Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:BEHOLD! (Score 1) 313

Sure, there would be some content without ads, but it'd be limited to corporate-sponsored subconscious marketing endeavors, personal philanthropy, and whatever society can produce in its spare time after paying the bills.

History disagrees with you. The WWW in 1994, prior to serious commercialization, was not full of corporate-sponsored marketing endeavors. Perhaps you could describe the content of the web circa 1994 as 'whatever society can produce in its spare time after paying the bills', but I don't really think that's what you were getting at.

Comment Re:How much of the 'operating system' needs to sig (Score 1) 393

The last time I re-flashed my BIOS.

I've never updated the microcode on my hard drives though, so I guess you have a point.

On a side note, there was a hard drive that I lost due to problems with the power-saving routines in the hard drive controller. If I had known in advance the nature of the problem, the ability to reprogram the IO controller would have been nice.

Comment Re:How much of the 'operating system' needs to sig (Score 2) 393

Nobody is saying secure boot is an inherently bad idea that I see.

Secure boot is an inherently bad idea.

It flies in the face of the concept of the machine as a general-purpose reprogrammable computer.
General purpose means user control of all software right down to the firmware.

The line that secure boot is intended to protect against bad guys on the internet is a lie. The way to do that is to harden network connectivity & all applications that access the network.

The line that secure boot is there to protect against other attack vectors such as the insertion of a USB drive with a virus or a virus on a DVD is also a lie. Physical access is total access. The way to protect against these attack vectors is to physically secure the machine.

The intended target of secure boot is the user.

Comment Re:Ubuntu is dead to me (Score 1) 543

Debian stable (current codename squeeze) might fit the bill for you. I'm using it now.

To be fair, it can be kind of a bitch to set up. You need to do more work to configure proprietary drivers.
But once it's up, it's stable as hell. It uses gnome2 by default & since Debian has a long release cycle, it will be around for a while.

Hope this helps.

Comment Re:Yes, but other than that, how did you like it? (Score 1) 453

So, seven lowercase letters. And this guy thinks it's "not that weak".

First off, you're right, that password could be better. But brute forcing a password (even with access to the hash) is harder than most people on slashdot think (I think).

7 lowercase letters is
26^7 = 8,031,810,176 possible password combinations

A few years back, we wrote a brute force password cracker as an exercise in programming on a cluster. It was nothing fancy - no rainbow tables or anything. Just generate all the passwords, generate all the hashes, compare the hashes and look for a match.
We cracked a 5 character password using a 94 character alphabet. That's
94^5 = 7,339,040,224 possible password combinations, so in the same order of difficulty but just a touch easier than the 7 character password.

Brute forcing that 5 character password (again, with access to the hash) took around 11 hours with the parallel program running on 95 cores.
Brute forcing that 5 character password with John the Ripper (much more specialized than our program) on a single core machine took 11 days.

So all of this is possible (assuming you have access to the hash), but it is not trivial & it is not the case that a 7 character password affords no protection. [OK, OK, I should also mention that cracking time varies wildly depending upon the hashing algorithm that is employed]

I'm inclined to agree with the editor, that hotmail is just more hackable than gmail. Especially considering the fact that the hotmail account was used as a SSO tool for skydrive, xbox & the metro store, I'm guessing that somewhere along the web of interconnected services there was a weak link in the chain & Microsoft dropped their pants.

Comment Re:Completely irrelevent to me (Score 1) 285

I don't know why this is modded funny. How about informative instead? The parent's experiences in lodging bugs in launchpad against Ubuntu pretty much correspond with my own.

I don't want to rag on Ubuntu too much because I think they have done great things hardware auto-detection, proprietary driver install & generally advancing public acceptance of Linux on the desktop.

But the way they handle bugs can use improvement. The standard reply of 'does the problem still reproduce if you try it in version x+1?' is not good enough. Because Ubuntu is aggressive about building new features into new versions there is a ton of code churn. Even if the original problem disappears in version x+1, the code churn practically guarantees that a bunch of new bugs are introduced. It turns into a game of whack-a-mole where the overall quality of the Ubuntu OS tends to maintain a steady state or even decline as new versions are progressively introduced.

Fix your bugs in the version in which they are reported. If you don't like backporting that much code than reduce the scope of what you attempt in each release, reduce the code churn, spend more time testing & reduce the number of bugs that you introduce with each new version.

Just my 2 cents.

Comment The virtue of OSS (Score 3, Interesting) 482

Every comment I have seen has been on the social aspects of this incident. Let's talk about the software aspect of it

(from TFA)
"I used Stellar Phoenix recovery software for the first recovery, which has proven to be unable to recover large files in its entirety. I used PhotoRec for the second recovery, which did the job. PhotoRec has a steeper learning curve than Stellar Phoenix, but it’s free, unlike the former."

Score one for open source software. Better than the proprietary alternative in this case.

Comment Re:Nope (Score 1) 313

Someone please mod parent up.

I was going to mention Planescape Torment, but he beat me to it.

I do think that Jaffe has a point; a totally linear storyline can be detrimental to a game, as can unskippable cutscenes. But I think Jaffe goes too far & Torment is the perfect counter-argument to his claim. The entire game is driven by plot and storytelling, to such a degree that the storytelling IS the gameplay.

The other games mentioned by the parent provide alternative counter-arguments. Take System Shock 2; it is certainly not the most advanced FPS around, even at the time of its release. You don't play it for the mechanics, you play it for the atmosphere. Few games do such a good job of creeping you out, making chills run down your spine. The graphics, music and sound effects are part of this, of course; but on the whole they contribute about half to the chilling atmosphere of the game. The plot contributes the rest & the graphics and sound couldn't carry the game without it.

Comment Re:You get what you pay for (Score 2) 332

I'm not sure if I agree with you.

A couple of my old favorite games (Elder Scrolls IV: Oblivion & Warhammer 40,000 - Dawn of War: Dark Crusade) were sold without any DRM whatsoever and both were commercially successful. I guess Dark Crusade was more of a niche game, but Oblivion was a big hit, no 2 ways about it.

Interestingly, another sequel to Dark Crusade - Soulstorm was later published; Soulstorm included DRM and sold more poorly than its predecessor. There were other factors in play; personally, I think that Dark Crusade was a more well balanced game. But I do believe that there is not a direct correlation between DRM and increased sales.

Slashdot Top Deals

The hardest part of climbing the ladder of success is getting through the crowd at the bottom.

Working...