Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:When will MS learn (Score 3, Insightful) 581

How many processes have you seen complain that they are out of address space with only 4GB?

This first came up for me a couple years ago running Stalker: Shadow of Chernobyl, a mainstream Windows video game. The default Windows user address space limit on a 32 bit system is 2 gigs and Stalker wanted to use about 1700 megs of RAM. Problem is, video memory is also mapped into the user address space and I had a 512 meg video card.

In that case i was able to fix the problem by using a tool to hack the binary to make Windows give 3 gigs to the user process instead of the default of 2 gigs (the OS needs to keep a big chunk of address space for the kernel).

In any case, the moral of the story is that 32 bit address spaces have been cramped - for common applications, in practice - for a while now. Any application using more than a gig of RAM would be better off on a 64-bit machine. It's possible to work around this with silly hacks, and there's a lot of that going on, but it won't be too long before 32-bit users are a small enough minority to ignore for RAM-intensive apps.

Comment GPG is installed on every Ubuntu/Debian system (Score 2, Informative) 500

GNU Privacy Guard is part of the default install of Ubuntu / Debian because it's used to validate the digital signatures of .deb packages before they are installed. It can easily be used for pass-phrase file encryption with the "-c" option. If you run "gpg -c some_file" it will prompt you for a passphrase and spit out an encrypted some_file.gpg. If you then run "gpg some_file.gpg" it'll prompt you for the passphrase and recreate the origional some_file.

There are various reasons why this doesn't perfectly accomplish the goal described, but the fact that many Linux systems have user-accessible strong crypto functionality installed as an integral element of the system is definitely relevant to the topic at hand.

Comment Re:Eh? (Score 1) 179

Ok. I'll back off from the "any" claim for a moment and focus entirely on SSH/SSL. Any host running one of those protocols is regenerating keys on a regular basis in such a way that farming it out to a dedicated machine doesn't make much sense.

Comment Re:Ad disability (Score 1) 847

A particularly good film on the subject (which raises some interesting things to think about) is GATTACA. For those of you who haven't seen it, I would highly recommend it. (Kudos to OP for mentioning, too.)

GATTACA successfully raises some questions, but only manages to express the generic anti-progress knee-jerk rather than actually covering the real issues in any depth. Almost all the problems in the movie would have been solved by simple genetic privacy law; it's easy to make ponies, rainbows, and butterflies seem sinister if you set them in an Orwellian future.

Comment Re:Shouldn't happen..... (Score 1) 262

The air waves are a public good and to avoid the "tragedy of the commons" it needs to be regulated, because we learned the hard way as the commons were already figuratively overgrazed.

That makes sense, as long as you're completely ignorant of physics and modern radio technology. Minimal regulation - even just a total transmission power cap - would be more than sufficient to avoid interference as long as the technology was given a little while to shake itself out.

Comment That's great (Score 2, Insightful) 181

What should happen: The Supreme Court rules against business method patents and manages to eliminate software patents entirely at the same time.

What will happen: The Supreme Court rules in support of business method patents and redefines "prior art" to mean "other US patents that haven't yet expired" at the same time. Lawyers rush to patent levers, gears, buttons (electrical, mechanical, and on clothing), etc.

Slashdot Top Deals

Reality must take precedence over public relations, for Mother Nature cannot be fooled. -- R.P. Feynman

Working...