Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Obligatory BOFH reference (Score 1) 257

http://www.marginart.com/misc/bofh/13may98.html

"Managers are stack-based," I explain. "Rule one is that they have, at most, a two-item stack limit. Mention a technical term and they'll push it onto their mental stack. Mention another, they push that up there as well. Mention yet another and they stack overload and reboot. That is, they think about what they're going to do after work, how sore their bum is, whether the marketing assistant knows her blouse is almost see-through, and so forth."

Comment Re:Seems reasonable... (Score 2, Funny) 520

I don't know why you all are so confused. The contract is pretty unambiguous to me:

> megabytes sent or received
> using Mobile Web (including
> advertising) will be aggregated each month, rounded up to the next
> megabyte, and billed at
> $1.99/MB.
> Rates are rounded to the nearest whole megabyte. One megabyte is equal
> to 1024 kilobytes.

This would imply a charge of $0 in your case. It would also charge you $2 when rounding up to the whole megabyte.

Using my verizon math skills, I can see that adding these two charges together gives us $2 + 0 = $20.
It would appear that you managed to save a whole 18 cents.

Comment Re:Structured Stream Transport (Score 2, Interesting) 230

I definitely agree with you. In fact byte streams being a fundamental part of POSIX is one thing I love and make use of every day, for example piping output between programs/sockets. My post was not very clear, but I was trying to say that users developing application protocols should not be using BSD sockets directly any more--people usually write or use libraries for that sort of thing.

As far as new protocols go, you can build basically anything using UDP (and UDP is far less likely to be firewalled than any custom IP-level protocol you make up). I think such a protocol could only ever be practically implemented user-space library anyway

I would be curious what the article thinks is so fundamentally wrong with the sockets paradigm.

Comment Re:Structured Stream Transport (Score 1) 230

I honestly had never heard of SCTP before, and I'm surprised that it is not used more widely since it has been around since 2000. It looks to be more complicated than what I was talking about since it covers more issues (talking to multiple hosts). Do you happen to know of any uses of this protocol in real applications?

BSD Sockets themselves are very flexible, I suppose I was complaining about the read/write semantics in stream sockets. Either way, it is possible to layer protocols even at the application level so it's not a big deal. Sadly I didn't get a chance to read the article before acm.org died.

Comment Structured Stream Transport (Score 5, Informative) 230

BSD sockets have a limitation of only a single stream at a time (for example, if you are loading a website over HTTP and you get stuck loading a huge image, you have no choice but to open up another socket connection or else wait). They are also stuck around the paradigm of only supporting byte streams, which means that users are always forced to write the same code over and over to create packet headers or delimited messages.

I would highly recommend checking out Structured Stream Transport. I'm not from MIT and I wasn't entirely satisfied with their sample implementation, but the paper is really insightful and explains how you can develop basically a smarter version of TCP that is both more efficient and also more flexible. And I'm sure there are other systems being developed with similar ideas in mind.

We definitely need to keep bsd sockets, if not just because I'm a regular user of netcat :-p, and also because they are what allow the creation of more advanced protocols, but I don't think most applications should still be using such low-level protocols today.

The Internet

ARIN Letter Says Two More Years of IPv4 266

dew4au writes "A reader over at SANS Internet Storm Center pointed out a certified letter his organization received from ARIN. The letter notes that all IPv4 space will be depleted within two years and outlines new requirements for address applications. New submissions will require an attestation of accuracy from an organizational officer. It also advises organizations to start addressing publicly accessible assets with IPv6. Is ARIN hoping to scare companies into action with the specter of scarce resources? This may be what's needed to spur adoption since there appears to be no business case for IPv6 deployment."

Comment Re:sure it is (Score 1) 1079

3. I am seeking the issuance of a warrant to search for the following property (describe the property to be searched as particularly as possible):

"All objects capable of storing digital data in any form, including but not limited to central processing units, optical scanners, digital cameras, modems, routers, memory sticks, thumb or usb drives, firewalls, tapes, zip drive disks, digital video disks, printers, operating systems, application program disks, software, hardware, CD-ROMs, computer access codes, passwords and/or protocols, all manuals, books, brochures, all evidence of ownership"

Central Processing Units? Firewalls? Scanners? "Computer access codes"? Protocols? Brochures? Books (doesn't say even computer-related)??? They might as well take this guy's whole bloody house! I mean, what's to say that my toaster can't store digital data, or my oven, right?

Aside from "All objects capable of storing digital data in any form" not being very "particular", how can they even justify stealing half that stuff.

If I'm accused of using Linux, how can they have a right to take all books I own? To rip the CPUs off my computer motherboards? To boot up my computer to search for iptables rules? Are there no laws that specify when a search warrant is legal, and what is allowed to be searched?

How can Detective Kevin M. Christopher get away with signing this? I would hope that he's going to have to justify his motives in court.

Another funny, if not so sad line:

has also recently been the victim of a mass e-mailing to theBoston College community in which he is reported to be gay and coming out of the closet.

And that breaks which law exactly?

Comment Flash mail server (Score 4, Informative) 357

I had a 4GB FAT32 flash drive that I used as storage for a mail server attached to an OpenWRT router. It required renaming and deleting files all the time (every time it got an e-mail)--so I think it wore down pretty quickly.

One day, the storage for the flash drive stopped working (from one hour to the next, without being touched, the computer acted like I had just yanked the drive out)--it would be recognized but report a "no media in drive" error when you tried to access it, like an empty CD drive. In fact I think Windows would say "Insert CD" or "No disc in drive F"

Comment Re:Boring... (Score 2, Funny) 425

That's why they made GeNToo!

Finally you can get the best of both worlds! The Win32 subsystem is such a mess, the Linux kernel is a mess. Once you have the GNU tools on the NT kernel, you get a very solid OS that even rivals Solaris 10 in many respects.

It's only been compiling for just a bit over 4 years, so I'm hopeful. It's not like it has crashed or anything... no that wouldn't make any sense...

Comment Re:What the fuck? (Score 1) 222

At least in most sane Apache configs that I have used, the web root is one directory above the htdocs folder, so you can store php scripts and read/write to one directory above what is publicly accessible. (for example /www/mydomain.com/htdocs or /home/username/public_html).

Comment CrossCrypt (Score 1) 121

I've found that CrossCrypt is a really good solution--entirely open source--that works on any version of NT.

If you do not have a separate partition, CrossCrypt will also allow you to mount a file as a drive. This comes in really handy for mounting ISO images as well.

The only tricky bit is if you want to set your entire user profile directory (including registry) to the mounted partition, because this means that you would need to have to run the encryption before you login--probably requiring an administrator user. In my opinion, not worth it. Doing this correctly would probably require magic with a GINA, Service, Utility Manager script, or HKEY_USERS\.Default\ControlPanel\Desktop\SCRNSAVE.EXE

But if you just want to encrypt individual folders, it is simple to do manually using this. And also much more manageable since you don't need the folder decrypted all the time while you are logged in--you just decrypt it to load a document, and unmount the partition once you are finished.

Slashdot Top Deals

"May your future be limited only by your dreams." -- Christa McAuliffe

Working...