Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Slashdot Deals: Cyber Monday Sale! Courses ranging from coding to project management - all eLearning deals 25% off with coupon code "CYBERMONDAY25". ×

Comment Re:LXTerminal (Score 1) 352

Current versions of OS X use Menlo as the monospaced font in Terminal, it's better better than Monaco.

The OS X Terminal.app is one of the best, and simplest, terminals I've ever used. With telnet and ssh built in to the OS, and picocom available through MacPorts (and a number of other avenues) it pretty much has everything I need from a terminal.

So many terminals don't re-wrap the text on window resize (I can't believe this has only just come to CMD.EXE and Powershell in Windows 10) and the OS X terminal does this really well. There are plenty of theming options, including a reasonable approximation of the default Solaris terminal colours (Profiles > Man Page). And, if you want a transparent red cursor, it's easy to configure it that way...

Comment Re:Here's what you need to do (Score 1) 197

No, go the other way as high res as possible. Scaling in OS X on a Retina class screen is quite good. The default is to display @2x - 2x2 physical pixels is 1 "pixel" but you can scale up or down and it looks OK. On my 13" laptop, I run it at a resolution similar to a 15" and everything looks good. On a 27" desktop, you could happily run it at a lower resolution and everything will scale. Things like fonts etc are generally drawn at the native resolution, so they're sharp and crisp. If the app is retina-aware, UI elements are drawn properly, otherwise if not, they're scaled - but with a high-res display, the scaling isn't as much as an issue as if you're doing it at 72-100 dpi.

Comment Minor technicality... (Score 1) 54

With ransomware, like Cryptolocker, it doesn't generate the key and then send it to the C&C servers - the machine doing the encrypting (i.e. what was your machine before it got owned) never has the private key in it's possession. When it's ready to start encrypting, it contacts the C&C server. The C&C server generates a new private/public keypair and sends the public key to the owned machine. The owned machine then starts encrypting everything with the public key, and only the private key (that resides on the C&C server and nowhere else) is able to decrypt the files.

This means that even if you were monitoring all network traffic and you scour the memory and the disk, you will never see a copy of the private key needed to decrypt the files.

Anyway, I'm going off on a tangent here, this doesn't have much to do with TFA...

Comment Re:The real definition of "abuse" (Score 1) 330

but in terms of raw storage, a stack of 38 9.5mm tall 2.5" 2TB drives would only be 361mm

You think Microsoft is using "2.5" notebook hard drives" in its storage cloud?

A lot of enterprise storage actually uses small form factor (aka 2.5") hard drives because you can fit more drives in a chassis. Even in a lot of high-speed (10k and 15k rpm) 3.5" drives, the platters are not the full 3.5" size, they're more like a 2.5" platter in a 3.5" case.

Comment Re:Buy them Macs with AppleCare. (Score 2) 193

Yep, this. If they can handle just a screen then an iPad is pretty hard to break (software-wise).
If they need a full computer, get a Mac with AppleCare and One to One.
Have the Mac set up with Parental Controls to lock down some of the more confusing aspects of the machine (i.e., make sure the icons you need to stay in the Dock are absolutely going be in the Dock).

Comment Re:Break The NDA (Score 4, Informative) 366

What happened was that iFixit broke the NDA by posting the pics before the device was released. Apple then cancelled their developer account, which as they also used that developer account for their App, had the knock-on effect of pulling their app from the App Store


Comment Re:Vetting of apps? (Score 1) 246

I'm wondering how these apps made it through in the first place.

From what I've read - it was a trojaned version of Xcode that some developers have used and this has inserted malware into their otherwise apps.
Apple's scanning has now discovered it, although I don't know why it has taken them so long to pick it up.

Comment Printers, otherwise known in the industry as... (Score 1) 379

Printers, otherwise known in the industry as Toner Dispensers.
Manufacturers, especially Xerox, internally (and only half-jokingly) refer to printers as Toner Dispensers. It's where they make a massive amount of their revenue from.

Sure, when they're selling a printer for a price in the 10's of $k, they're not exactly making a loss, or only just breaking even on the hardware, there's still a decent amount of margin on this - but the ongoing revenue stream (and the reason they try to get everyone onto managed print services) is in selling toner, and lots of it.

Over the life of a printer (or copier, which is just a big printer with a scanner built into it) the cost of consumables will be far greater than the initial purchase price of the machine. Generally, toner is cheaper on bigger and more expensive printers (which in itself is strange as it's the same toner) - this is why if you're printing a large volume, you're better off getting a more expensive printer with cheaper toner.

Comment Re:Why not both? (Score 2) 239

AC has far lower transmission losses over long distances, however with the advent of rooftop solar now people can generate DC closer to where they're using it.
Converting AC to DC and DC to AC will always incur losses, and as AC is far more efficient for transmission, we've historically used AC everywhere (well, except inside just about everything you plug into an electrical outlet, where DC is generally used)

Comment Re:Pre-cambrian computing (Score 1) 191

I'll have to watch that docco - After using BBC micros and BBC Model B in primary school, and the Acorn Archimedes in high school, I've followed Arm with a bit of interest. Their rise and fall and then stratospheric rise again from the ashes is an incredible story. By sheer volume, there are probably more ARM cores on the planet than any other architecture - ARM was originally the Acorn RISC Machine and was an incredible processor architecture in it's day (and, through licensing to other fabs, still is pretty impressive for it's performance per watt)

You don't have to know how the computer works, just how to work the computer.