Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Does not require extra purchase (Score 2, Informative) 212

The ability to print to any Mac via AirPrint was supposed to show up in 10.6.5 but for unknown reasons this feature was pulled. Though there are 3rd party apps like Printopia and Fingerprint that will enable add the missing functionality. You can also download the missing files from earlier 10.6.5 seeds to re-enable AirPrinting.

Internet Explorer

Microsoft IE Browser Share Dips Below 50% 297

alphadogg writes "Microsoft's Internet Explorer, which has dominated the Web browser market since blowing by Netscape in the late 1990s, last month fell below the 50% market share level for the first time in years. IE's share of the worldwide market fell to 49.87% in September, down from 51.3% in August and 58.4% a year ago. It is followed by Firefox, which increased its share slightly from 30.09% to 31.5% and Google Chrome, which grabbed 11.54% share, more than triple its September 2009 share, according to market watcher StatCounter."

Comment This is a disaster! (Score 1) 1066

If the cracking of DRM tech continues at this pace, we'll soon find ourselves living in a strange world where consumers are granted the privilege of PLAYING the content they PAID hard earned cash for! Ridiculous! This must stop while there's still a shred of decency and fairness left in the world! How will the copyright infringing pirates differentiate their loot if the legit stuff become as flexible, reliable and convenient?! What a mess!

Comment Re:I have read it... (Score 1) 425

I don't foresee ISPs trying to pull off such stupidity in this day and age. Maybe I underestimate their incompetence. It'd be pretty difficult to market such an inferior service policy when home users have become accustomed to having multiple computers, their PS3's, HTPCs, smart phones, etc, etc, etc all sharing their Internet connection over the last decade or so.

I'd switch ISPs instantly if it meant the difference of having a single IPv6 address or a proper /64 prefix for my home LAN. If they all collude and run their network like a bunch of brain damaged idiots, well hey, I can NAT the single IPv6 address and things are no worse than they are now. Though they would have killed the most significant advantage of the new protocol.

Taking the only approach that makes sense (assigning each customer their own global prefix) would give them some advantages in tech support they don't currently have. The ISP I work for often has to suspend accounts with one or more compromised computers that end up as SPAM bots. Currently, in the IPv4 world of NAT, we can't tell them any specifics - only that one or all of their computers have been compromised. With every address globally routable, at least your ISP could shove you in the right direction and say something along the lines of '2610:78:ad:1::3' is infected.

Comment Re:I have read it... (Score 1) 425

I don't think my default-deny rule was necessarily off-topic. It is there to support my point, that is: if you aren't granted access to my computers, why the hell should I care if you can confirm their existence? In my opinion, hiding my topology isn't worth dealing with the kludge that is NAT. Many protocols embed IP addresses within the protocol and break when they pass through NAT. These tend to have workarounds, but who wants to bother with that?

All that being said if, in your opinion, hiding your topology is worth the drawbacks of NAT all the power to you. There is nothing preventing the use of a similar technique in IPv6. I will choose against NAT, others may strongly disagree with me.

The thing is, in IPv4 I have no choice but to hide everything behind NAT. IPv4 addresses aren't plentiful enough to have a block routed to everyone who wants one. In IPv6, addresses are plentiful and you're free to use whatever strategy you want. This is a good thing!

Comment Re:I have read it... (Score 2, Insightful) 425

NAT breaks end-to-end connectivity. Its main purpose in IPv4 is to deal with the limited address space. In the massive address space of IPv6, NAT is no longer necessary.

You can still NAT everything behind non-routable ULA addresses if you wish, but I see no reason to do so. If one takes this approach and later decides they need a specific port opened to more than one machine, ie) port 80 for a couple new web servers, they won't be able to do this without re-numbering or setting up a a couple new static NAT rules. Note: I specifically say a couple (or more than one) as this is specifically where dynamic NAT based port forwarding breaks down.

A much better approach is to keep everything on globally routable IPs and adding a quick (hopefully default) firewall rule to deny all incoming traffic. This way you still protect your network from undesired incoming connections but still have an easy option later to open ports as needed without any of the limitations. This is exactly how I would set my IPv4 networks up today, if real IPs were actually available.

There MAY be niche scenarios where non-routable IPs are desirable in the IPv6 world, I honestly can't think of any. Can you?

Comment Re:I have read it... (Score 5, Insightful) 425

You and many others desperately need to read more about v6 before regurgitating the same old myths.

* Read up on RFC 4941 - Privacy Extensions for Stateless Address Autoconfiguration in IPv6
* Their is NOTHING in IPv6 that negates a hardware firewall. You get a prefix routed to your 'router' it can have whatever allow or deny rules you like.
* If you want to use NAT and non-routable IPs for whatever reason, however misguided, there is nothing in IPv6 preventing you from doing so, see also FC00::/7 link-local addresses
* Whether a network is routed or switched has as little to do with IPv4 as it does with IPv6, these topology decisions have nothing to do with the protocol.

Comment Re:Not that big a deal... (Score 1) 213

That or replace your Windows file server with something trustworthy. ;)

Actually, I may have to claim ignorance here as I haven't looked into it recently, is there STILL no crypto available in SMB/CIFS traffic?

If not then perhaps IPSEC between your Windows servers and clients, it's a probably a hassle to setup, but it would give you another layer of security. I've never trusted wireless enough to do sensitive data transfers using non-secure protocols. Guess that's why I don't see this as a big deal. Just business as usual.

Slashdot Top Deals

Remember to say hello to your bank teller.

Working...