Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Mozilla

A Pointed Critique of Thunderbird 3's Performance Compared to v.2 234

PerfProtector writes "Did you recently install Thunderbird 3 or upgrade from Thunderbird 2 to Thunderbird 3? Did you notice any severe slowdown in your machine or a major decrease in its performance? Well, many people around the world encountered these problems. We wrote a technical analysis about the severe problems that are caused by Mozilla Thunderbird e-mail client. These problems include anomalous usage of CPU, memory, hard disk and Internet bandwidth. You can read the full analysis, including several graphs that show how bad the situation is and what went wrong from Thunderbird 2 to Thunderbird 3. For example, while CPU utilization of Thunderbird 2 is usually between 0% to 10%, with an average of 0.3%, Thunderbird 3 CPU utilization is between 5% to 80%, with an average of 30% — 100 times more than Thunderbird 2. In addition, during long periods of time, Thunderbird 3 used more than 50% of the overall CPU resources.This behavior slows dramatically the whole machine." It's worth noting that this analysis comes from developers who have developed a (freeware) tool they claim will improve Thunderbird's performance, but they explain also how to do so with manual changes.

Comment Re:Fedora (Score 2, Informative) 236

Then your best bet would be to create a local repository out of the contents of cds, or a dvd. Which should be a basic thing you are going to do anyway if you have more than a few servers that don't have access to the internet. Then you would mirror in updates, and let them update from that.

There is graphical software that will let you install stuff straight from discs, and even ask for the right disc.

Comment Testing software (Score 1) 274

I recently diagnosed two desktop machines. One ended up having a bad stick of memory, with the original symptoms being a corrupted copy of Windows XP that wouldn't boot. The other a bad hard drive, the symptoms being it would hang during use randomly and even during boot.

I used Prime95 and Memtest86+ to detect the bad stick of memory. Prime95 quickly came up with a error during the stress test, and Memtest86+ also came immediately came up with errors. In the past I have since subtle errors with Memtest86+ that only show up in later tests or with multiple passes. Instant answers isn't how it always goes.

For the bad hard drive I ended up doing a variety of tests. I tried Prime95, and since it was a Seagate drive, Seagate's Seatools. I didn't get any clear answers from them. At a later point I booted into a Fedora 11 Live cd, which popped up with a SMART error. Which ended up being a bad sector that needed to be remapped. I then tried using Spinrite to fix it, but ended up seeming to just hang on this one spot. So I replaced the hard drive. Afterword I reran Spinrite against the new drive, and it came up with nothing. I also played with Sandra Benchmarks at the end to stress the machine.

Comment Binaries and DD-WRT (Score 1) 199

A lot of firmwares, like DD-WRT, have issues with binary only drivers and programs. I ran into it with the nas process in DD-WRT a few months ago.

  I had decided to move to WPA2 Enterprise. It sort of worked, but there is a long standing bug in DD-WRT relating to WPA2 Enterprise. WPA2 Enterprise depends on Radius. The nas process will only try a Radius server once. If it fails, then it won't try again. The only workaround is to kill the nas process one way or another. Then to make it all the more fun, the nas process is binary only.

  I ended up having to go back to the official Linksys firmware for my WRT600N to get working WPA2 Enterprise.

Comment powerdns was vulnerable, but differently (Score 2, Insightful) 237

Powerdns was vulnerable to the Kaminsky attack, but in a different way. It was actually easier to spoof the server due to its more actively dropping certain DNS packets. So while it did perform source port randomization, it was not totally immune to the attack either.

http://doc.powerdns.com/security-policy.html itself states:

All versions of PowerDNS before 2.9.21.1 do not respond to certain queries. This in itself is not a problem, but since the discovery by Dan Kaminsky of a new spoofing technique, this silence for queries PowerDNS considers invalid, within a valid domain, allows attackers more chances to feed *other* resolvers bad data.

Though it is phrased as "someone elses problem", in the DNS word of course nothing is "someone elses problem". DNS servers are chained in hierachies and one problem somewhere leads to problems elsewhere. DNS is all about protocol compliance to ensure interoperability. With the "someone elses problem" approach, we would have had no "reflection attack" and "amplification attack" problems either, it being "someone elses problem". Despite the nice phrasing, powerdns caused cache poisoning problems as a result of the Kaminsky attack that needed to be addressed.

In general, I have a problem with bug reports and changelogs writing things as "improved error handling", "made more robust" or "add security to" which are too often used to hide the real security impact of certain bugs. DJB's policy of "it is not my bug to fix, because it is an operating system bug" is also completely bogus from a system administrator point of view who still ends up with a security problem.

Comment Re:Killing desk space? (Score 2, Interesting) 370

I have two setups like that.

  At home two 24" monitors on one computer, along with a second computer with a 20" monitor. They are connected with synergy and a ps/2 kvm. The kvm is good for when the main one is down. I can just hotkey over and use the second computer. I use it mainly for IM, but also sometimes for a second browser. Both computers are running Fedora I find having two computers comes in handy regularly. I also use the second computer as a iscsi server for the first. The first computer already has six drives in it. So the second computer allows me to expand to ten.

  The office setup is two 20" monitors on one computer, along with a second computer with a 20" monitor. They are connected with synergy. In this case I actually have two keyboards and nice. The main computer has no ps/2, and I have no usb kvms. I use a two port ps/2 kvm to share one keyboard between the second computer and a third computer. Then I toggle the monitor between dvi and vga. I do it this way since 99% of the time I don't need console access on the third computer. I access it via ssh for CUDA programs. The first computer runs Fedora, the second runs Vista, and the third runs Fedora. Vista is good in the office. It lets me do things like VMware Infrastructure client(currently Windows only), Internet Explorer(just today I was told to use IE on the HR site, since it works better), and other little things.

Security

Submission + - Backtrack4 pre-final released! 1

purehate writes: "The Remote Exploit Team is ecstatic to announce the public release of BackTrack 4 Pre Final (codename "pwnsauce"). We have worked long and hard to provide the security community with another outstanding backtrack release. The .iso is available for download at http://www.remote-exploit.org/backtrack_download.html and users can keep up with all the latest official backtrack news at our blog http://www.offensive-security.com/blog/"

Slashdot Top Deals

Ya'll hear about the geometer who went to the beach to catch some rays and became a tangent ?

Working...