyone drives stick.

Bug

Ubuntu LTS Experiences X.org Memory Leak 320

MonsterTrimble writes "Ubuntu 10.04 LTS Beta 2 is experiencing a major memory leak due to patches for X.org. 'An X.Org Server update that was pushed into the Lucid repository last week has resulted in the system being slower and slower as it is left on, until it reaches a point where the system is no longer usable. ... In order to make the Ubuntu 10.04 LTS deadline, the developers are looking at just reverting three of the patches, which brings the GLX version back to 1.2. Ubuntu developers are now desperate for people willing to test out this updated X.Org Server package so they can determine by this Friday whether to ship it with Ubuntu 10.04 LTS or doing an early SRU (Stable Release Update). Right now this X.Org Server that's being tested is living in the ubuntu-x-swat PPA.'"

Comment Re:Easier to block? (Score 1) 131

It isn't extortion. The disconnection is legal under the terms of the contract (violation of TOS).

Reconnection is then subject to negotiation, or the customer can take their business elsewhere. That cannot be extortion because you aren't threatening the customer with anything. He can have his server back. He is under no obligation.

<i>...it's forcing entry to a legitimate server or tampering with their equipment (if you were mistaken about them being a spammer).</i>

It's not forcing entry at all. It is entry with permission as the result of a non-obligatory contract renegotiation.

Comment Re:Easier to block? (Score 1) 131

Well, you probably broke quite a few laws by using coersion to gain access to a customer's servers. But I for one would overlook it, given the benefits to the world at large (still it could be risky).

Fortunately, given the use of GRE tunnels, the spammer probably broke more laws, and would probably be a bit hesitant to sue.

No legal problem there. It's a contract issue.

Slashdot Top Deals

Intel CPUs are not defective, they just act that way. -- Henry Spencer

Working...