Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Eurocopter / Airbus X3 (Score 1) 103

It's more like the Sikorsky X2. The dual rotors are an important feature; With a single rotor as you increase forward speed you lose lift on one side of the rotor as it slower relative airspeed, until it's basically going backwards. Having contra-rotating rotors means that one side will always have blades going "forwards" regardless of airspeed.

Comment Is it really a single board computer? (Score 1) 122

Is it really a single board computer, if the SoC is on a separate board?

Looks more like a mini, more powerful version of the Raspberry Pi Compute Module with a Raspberry Pi like breakout board.

Those SoC modules themselves could be useful on their own if they sell the sockets to use on custom circuit boards...

Comment Re:Computers were conceived to execute user comman (Score 1) 215

I have no idea what the solution is, but I suspect that we need to do some fundamental rethinking of secure architectures and user interfaces. Architectures need to more safely isolate data and logical functionality, and interfaces need to more safely mediate users interaction with devices. I confidently assert that the current architectures simply can't be secured, no matter how much junk is kludged to the task. Prove me wrong, please.

On the other hand this specific issue could be easily solved by * prefixing all filenames with ./

So far I've not heard of anything that would break, and it's silly arguing that this specific problem is part of required functionality and not something that can/should be fixed when it appears to have such a simple solution.

Comment Re:Sanitize crazyness (Score 1) 215

The problem is that the * expansion is done by the shell, and the shell doesn't know the difference between file names and arguments.

But it could very easily make them explicit filenames by prefixing them with ./, and I can't think of anything that would break.

Comment Re:Computers were conceived to execute user comman (Score 1) 215

If computers were conceived to execute user commands, then why is a command for matching file and dictionary names returning them in such a form that they become executable parameters, when they could easily be explicit filenames by adding ./ at the beginning?

Is making what should be basic and safe housekeeping functions like chmod * and tar * dangerous really something you actually want in Linux?

Comment Re:Definition of idiot (Score 1) 215

Right, so an admin tarballing the content of a user's folder is an idiot because he didn't check to make sure the shell he was using wouldn't pass any of the file names as executable attributes instead of, you know, file names?

The one line summary for this story is bad things happen to people who use a command without knowing what the command does.

The definition of the unix wildcard when used in the shell is:

"The character * is a wildcard and matches zero or more character(s) in a file (or directory) name."

Note that the definition doesn't include anything about translate filenames into other kinds of executable parameters.

Comment Who ever asked for this "feature" (Score 1) 215

Probably because anybody who's used the various Bourne-style shells for a while
considers it a feature, not a bug. This is a case where the Principle of Least
Surprise comes up with different answers for novice users and for experts:
"What? A * can expand into an unintended command argument?" "Yeah, what *else*
would it do - the shell is just globbing, it doesn't know for sure what the
command will do with the parameter".

Who asked for this feature? Can anyone give me a legitimate use case for "tar cf archive.tar *" evaluating as

tar cf archive.tar admin.php ado.php --checkpoint=1 "--checkpoint-action=exec=sh shell.sh"

instead of

tar cf archive.tar "./admin.php" "./ado.php" "./--checkpoint=1" "./--checkpoint-action=exec=sh shell.sh"

Slashdot Top Deals

Work is the crab grass in the lawn of life. -- Schulz

Working...