Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Note: You can take 10% off all Slashdot Deals with coupon code "slashdot10off." ×

Comment Long time reader firsttime slashvertisement whiner (Score 1) 142

"Its Hopper digital video recorder can record and store prime-time content from the four major networks for up to eight days. And the Autohop feature lets viewers skip advertisements completely — rather than fast-forwarding through them — at the press of a button."

Okay, half of that is relevant, the other half (hell, the whole thing) feels like it's pulled straight from the ads for it.

Ironic, no?

Comment Re:To match Windows 8... (Score 1) 249

This. A million times this.

I work a small startup MSP maintaining the networks for several small businesses. There are two of us. My average work day will have me dealing with everything from Exchange 2003 on Server '03 up to everything on an SBS 2011, with SQL, Sharepoint, and about 30 client specific apps (medical, CRMs, etc) in between. I honestly don't have the time to memorize Powershell. I know it's important, and it's something I'm working on, but when I sit down at the first machine running Exchange '07 that I've seen in 4 months, I don't have time to remember which cmdlets exist and what they are and how to syntax them, so I just open the GUI and hope I can get what I need done without googling the shell commands.

Is this ideal? No. Is it practical? Absolutely.

Comment Re:Just sign your bootloader... (Score 1) 521

Well, duh. The whole idea of Secure Boot is to prevent malware from compromising your boot loader. How? By preventing software from interfering.

Honestly, anyone loading Linux themselves should be more than capable of going into the UEFI setup and flipping it to off. If they're not, then god help them when they try to actually install Linux (and find drivers, etc).

Comment Re:Just sign your bootloader... (Score 1) 521

Except they can just turn off SecureBoot

As posted above, from: http://msdn.microsoft.com/en-US/library/windows/hardware/jj128256

  Mandatory. Enable/Disable Secure Boot. On non-ARM systems, it is required to implement the ability to disable Secure Boot via firmware setup. A physically present user must be allowed to disable Secure Boot via firmware setup without possession of PKpriv. A Windows Server may also disable Secure Boot remotely using a strongly authenticated (preferably public-key based) out-of-band management connection, such as to a baseboard management controller or service processor. Programmatic disabling of Secure Boot either during Boot Services or after exiting EFI Boot Services MUST NOT be possible. Disabling Secure Boot must not be possible on ARM systems.

Do your research before you condemn, please.

Comment Re:Flash the BIOS (Score 1) 521

As posted above by an Anon, from: http://msdn.microsoft.com/en-US/library/windows/hardware/jj128256

  Mandatory. Enable/Disable Secure Boot. On non-ARM systems, it is required to implement the ability to disable Secure Boot via firmware setup. A physically present user must be allowed to disable Secure Boot via firmware setup without possession of PKpriv. A Windows Server may also disable Secure Boot remotely using a strongly authenticated (preferably public-key based) out-of-band management connection, such as to a baseboard management controller or service processor. Programmatic disabling of Secure Boot either during Boot Services or after exiting EFI Boot Services MUST NOT be possible. Disabling Secure Boot must not be possible on ARM systems.

I don't think there's much to have "play out." Just turn it off if you don't like it.

Our OS who art in CPU, UNIX be thy name. Thy programs run, thy syscalls done, In kernel as it is in user!

Working...