Forgot your password?
typodupeerror

Comment: Re:Matlab and a few games (Score 1) 222

by moyix (#44731713) Attached to: What percentage of the software you use regularly is open source?

What about your wireless router? The firmware in your car? Your smartphone? Hell, even MicroSD cards run an embedded OS on an ARM processor to handle bad block remapping and to make it easier to test the cards before they leave the factory.

If you want to stick strictly to your desktop PC, let's talk about the software running on your network card, GPU, SSD, hard drive (some hard drives even have serial ports that you can connect to and see terminal output!).

I guarantee you that you use a *lot* more computers every day than you realize, and the vast majority of them run proprietary software.

Comment: Re:That was rather pretty (Score 1) 291

by moyix (#30216422) Attached to: English Shell Code Could Make Security Harder

I also had a paper at this year's CCS conference, so perhaps I can shed some light on the process. The publisher had some fairly picky requirements for the PDFs, and warned that most PDFs created by (for example) pdflatex would probably not pass muster. So along with a PDF we had to submit a Postscript file so that they could distill it into a PDF that met their requirements if necessary. That's likely what happened here--the final Acrobat Distiller step was probably done by the publisher to make everything fit their publishing requirements.

Comment: Re:Vendor B ancient IOS (Score 1) 196

by moyix (#26951141) Attached to: How a Router's Missed Range Check Nearly Crashed the Internet

I believe this has been shown incorrect; from the article:

As it turns out, the reason for all those routing resets and general instability was due to a previously unknown Cisco bug involving AS paths close to 255 in length.

(emphasis mine). More info:

http://blog.ioshints.info/2009/02/oversized-as-paths-cisco-ios-bug.html

And the Cisco description (the bug ID, CSCsx73770, is linked in there, but you need a login to access it):

http://tools.cisco.com/security/center/viewAlert.x?alertId=17670

Comment: Re:This seems abrupt (Score 1) 856

by moyix (#26688951) Attached to: Windows 7 To Skip Straight To a Release Candidate

Last time I installed Ubuntu it still asked for a password for the normal user account. It asked for that same password when it needed to elevate privileges and perform some configuration command as root (via sudo).

So, you have a password, and if you need to you can get root-level privs, but the random everyday stuff you do doesn't have the potential to wipe out the whole OS.

Seems like a win-win to me, really.

Comment: Re:Rates (Score 0) 281

by moyix (#25361639) Attached to: University Tries "One iPhone Per Student"
The iPhone doesn't have support for Linux (no iTunes!), and since it (unlike previous incarnations of the iPod) doesn't function as a standard USB mass storage device, it's effectively useless on that platform. I agree that it's not limited to one, but it is limited to two.

Current workarounds involve jailbreaking your iPhone/iPod and then (I am not making this up) syncing files over SSH.
Image

Slashdot's Disagree Mail 264 Screenshot-sm

Posted by samzenpus
from the keep-your-cool dept.
In this week's Disagree Mail, I try to show the range of messages I get. It's not all angry or insane, sometimes it's sent to us for no apparent reason. We start off a little mad, slip into a whole bunch of crazy and finish with someone who has a complaint about racism at his favorite restaurant. Read below to get started.
Books

+ - The Entomology of Kafka->

Submitted by
moyix
moyix writes "Most people probably read Kafka's Metamorphosis in a high school or college lit course and know the story of Gregor Samsa turning into a giant bug man. But exactly what kind of giant bug man? A three part series of articles over at the Rogue Entomologist blog looks at Kafka's Metamorphosis from an entomological standpoint and tries to answer this question."
Link to Original Source
Books

+ - The Entomology of Kafka->

Submitted by
moyix
moyix writes "Most people probably read Kafka's Metamorphosis in a high school or college lit course and know the story of Gregor Samsa turning into a giant bug man. But exactly what kind of giant bug man? A three part series of articles over at the Rogue Entomologist blog looks at Kafka's Metamorphosis from an entomological standpoint and tries to answer this question."
Link to Original Source

Will Internet TV Crash the Internet? 267

Posted by CmdrTaco
from the or-just-jack-the-rates dept.
Stony Stevenson writes "Analyst groups and Cisco have come out saying that the internet is heading for a crash unless it increases its bandwidth capabilities which are being strangled by the increased use of Web TV. Stan Schatt, research director at ABI said: "Uploading bandwidth is going to have to increase, and the cable providers are going to get killed on bandwidth as HD programming becomes more commonplace." He added that the solution to the problem is to change to digital switching and move to IPTV. "They will be brought kicking and screaming into the 21st century," he said. Cisco weighed into the argument, adding that it had found American video websites currently transmit more data per month than the entire amount of traffic sent over the internet in 2000."
The Media

Blogs Are Eating Tech Media Alive 247

Posted by kdawson
from the wagging-the-dog dept.
Heinz writes with an article in Forbes on how advertising in tech media is drying up and going — where else? — into specialist blogs and Google. "Silicon Valley is booming again. But if you work in tech media, there's blood on the floor. Take Red Herring. It hung onto its offices after getting the eviction notice earlier this month. But gossip site Valleywag is breaking story after story not just on its beat — but about its woes. Meanwhile, bigger publications are hurting too: Time Warner's Business 2.0 saw ad pages drop 21.8% through March from the same period a year ago; PC Magazine's editor in chief walked out the door after ad pages fell 38.8% over the same period; and one-time online powerhouse CNET is reporting growing losses even as the companies it covers flourish. It may be happening in tech first, but there's no reason the same thing won't happen, eventually, in every media niche."
Security

+ - Damn Vulnerable Linux

Submitted by
Scott Ainslie Sutton
Scott Ainslie Sutton writes "Enterprise GNU/Linux Resource Linux.com have highlighted a newly created GNU/Linux distribution named Damn Vulnerable Linux, built upon Damn Small Linux. The distribution, headed by Thorsten Schneider, aims to deliver the Operating System in such a way that it allows Security Students first hand insight and hands on experience with Security issues within GNU/Linux in order to teach them protection and mitigation techniques The project's website describes the distribution as 'the most vulnerable, exploitable Operating System ever' and it's true, the developers have ensured that it contains outdated, ill-configured, flawed code and contains GNU/Linux 2.4 Kernel which is known to have many exploitable avenues in itself. Damn Vulnerable Linux's website can be viewed here."
Encryption

+ - Final AACS key found

Submitted by julie-h
julie-h (530222) writes "The PowerDVD AACS private key for playing Blu-Ray and HD-DVD's have been found. This was the last key needed. What does this mean? We don't have to sniff/snoop Volume IDs anymore. We can create a program that can decrypt (or play if you will) a disc without any need for WinDVD or PowerDVD. So no sniffing/extracting of keys anymore. And more over: it can work on all platforms... In other words: we can make our own independent, user friendly player (or decrypter)."

As the trials of life continue to take their toll, remember that there is always a future in Computer Maintenance. -- National Lampoon, "Deteriorata"

Working...