Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Powershell (Score 1) 729

size of IS NOT a function. it is a unary OPERATOR that get's replaced at compile time not at runtime by the size in bytes of what ever you passed to it (generate assembly of simple code using size of and you'll see that it sizeof(int) gets replaced by the constant 4 but as of C99 if the operand is a variable length array things get complicated as it will compute the size at runtime, so the assembly code is way more complicated )

Comment Re:Because the open source drivers suck so badly (Score 1) 142

? "tainted" is just a flag, nothing more. It's there in case womeone sends them a bug report (a crach for instance), if the kernel is "tainted" their answer will probabaly be : try again without the "tainting" module and see what happens : if the problem goes a way they'll send you crying to the one responsible for THAT module, periode.
There's absolutely NO denying anything to any module.

Comment Re:Entitled Asshole Mentality (Score 1) 199

Considering that your version of "scientific evidence" involves creating an alternative universe with no copyright and seeing how things work out, your claim is utterly irrelevant because all you've done is limit "scientific evidence" to something that can't practically be done.

I didn't know the fashion industry existed in an alternate universe ???? (except from trademarks they have nothing)

Comment Re:"... as a means to reduce theft." (Score 1) 158

I almost forgot this: what you want it the ability to track the phone, for that you need a functioning phone not a bricked one.
having control over the trust chain in the boot process with prevent the thief from installing anything on the phone hence preserving any tracking software present!

Comment Re:"... as a means to reduce theft." (Score 1) 158

it does existe, it's called google device manager or cerberus or .... etc for Android. Or iCloud or something like that for iphones/ipads
On android, for instance to brick the phone destoy the EFS partition and "voila" ( dd if=/dev/random of =PATH_TO_EFS) the phone is useless for the thief! (if you recover it and have a back up you can restore it).

Comment Re:You can control cellular access on iOS (Score 1) 333

yes, it does, and yes I could just use iptables also, no need for AFWall or anything else.
But, saying it would be PITA would be a euphemism.
What the available "firewall" applications out there do is simplify that task a bit. I would be even better if we had something like this : http://iphonemonsta.com/firewa... or this http://www.neowin.net/forum/to... . baked in the system, so that no rooting is needed.
I'm not asking, I'm just saying. (and in the mean time, I'm thinking about implementing my own solution, using libnetfilter_queue or something similar).

Slashdot Top Deals

"I've seen it. It's rubbish." -- Marvin the Paranoid Android

Working...