Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Social widget filled monstrosities (Score 1) 118

If today's phones had to put up with the web of eight years ago, that'd be one thing. But eight years ago, you didn't expect your desktop to render the CSS3, AJAX, and social widget filled monstrosities that are 2013 web sites. Eight years ago, webmasters expected some of their PC viewers to be on dial-up and their few (if any) phone users to be on something like WAP. This meant the average download size of all items on a web page was far smaller than it is today.

Comment Re:Problems with verifying the binaries from sourc (Score 1) 311

I have recompiled all my software from the source code and verified that the binaries match

How many different compilers did you use? Did you try any cross-compilers, such as compilers on Linux/ARM that target Windows/x86 or vice versa?

How did Ken Thompson get into my system

See bunratty's comment.

and how do I get rid of him?

See replies to bunratty's comment.

Comment Programs to "cheat" on homework (Score 1) 117

Basically if you aren't teaching them to make games or something internet related then you are wasting your time.

When I was in high school, I managed to expose a bunch of classmates to TI-83 graphing calculator programming when I showed them how to load programs that run the formulas seen in unit conversion problems, stoichiometry, and the like. Tie the programming assignments in to the rest of the curriculum and you'll get the point across that computers are tools to automate things.

according to the rules you must teach the students the only approved language: Pascal.

Why can't Free Pascal be recompiled for the Raspberry Pi?

Comment Some households have chosen locked-down devices (Score 1) 117

if you have a classroom full of computers wtf do you need the raspberry for?

Some households have chosen to own only locked-down devices, such as iOS devices and video game consoles, whose business model runs counter to exposure to programming. A Raspberry Pi computer that goes home with the student would at least allow the student to complete homework assignments.

Comment Re: Big TV and multiple controllers (Score 1) 547

I bought windows 7 for my last pc, I can just migrate it if needed, as could many people I imagine

The cousin in question happens not to be able to. His last PC was an Acer Aspire One netbook that ran Windows XP Home Edition ULCPC until that would no longer turn on. Most of the time he uses either his Galaxy S3 or a PC running Windows 8 with Classic Shell owned by the head of household.

Seriously, can you just admit you're a fanboy to be investing money into consoles?

I'm not the fanboy. A relative is. I'm trying to save one more person from consoles, but he'll have to mow fewer lawns to afford a PS4 than to afford a PC that plays first-person shooters at comparable settings.

The difference is I have to get the software to emulate the controller for easy play and most people wouldn't even bother to try to figure it out.

One thing you could try is make sure a Steam game is "controller friendly" before you buy it.

Comment Re: Big TV and multiple controllers (Score 1) 547

This time I'll use neither of those arguments. Instead: A PC to dedicate to your TV that's comparable in CPU and GPU power to an Xbox One or PlayStation 4 will probably cost more than even the 499 US dollars to buy an Xbox One. I asked in a comment to a previous story and got a bunch of $600 builds, some of which didn't even include an operating system.

Comment HTTPS to avoid session cookie cloning (Score 3, Informative) 118

It used to be that the burden of encryption was only placed on the most sensitive of data, like a banking session or a protected site log-in [but there are] websites that dont have the need (encrypting your google searches? come on, they are spying on you anyway)

If you allow users to log in at all but don't encrypt everything, an attacker who can see a user's packets can snoop the user's session cookie and issue requests as that user for several minutes to several hours. The "Firesheep" plug-in, which allowed cloning the Facebook sessions of other users connected to the same wireless network, was the first widely reported incident of this.

Comment Your use of "direct hardware access" confuses me (Score 1) 118

The problem we have is applications require direct hardware access. You have a broken OS when a web browser plugin requires direct hardware access(flash).

What sort of kernel-level "direct hardware access" does Flash Player perform? I wasn't aware that Flash Player was making disk writes at the sector level (not the file level) or writing to individual I/O ports or anything. What sort of indirect hardware access would you recommend instead?

Slashdot Top Deals

HELP!!!! I'm being held prisoner in /usr/games/lib!

Working...