Forgot your password?

Comment: Re:Win modem (Score 1) 286

by Spyder (#43675159) Attached to: WD Explains Its Windows-Only Software-Based SSHD Tech

If it works that way than it's likely that the blocks form a file will all be contained on the same volume (all of a file will be on the SSD or the HD, but not both). In that case, normal forensics of the volume would work as expected. It depends on how the file allocation tables are written, but it's possible that the volume might be mountable by a linux system.

Here's an approach that would be possible:

  - All files are contained on the HDD
  - Highly accessed files are copied to the SSD
  - The file table on the HDD is marked to say "this file is at that block on the SSD - go read it there"
  - If a marked file is written to, then both the HDD and the SSD copy are written to
  - There'd probably be some coordination magic, such as the versions on the SSD are checksumed against the versions on the HDD on boot, and the HDD ones take precedence - that way you could fix something off line and it would still work.

If the object is to keep highly read files on the SSD because of the seek and access time advantage, then this approach would do that without killing your ability to work on the filesystem offline. This assumes that we only want to use the SSD for caching files to be read, which is reasonable, as writes to SSDs are slower and are where the wear issues are.

Frankly we won't know what the limitations are until we do forensic examination of the volumes handled by the driver.

Comment: Re:Surprised this isn't regulated more closely (Score 4, Insightful) 194

by Spyder (#40208563) Attached to: Microsoft Certificate Was Used To Sign Flame Malware

Stuxnet was signed by stolen certificates: . it's possible that Flamer was signed by compromised certificates, but if we believe that Stuxnet and Duqu were the products of a nation state level actor then we could conclude that Flamer is in the same category.

Comment: Is it the meds or is it selection bias? (Score 1) 377

by Spyder (#39064157) Attached to: Antibiotics Are Useless In Treating Most Sinus Infections

I get infections an average of once a year. About 2/3s of the time I can fight them off with a combination of rest, sinus irrigation, and antihistamines. When that fails, I do not get better without a course of antibiotics. I have waited weeks to months before going to the doctor for the prescription. In my case I strongly doubt that it's a placebo effect.

This leads me to ask if the problem is one of selection, meaning that maybe doctors are either writing prescriptions too soon or they need another data point to make an accurate diagnosis.

Comment: Re:Making a mistake (Score 2) 532

by Spyder (#38373948) Attached to: Nokia Exec: Young People Fed Up With iPhone and Android

The enterprise mobile email system really needs to move to an app. Fewer folks and fewer companies want to deal with a work issued phone. We need an app for all of the smartphone platforms that keeps the mail store encrypted and authentication credentials at rest. It also needs an infrastructure that supports remote wiping of the app's authentication and user data. We no longer need to run the hardware side for mobile enterprise mail and sticking to that model is just making RIM's biggest problem over again.

There are hard parts to solving a lot of expected functions, like how do you keep the authentication information secure and do automatic email pulls or how to keep the user data secure and still do calendar reminders.

Comment: Re:Bottom of the barrel (Score 1) 283

by Spyder (#36364946) Attached to: How To Succeed In IT Without Really Trying

My success rate with Cisco's TAC is 5%. They have solved my problem before I solved it myself, worked around it, or went with another solution. So far, for me they're 2 for 40. Their documentation is generally quite comprehensive though. The site search has never been very good, so I find it best to google using ''.

Comment: Re:Not sure you understand supply and demand (Score 2) 607

by Spyder (#36086904) Attached to: Ask Slashdot: Is It Time For SyFy To Go Premium?

It's a question of price discrimination. In a broadcast free-to-view environment that is ad supported, you are required to seek as many viewers as possible. If your high desire viewers (the ones that will pay) are willing to pay 10x the rate of ad dollars, you only need to attract 10% of the audience. That might even be better than break even, first because your audience will likely be more loyal, and second with a shift toward quality the income from rebroadcast licensing may increase (you can sell DVDs or get Netflix/Amazon to pay you to stream BSG, but not The Jumping of Sharktopus (in 3D)).

It would be a high risk strategy in today's world. We are just beginning to test what people will pay for long tail content, and how it needs to be distributed.

Comment: Re:A broken clock is right twice a day (Score 2) 197

by Spyder (#36042384) Attached to: Linus on Linux, 20 Years In

I resist the implication that commercial software is, in general, well engineered. I'm not going to claim that the "many eyes" concept always, or even usually, lives up to it's billing; but in several high profile projects the FOSS system has resulted in some of the highest quality and most widely deployed applications and services in world. The market challenge that many projects have represented have motivated vendors to improve in way they claimed were impossible.

A very short list off the top of my head:

the collective GNU utilities

I apologize for feeding the trolls.

Comment: Re:Stole from the company? (Score 1) 113

by Spyder (#34940980) Attached to: Hackers Respond To Help Wanted Ads With Malware

Based on the fact that HR has access to company accounts, the businesses targeted/affected are probably 1 person does all the management functions. Most banks I've seen use the same authentication for small businesses as personal accounts. If they have a PIN/keypad or a rotating authentication question, then a straight credential capture isn't easy. Unfortunately, while those measures are common, they aren't universal. This might also be a cross site request forgery (XSRF) attack, which would be prevented or at least mitigated by re-authenticating for each transaction. But again, if these are small businesses using the same essential security measures as personal accounts, transactional re-authentication isn't a common feature of those types of accounts.

Comment: Re:Commoditization (Score 1) 408

by Spyder (#34486978) Attached to: Ex-Sun CEO Warns Oracle of Death By Open Source

Yeah, but if he can get twice the array for less than he can build a mirrored striped array for less than the price of striped array w/ parity of the same size. It depends on what exactly you're comparing, but if you're just looking at the redundancy features of ZFS building a better array and letting the RAID controller handle it is at best marginally worse than using the Sun solution. If on the other hand you want to use some of the other kung-fu of ZFS like the NFS integration, then the cost benefit calculus changes. The point is that, if your needs could be reduced to commodity hardware, Sun always lost badly on price.

Comment: Adobe's flash player is evil. (Score 5, Insightful) 483

by Spyder (#33279442) Attached to: Six Reasons Why Flash Isn't Going Away

I knew Flash had a certain air of suck about it because of some of the security issues. Then I went to FX's talk at BlackHat US 2010. He released a tool (Blitzableiter, that essentially does all the file validation for SWF files that Adobe's Flash player Completely Fails at. I think that maybe I would feel a lot better about Adobe's position if they didn't still have, after just about 10 years, a giant kludge job that they expect us all to freely install in our browsers.

Comment: Re:Maybe missing the point (Score 2, Interesting) 263

by Spyder (#32827198) Attached to: SSDs vs. Hard Drives In Value Comparison

Actually, I just built a low voltage ultra-portable notebook using an X25-V (CULV CPU, no optical drive, 8+ hour battery life). I'm running Linux, so my OS load is under 3Gb right now, so a typical quarter to half terabyte drive seems like overkill for a system that only runs productivity apps. I haven't done much battery benchmarking thus far, but the reduction in disk access times has been tangible. For example, even using a low power CPU, my boot times are under 15s to the log in screen.

Your setup is a good one, mine is just one that uses an SSD as the sole drive.

"I'm not afraid of dying, I just don't want to be there when it happens." -- Woody Allen