Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Too bad it's still slow (Score 1) 57

The fennec process lingering happens only sometimes, I think it has to do with whether I'm running other apps, and because i closed it because it appeared to be hanging. I'll try to find a way to reliably reproduce it and file a bug when I do.

Luckily the phone gets pretty hot when fennec doesn't close properly, so I know something's up when it happens :p .

Comment Re:Zoom is STILL broken (Score 1) 57

Use the hardware volume keys to zoom in and out in increments.

Which pisses me off as I want to use those keys to change the volume (but this isn't just Firefox doing this, MicroB and the photo viewer use them as zoom buttons too).

I wish Mozilla implemented the swirl thing for the n900, though, but maybe Nokia patented it or something.

Comment Too bad it's still slow (Score 4, Interesting) 57

I've installed it on my n900, but it's unusably slow, especially compared to MicroB, which is the default browser on Maemo (which also uses the gecko engine). It takes ages to start up, uses up all the CPU, and it takes 5 minutes before you finally managed to load a page. Also, after you close the browser, there's a 'fennec' process still using all the CPU cycles and draining your battery.

Too bad, because I do like its feature set: Firefox sync, addons, etc, but I'll stick to MicroB until they find a solution to the CPU use issue.

Submission + - Firefox 3.5 Most Popular Browser In The World (statcounter.com) 1

gQuigs writes: According to StatCounter Global Statistics the most used browser version on the web is Firefox 3.5. Congrats to Mozilla (and the open web)!

But we can use this as a rallying call to do more. Let's Finish Off IE6 (remove the links to IE8 and Safari if you want, and maybe add one for Opera). And how many of you end up upgrading your family's browsers over the holidays? Good job keeping them safe, but bring everything you need this time on a USB stick, and then get back to enjoying the holidays.

Censorship

Submission + - Galilei was to be burned at the stake

orzetto writes: Italy's leading newspaper La Repubblica published today (Google translation) the original documents of the prosecution against Galileo Galilei, which are part of a large collection of documents related to Galilei's trial due to be released next month by the Vatican's Secret Archive.
According to these, it was Galilei's prosecutor himself, Cardinal Robert Bellarmine, who stated that Galilei was no heretic, even though his theories were. Galilei subsequently escaped the burning at the stake, and got away with a relatively mild sentence. Giordano Bruno, for similarly revolutionary astronomical theories—in his case, the existence of multiple planets—was sent to be burned at the stake by the same Cardinal Bellarmine: Bruno, however, did not recant.
Software

Submission + - EFF legal council abandons Shareaza case (pantheraproject.net) 1

An anonymous reader writes:

Shareaza's EFF appointed legal counsel has been paid off by Discordia and has abandoned the case. The legal counsel was "pro bono" (free) as the EFF (Electronic Frontier Foundation) asked Barbara Friedman's firm, Hanson Bridgett, to take on the case. It is unethical that she stops giving us counsel while we are in the MIDDLE of a settlement of getting the original domain back. However, I applaud the Electronic Frontier Foundation for helping us in the first place and continuing to help us through this difficult time. All donations to us and to them, are appreciated.

The Shareaza team is urging users to call Barbara L. Friedman (the FORMER Counsel) or to call the EFF and complain that the team urgently needs new council

Comment Re:Woah... (Score 1) 632

Why do you even need to prefetch images? I haven't needed to do that in years. If you use it for rollovers, look into using css sprites. If it's for some fancy javascript stuff, use the javascript image object. If it's something else, please share.

Security

Submission + - Mac, BSD prone to decade old attacks 7

BSDer writes: An Israeli security researcher published a paper few hours ago, detailing attacks against Mac, OpenBSD and other BSD-style operating systems. The attacks, says Amit Klein from Trusteer enable DNS cache poisoning, IP level traffic analysis, host detection, O/S fingerprinting and in some cases even TCP blind data injection. The irony is that OpenBSD boasted their protection mechanism against those exact attacks when a similar attack against the BIND DNS server was disclosed by the same researcher mid 2007. It seems now that OpenBSD may need to revisit their code and their statements. According to the researcher, another affected party, Apple, refused to commit to any fix timelines. It would be interesting to see their reaction now that this paper is public.
Hardware Hacking

Submission + - Ten Storage Strategies for the Home (extremetech.com)

ThinSkin writes: "Many computer users store data on their computers without a safety net, that is, without properly backing up important information onto an additional storage device. Loyd Case over at ExtremeTech has come up with ten storage strategies for keeping that crucial digital information safe in case of a hard drive failure, fire, and so forth. Some strategies are cheap or cost nothing (storing data online) while other methods will cost you some money, such as setting up a RAID or a NAS (network attached storage)."
The Courts

Submission + - RIAA's Sherman Attacks NewYorkCountryLawyer 4

Security

Submission + - Linux Network Access per User 1

Anonymous Coward writes: "I'd like to offer shell access to my users, but have been surprised at the lack of restrictions that I can place on them. Disk space quotas are trivial. But what about bandwidth quotas? What about allowing listening but not outgoing sockets, or perhaps the other way around? Disallowing net access for certain groups? I've found no way to do these things, and the 'ports over 1024' restriction for regular users simply doesn't cut it these days.

I should think that my users could be allowed to run their own server programs if so desired without being allowed to run rampant. It seems that I can either block >1024 incoming at the firewall, or let it be abused.

What would you do?"

Slashdot Top Deals

"And remember: Evil will always prevail, because Good is dumb." -- Spaceballs

Working...