Forgot your password?
typodupeerror

Comment: Re:I don't understand how this is 'orchestrating' (Score 3, Interesting) 160

by squallbsr (#35894556) Attached to: Cisco Accused of Orchestrating Engineer's Arrest
The orchestrating part is where the evidence of the crime (required for the extradition) hasn't been sent to the Canadians yet. They've had 10 months to provide evidence of the crime, but have not been able to produce it. So, the civil case, which was getting close to going to a Jury trial, got settled because the guy got arrested. This is one heck of a coincidence.

Comment: Too much thermal compound (Score 1) 501

by squallbsr (#35560108) Attached to: 2011 MacBook Pros Confirmed To Crash Under Load
When iFixit did a tear down of the 2011 MacBook Pro, they found way too much thermal compound applied. I would be willing to bet that this is the primary cause of the crashes. See step 10 from their teardown guide: http://www.ifixit.com/Teardown/MacBook-Pro-15-Inch-Unibody-Early-2011-Teardown/4990/2

Comment: Re:It's easy to comply with the GPL (Score 1) 566

by squallbsr (#35236670) Attached to: Microsoft Bans Open Source From the Windows Market
The GPL goes beyond just the source code. There are clauses that prevent further restrictions on the licensed use of a program, there are licence grants that allow you to redistribute the binary form of the program (what was downloaded from the app store). You will not be able to do these things, the app store terms of use are going to have further restrictions on acceptable use of a program downloaded from the app store. GPL will be incompatible with the terms of the app store.

Comment: Re:someone, please explain this to me (Score 1) 566

by squallbsr (#35236218) Attached to: Microsoft Bans Open Source From the Windows Market

It isn't the source code redistribution or availability that is the problem with GPL on an app store.

From GPLv2:
You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form...

The app stores do not allow you to copy and distribute the Program in executable form, since they are wrapped up in DRM layers and I would bet there are also license verbiage that says you are not allowed to copy the apps downloaded from the app store. It is very easy to provide the distribution of source code for an app on the app store, you just point to a file on the internet, a phone number to call or an address to write to asking for the source.

Comment: Re:Attack Summary (Score 1) 220

by squallbsr (#35234620) Attached to: Anatomy of the HBGary Hack
No, collision vulnerabilities are for validating the contents of a file haven't changed using an MD5 hash. The reason you don't use MD5 hashing to store a 1-way hash of a password is that it is an extremely fast algorithm to compute - meaning it takes a lot less time to compute a rainbow table or brute force hashes in order to figure out the password.

We are Microsoft. Unix is irrelevant. Openness is futile. Prepare to be assimilated.

Working...