Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Wha?!?!!! Yup, you betcha! (Score 1) 172

That's why most respectable Linux administrators don't run X on servers. Most of us just turn off that pesky GUI so that we can get work done.

I don't suppose M$ has some kind of command-line mode for their servers? Some sort of Disk Operating System which could be used to provide a runtime environment for applications and services without requiring the use of a large, resource-hogging graphical interface which (as has been pointed out) is a great place to find exploitable code.

It's proprietary code! Surely the vendor has the most noble and idealized motives in making sure their code's not merely good enough to sell, it's actually good, with highly trained and competent professionals dedicated to ensuring their customer's safety after they take the money.

Comment Secondary application: tracking pedophiles. (Score 1) 150

Some of the files in question may have been subject to change as they were moved from host to host, an analog to mutations in virii. By analyzing the 'mutations' in the image files, it may be possible to gain some insight into the paths the various iterations of the same image took before being found by law enforcement.

Slashdot Top Deals

Get hold of portable property. -- Charles Dickens, "Great Expectations"

Working...