Forgot your password?
typodupeerror

Comment: Similar to the unpopular Answer (Score 1) 199

by PapaSmurph (#28508725) Attached to: Desktop As a Cellphone Extension?

I've been looking for something exactly like that, but for my Windows Vista notebook, that way, I can use my notebook mics and speakers as a hands free phone. HFP for Linux would be great, but not being much of a Microsoft code monkey, I doubt I could get it to work.

Patrick (thpdg (519053)), any ideas if the software for those dongles would work with the "HP Integrated Module with Bluetooth 2.0 Wireless Technology" in my notebook?

Anyone?

Anyone?

Comment: AF Standard Desktop Configuration (Score 5, Interesting) 507

by PapaSmurph (#27790805) Attached to: Microsoft Releases Super-Secure XP to US Air Force

While this was an interesting article, the XP and the Vista versions used by the USAF are the same ones used by the general public. The only differences are the security setting, the firewall configuration, and the user configuration. No one is an admin unless they need to be, and no normal day-to-day work is done in admin mode (same thing you do in Linux, no doubt).

I didn't know this article was going to be published, but when I found it, I was not surprised by the comments. I've been working on this program for more than 2 years. Users hate it. Developers loathe it. Network security staff loves it.

Nothing can make Windows (or any other OS) completely secure if it's connected to a network. This is as close as the federal government as ever come.

Comment: Re:Cyber Security is a job for the Airforce (Score 1) 90

by PapaSmurph (#27674617) Attached to: Pentagon Cyber-Command In the Works

OK, while I agree that cyber- anything has been over used, the Air Force has already stepped forward ahead of the other services to stand up a "Cyber Command". However, USSRATCOM has Cyber warfare and defense in its mission statement. A joint task force is the most likely form of any cyber-related activity, either offensive or defensive. The big problem is, how can you defend against something when it's already inside your walls? The Pentagon's networks have been infiltrated more times than I can count with bare feet and my pants down (more than 21). Not to mention DOE computers. All networks are vulnerable if they are connected to the Internet. No one service can do the entire job.

Comment: Technology Lag (Score 1) 576

by PapaSmurph (#27602039) Attached to: Why IT Won't Power Down PCs

I know from experience that, in the USAF at least, there is a technology lag WRT power savings. Too many old computers that won't wake-on-LAN, too many older servers that won't support Microsoft's SCCM (the new flavor of SMS). We are constantly dealing with computers not getting updated because they were powered off, making them more vulnerable than other computers on the network. And if PCs are put in "sleep" mode and will WOL, if the server isn't running SCCM, you can't send the WOL to wake them up before pushing patches.

It all comes down to this: you need to spend money to save money. The federal government mandated that all agencies use less energy, but they're all spending more than the savings to get there.

I think I missed something somewhere.

Businesses

+ - Becoming "The Man"?

Submitted by PapaSmurph
PapaSmurph (249554) writes "I've been working for "The Man" now for about 25 years in the IT field. I keep feeling it's time to strike off on my own and start my computer and network installation and maintenance business. I want to make a difference in my community and I want to make a decent living for my family. I know I would have to compete with the "big box" retailers out there like Best Buy's Geek Squad. I was wondering if anyone out there in /. land has made the move and had any suggestions for me."
Graphics

XPS Notebook Torn-Apart and Overclocked 24

Posted by Hemos
from the ripping-it-apart dept.
Pelly writes "For those who are interested in seeing the inner-workings of Dell's latest XPS M1710 flagship notebook, Hot Hardware has taken the time to rip the system apart and photograph the hardware for your viewing pleasure. In addition, there's some amusing overclocking attempts which utilize the sub-zero temperatures of New Hampshire's winter weather to provide an interesting spin on the review."
Wireless Networking

+ - People with WiFi surf more

Submitted by MC Gates
MC Gates (666) writes "A new study from the Pwer Internet & American Life Project shows that people who have WiFi at home spend more time online than those without. 'A survey of 798 Internet users found that 72 percent of wireless users check e-mail at least once a day, while only 63 percent of wired broadband users do so. The same pattern held true for reading news online, suggesting that wireless access offers "relentless connectivity" that might change a person's online behavior.' WiFi users also tend to be younger than the general 'net-using population, as they are concentrated between 18 and 49 years of age, instead of 30 to 64 like the general surfing public."
Programming

+ - Adobe Inviting Bloggers to Engage

Submitted by Anonymous Coward
An anonymous reader writes "Adobe is inviting a group of high profile bloggers and analysts to their campus in order to show off some of their customer's work. Companies like Brightcove, Scrybe, yourminis and some of Adobe's own projects will be demoed at the event. It's the best of the best using Adobe's technology. Ryan Stewart has a few things to look for the bloggers to talk about after seeing the demonstrations."
Security

+ - Tor Open to Attack

Submitted by Anonymous Coward
An anonymous reader writes "A group of researchers have written a paper that lays out an attacks against Tor, in enough detail to cause Roger Dingledine a fair amount of heartburn. The essential attacks are: Tor doesn't verify claims of uptime or bandwidth, allowing an attacker to advertise more than it need deliver, and thus draw traffic. If the attacker controls the entry and exit node and has decent clocks, then the attacker can link these together and trace someone through the network. Yowza!"

System checkpoint complete.

Working...