Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:So no iPod Touch refresh? (Score 2, Interesting) 770

I'm smack in the middle of the Philly metro area, and apparently, AT&T isn't offering coverage enough to suit the features of this phone to me either. Or NYC metro. Or anywhere in America, for that matter, at least for a while. MMS and tethering have been around for years and years, but one won't be ready at launch, and the other was totally glanced over and for now appears delayed without mention of availability time-frame.

Comment Re:Poor Open Source (Score 5, Insightful) 338

I've never seen the rules one should follow when releasing a device that might end up in millions of hands, but I'm sure they include the following:

1) Don't use an unstable hack to enable a feature that a very large percentage of potential users will be counting on.
2) Don't base a feature on a cat-and-mouse game. Especially with the likes of Apple, who are really good at that particular game.
3) Don't meddle in the affairs of a patent dragon, for thou art tasty and good with ketchup. Jobs was bragging about patents in the iPhone announcement keynote, for Christ sake.

Comment Re:Software vulnerabilities (Score 4, Insightful) 194

All that switching from RISC/PPC to x86_xx should change is "endianness." I hear passing worries of Intel chip-level vulnerabilities, but to my (admittedly limited to hitting up Google just now) knowledge is that these never really end up in mainstream exploits. Maybe, because there are plenty of much more easily exploitable vulnerabilities already known.

Again, not a security researcher or a system arch. expert myself, but what I've heard from those researching OS X vs. Windows vulnerabilities, Address Space Layout Randomization (ASLR) would make it much harder to exploit vulnerabilities on the Apple end. This feature appears to be slated for the next point release ("Snow Leopard") of Mac OS X. Essentially, the exploiter must try much harder to "find" the code planted in the target box's memory, when the vulnerability was exploited, in order to execute it.

Comment Re:WHAT? (Score 0) 508

It's so that when things happen, like a worm infection for example, they don't have to have a custom anti virus solution to take care of it. They can just use off the shelf Norton AV to clean up infections. Why spend precious tax dollars on a custom system when off the shelf stuff works even better?

And to me, it makes perfect sense to connect them to the internet, so that they can receive all the virus def. updates and WIndows patches as fast as possible.

Comment Re:Unbalanced? (Score 1) 64

Okay, both of those flaws you cite require user interaction. That doesn't constitute a "virus" or a "worm." That's a vulnerability. A vulnerability, I might add, never amounted to anything in the wild, and was patched quickly by Apple. Not an apologist, flaws are flaws are flaws. But they aren't viruses. The distinction is important.

Slashdot Top Deals

E = MC ** 2 +- 3db

Working...