Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Firewall through the Firewall? (Score 4, Funny) 146

I updated Firefox on my windows machine and the Windows firewall dialog popped up and asked me to allow Firefox. I declined it. but WTF?! Why would a browser need to open up ports? This seems like quite a security risk. Anyone else seen this?

Comment: ThinkPad alternative? (Score 1) 248

by davidshewitt (#49092793) Attached to: Lenovo Allegedly Installing "Superfish" Proxy Adware On New Computers

I used to be a big fan of Lenovo's Thinkpads but the quality (and keyboard) has gone downhill in recent models. Preinstalling malware is the final deal-breaker (The TFS says it was to consumer-grade machines, but doing this is a serious breach of trust).

Does anyone recommend a good enterprise-grade laptop? Something like the T400 but with a Haswell chip?

Comment: Can it be rooted easily? (Score 2) 120

cat | ./post-to-slashdot END_OF_RANT

Can the bootloader be unlocked? It seems that any non-nexus devices can only be rooted through running some sort of security exploit against the running OS, which only gets you control over that OS and doesn't let you easily load a new OS.

I'd like to see a device where not only the bootloader is unlocked, but it lets you set your own signing key, re-lock it, and then only boot images you sign. I know this will not be the case for mainstream devices, but I hope there will be a market for such devices among the geek crowd.

END_OF_RANT

Comment: Re:Less static hardware. (Score 1) 993

It may be a while before the hardware becomes available, but thinking ahead even further, wouldn't it be awesome if you could replace a DIMM or a CPU without shutting down the machine? For really critical servers, this might be a good option to have at some point. It would be quite a challenge to implement something like this since the CPU and memory are so integral to the machine but it doesn't mean it can't be done.

Comment: Re:More (Score 1) 150

I think that fines should be a percentage of the company's total profit instead of a fixed dollar amount. That way, no matter how big or small the company is, if they commit a crime, they are punished in proportion to the severity of the crime. Any company being fined 20%-30% of their profit will think twice before pulling shit like this. The shareholders will make sure of it.

Comment: Re:Lock argument doesn't hold (Score 1) 174

by davidshewitt (#45624081) Attached to: FSF Responds To Microsoft's Privacy and Encryption Announcement
Pin tumbler locks are actually very simple devices. They're quite easy to disassemble. You can physically inspect the pins and see that there are only regular bottom pins (no master pins). That being said, they're extremely easy to pick. I saw a locksmith pick one (the kind you find on your front door) in seconds with a pick gun (it "bounces" the pins to the shear line). On a separate note, I'm posting this purely for technical interest (/. is news for nerds after all). I do agree with your argument, technical reasons aside. People have to trust professionals in subjects they're unfamiliar with, and some of those people, because they're people, will violate that trust.

Comment: Keep your smart TV dumb (Score 1) 166

I just got a smart TV, but I've left it entirely disconnected from the network. I connected a Debian box running XBMC to it. I trust that machine far more than whatever is running on the smart TV. The rule for my trusted network is: if I don't have root, it's not trusted. And root is a necessary, but not sufficient condition for trust. For example, my Kindle is rooted, but I still don't entirely trust it since Amazon still has remote control over it.

Comment: Re: Holy crap! (Score 1) 1109

Also, remember that in a city, you can't legally take your gun into most stores or offices. If you illegally take it in, you are subject to a felony and loss of your CCW permit.

Which city/cities are you talking about? Private businesses have to post a no-gun sign in order to prohibit lawful concealed carry on their premises, and illegally carrying into one of these businesses is usually treated as a matter of criminal trespassing - a misdemeanor (although you'll still lose your CCW permit). Government buildings are a different story - federal buildings are always felonies, although state buildings can differ (e.g. Ohio-> felony, Oregon-> OK w/ permit).

The rest of your comment is excellent advice for future CCW holders. For anyone with a CCW, always remind yourself of your responsibility every time you put on your weapon.

Comment: Re:Banking passwords are overrated (Score 1) 195

by davidshewitt (#42874541) Attached to: Everything You Know About Password-Stealing Is Wrong
Setting a good password on your PC to protect the personal information on it is useless unless you also have full disk encryption. Unless you've enabled some form of remote access, the password to your home PC is useless to a remote hacker. The best practice for securing the personal info on your PC is to keep it in a secure location (i.e. your house). If the PC leaves your house, encrypt it. If someone's physically broken in, you have bigger issues to worry about.

Comment: Re:So tablets at PCs now? (Score 1) 577

by davidshewitt (#42828023) Attached to: Apple Now the Top PC Vendor, For Some Values of PC

I have a Kindle paperwhite (a "normal" kindle). I have rooted it, and I am able to ssh into it. It runs Linux:
[root@kindle root]# uname -r
2.6.31-rt11-lab126

It looks like it has most of the GNU stuff, so in that sense it is more familiar than Android.

I'm not disagreeing with you - it's a device built for a single purpose. It just uses a general computer to do so.

Q: How many IBM CPU's does it take to execute a job? A: Four; three to hold it down, and one to rip its head off.

Working...