Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Comment Re:Try and make an OS that viruses couldn't target (Score 2) 484 484

I'd add the ability to run Windows binaries in emulators, but they can't access other programs than themselves. If that was a problem, add a phantom disk image so it could see other files that you place in the phantom disk image. Imagine each Windows emulated program saw their own personal c:/ , and it and you can populate it with files.

So... Wine with a new WINEPREFIX for each program?

I figure if the software you download can't get out of the Windows emulator or its own personal filesystem, it can't mess with your OS or the rest of your filesystem. If it can't record your keystrokes unless you have the window actively open, a keylogger can't get you either. The problem is that we probably don't have perfect Windows emulation. Another problem is you have to be able to trust your drivers or that is a possible vector to an attack.

Run Wine in a Docker image? That's pretty well-sandboxed. and easy to set up.

Comment Re:Unspecified or undefined behaviors (Score 1) 172 172

Wine is a compatibility layer for Windows applications. It must emulate all of Windows' bugs and undefined behavior to the best possible extent, even containing a whole bunch of case statements to change its behavior when different versions of Windows are set via winecfg (not unlike Windows' own compatibility mode, which tends to just have every version of every DLL ever in WinSxS to solve the problem...).

To Wine, Windows bugs are features, and applications depend on them. Maybe it will never be perfect, but Wine's philosophy is basically "If it works in Windows, it should work in Wine" -- even if that comes down to an application running in Windows 95 but not later versions, Wine will try its best to keep that Windows 95 app running, even if you have to set the Windows version to 95 via winecfg. If the app doesn't run, it is a Wine bug.

Comment Re:Sounds like someone is getting old... (Score 1) 716 716

It still does, so long as you're selective of the software you run on it. You could run a totally modern kernel and (or Wayland) on an original Pentium with 32MB of RAM, but in no way should you expect to run GNOME or LibreOffice or Chrome or Firefox on it, at least not without glacial loading times.

But more frequently, PCs from 10-15 years ago still in service just aren't that starved on resources anymore. They'll chug along slowly, but they can still get the job done, and nobody is really surprised when they're capable of it. Hell, if you have half a gig of RAM, you can probably still run full GNOME and LibreOffice and all without major issues.

Submission + - Groupon infringes GNOME trademark, project seeks donations for legal battle 1 1

Drinking Bleach writes: Groupon has released a tablet-based point of sale system called Gnome, despite the well-known desktop environment's existence and trademark status. This is also not without Groupon's internal ignorance of the GNOME project; they were contacted about the infringement and flatly refused to change the name of their own product, in addition to filing many new patent applications for theirs.

The GNOME project is seeking donations to help them in a legal battle against these trademark applications, and to get Groupon to stop using their name. They are seeking at least $80,000 to challenge a first set of ten trademark applications from Groupon, out of 28 applications that have been filed.

Comment Re:Are you sure? (Score 1) 863 863

It's worth noting that systemd's NTP and DHCP implementations are purposefully as simplistic as possible. The NTP daemon (systemd-timesyncd) is only a client that keeps a clock synchronized to a server, it cannot behave as a server itself. The DHCP daemon (systemd-networkd) is meant only to handle a wired network connection on a single interface, the sort of thing that a server or maybe a desktop computer would want; more complicated network setups can ignore this functionality and use any number of the pre-existing network configuration methods Linux already had.

Real programmers don't bring brown-bag lunches. If the vending machine doesn't sell it, they don't eat it. Vending machines don't sell quiche.