Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment: Re:Back end (Score 1) 77

by pe1rxq (#49535317) Attached to: GCC 5.1 Released

Unless your build environment is really broken (or you have a seriously a-typicall code base) compile time should not matter nearly as much as the resulting code. Don't forget that the resulting code has a big impact on the test phase of your cycle.

Normally during the edit phase you only touch part of a codebase, and proper dependency tracking should result in only a small part of it being rebuild and linked.
Proper dependency handling is not a job of the compiler.
LInking is also not the job of the compiler. (And untill lld is mature enough llvm and gcc use the same one anyway, and even then it still has to prove itself)

Comment: Re:How about basic security? (Score 3, Informative) 389

by pe1rxq (#49515543) Attached to: Why the Journey To IPv6 Is Still the Road Less Traveled

Filtering out nmap to places you don't want it to go is EXACTLY what a firewall is for.
And your IPX comparison is also flawed. You don't need to use your MAC address, that is just one way of generating an IPv6 address. And being able to address a packet to any node on the internet directly is exactly how the internet was suposed to work. (Note that a firewall may still prevent such packet from ariving unwanted).

Comment: Re:How about basic security? (Score 1) 389

by pe1rxq (#49515363) Attached to: Why the Journey To IPv6 Is Still the Road Less Traveled

2: Attackers can view your entire IP space. A simple nmap scan, then choosing what zero days to use... instant pwn-ership.

Bullshit. Just use a firewall the proper way and stop using crap.
If your machines are that vulnerable you are already screwed. Hiding behind NAT and thinking you are safe is a joke.

Comment: Re:He tried patenting it... (Score 1) 986

Or he found a way to sneak in energy without the researchers knowing it.
The problem is that there is still no credible known mechanism for producing or storing it inside the box.

The opinion "Doesn't work" is still valid, but after this one should atleast acknowledge that it is at the very least an ingenious hoax....

Comment: Re: What?? (Score 1) 116

by pe1rxq (#46833165) Attached to: WhatsApp Is Well On Its Way To A Billion Users

You might want to checkout QuickMSG (Disclaimer: I wrote it and this is a shameless plug). http://quickmsg.vreeken.net/
It is open source, decentralized, secure, and not tied to a phone number since it uses email as a transport medium.
Right now I only have an android app and a command line version for linux (I can only do so much at a time), but the protocol is completly open. Basicly PGPmime with a messaging format on top.

Comment: Re:Brain damaged project (Score 3, Insightful) 134

by pe1rxq (#46534395) Attached to: GNU C Library Alternative Musl Libc Hits 1.0 Milestone

Have you ever looked at static linking in detail?
A .a file is basicly a collection of .o files. The linker only links those that are needed.
So they have a single .a file instead of two or more .a files. This allows them to prevent difficult interdepencies between those .a files.
The end result might still be a very small subset of the complete library.

Comment: Re:RMS needs to get over the GPL (Score 1) 279

by pe1rxq (#46199357) Attached to: LLVM & GCC Compiler Developers To Begin Collaborating

You are trying to sell the wrong thing.
Software is not scarce, the only way to sell it like it is scarce is by artificially making it so. That is what closed source software (or like you mentioned patents) do.

Making mony with GPL licensed code is not that hard, (many others are doing it), but you have to sell the thing that is truly scarce: Your time and knowledge.
Have them pay you to make it or improve it, or sell support.

If it happens once, it's a bug. If it happens twice, it's a feature. If it happens more than twice, it's a design philosophy.

Working...