Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Fastest? Well, kinda'. (Score 1) 497

Bartons were 2003. Opterons/original Athlon 64 were 2004-2006.
Hence there was a period of time where if you wanted THE best chips, only AMD had them, since you could only pick from the deprecated Pentium 4 and the mobile-mostly Pentium M. Athlon 64s were very fast, 64-bit, with the integrated memory controller being a huge advantage. Intel came out with the first Core 2s in 2006, and AMD wasn't able to catch up on important factors anymore, except for eventually becoming proportionately cheaper and having somewhat better memory bandwidth. Even the brand new Bulldozer has less performance per clock than Core 2s, it's even worse than AMD's previous Phenom II offerings. Not counting that Intel's IMC also performs leaps and bounds better than anything AMD has used.

Intel has effectively priced them out of the market with Sandy Bridge at all levels, and it'll be a multi-folded-miracle if AMD can produce anything competitive enough to merely survive comfortably, given that Ivy Bridge is introducing (in less than two months) at the same price as Sandy Bridge is currently, but features ~15% better average IPC, and ~25% less power draw.

People have had currently ~8 years to come to terms with multiple cores and 64-bit, yet most consumer software (including gaming) is still 32-bit and so lightly multi-threaded (not splitting the 'main' workload) that it doesn't matter. Dual core is still normal. For the benchmarks that can handle >4, most any 4 core Sandy Bridge still significantly outperforms all of AMD's 6 core Phenom and 8 "core" bulldozer offerings while drawing significantly less power.

Comment Re:Just Installed it. (Score 2) 254

Cool. "Therefore, more complex ranking algorithms such as those used by Google (which analyze rank using a variety of contextual factors developed during webspidering) are not available in YaCy, placing severe limits on most users' means to retrieve the results they seek. For instance, none of the top 10 results returned by YaCy's public search when queried "Google" actually refer to Google's homepage."

Comment TFA! Read it! (Score 3, Informative) 249

Then linked from the original article is the study is basing it on. http://code.google.com/speed/webp/docs/webp_lossless_alpha_study.html
It's essentially saying that nearly the entire reason it's a fraction smaller in lossless mode is because there's no alpha support. Combining it the "optional" alpha mode with the "optional" lossless mode merely makes it near-identical in size to PNG, according to them.

The more features you take out, and the more you degrade the pictures, the smaller they are in comparison to the original. Is this somehow surprising?

Comment It's about time... (Score 4, Informative) 237

It's about time Slashdot stops accepting 'blogspam' links, such as Phoronix, instead of attributing the actual source itself. Phoronix didn't solve this, a developer did.
A badly written Slash summary (and 'article') which just links twice to the same braindead Phoronix article (which itself is a several day old duplicate) is bad. Very bad.

Dredged from the bottom of Phoronix:
Mailing list post: http://lists.fedoraproject.org/pipermail/devel/2011-November/158976.html
Fedora 17 feature point: https://fedoraproject.org/wiki/Features/Gnome_shell_software_rendering

Personally, I have little doubt that the "anonymous reader" is Michael Larabel himself.

Comment Re:Nothing to see.. (Score 4, Informative) 194

It can add itself to your user files, which allow something to start "at boot", as long as that user is the one (auto)logging in.

You don't see much Windows malware adding itself to your "Startup" folder, but few average Mac users are going to check "command line files" to see whether something has injected something bad or not.

As TFA says, this isn't a PDF, but an executable merely pretending to be one.

It's a trojan, and it likely wouldn't even be sandboxed due to the ball-dropping there on Apple's part. It wouldn't be able to snoop some low level processes, but absolutely anything that is running under your user? Yup. Open ports to communicate with the mothership? Of course. Install a line to start whenever this user is logged in? Of course.

If you get a user dumb enough to allow admin privileges to a fake PDF, you can use officially sanctioned mechanisms to inject code into every process in the machine without requiring a separate 'trojan process' to stay alive to monitor it. Or just replace the operating system kernel. :p

Comment Re:Them new DE's, man (Score 1) 468

It's a bit of a daft argument to begin with, that programmers (especially linux programmers) shouldn't have to be making.

"We don't expect you'll care about the choice. We arbitrarily believe most people like this, and will most likely continue to prefer it until at least 2050. We're effectively removing the choice by not putting 5 lines of configuration code in to read it as a value instead of hard coding it."

If it's a simple option, especially one of user choice and customization, especially something simple...it makes no sense to hardcode the value, or automatically assume it has to be that way, instead of being able to support at minimum the basic things users want to do with their software.

On Linux, rather than choice within an app, the choice often comes between separate programs that mostly do the same things, but have different defaults or fixed values. The natural choice, when available, becomes the most flexible thing that still does what you actually want it to do.

Comment Re:Route This Tomato! (Score 1) 207

Wow, that comes off as angry, snarky, and generally trollish for putting words in my mouth. Where did I say anything about 'turn off all ICMP'?

Windows uses ICMP for traceroute, Linux uses UDP packets, a few separate utilities use TCP. None of which trace very far with that disabled and active iptables firewall on the router. It disables echo, maybe traceroute, not ICMP in general. Using a variety of ICMP, UDP, and TCP online tools (I don't have a handy unix shell available right now, try again tomorrow), tracing to my public IP, with it allowed gets everything right quickly. Switch that one thing off, not one of the traces completes, some trace to completely different IPs and 'fall off'. All take a long time (1 to 25 minutes).

Can I get other, useful ICMP types? Yes. Do I have any reliability, latency, or speed issues with ICMP, TCP, or UDP, of any variety whatsoever? No.
The only other ICMP message which security implications (as far as I'm aware) is redirect, which is scarcely used for anything good anymore, at least on residential ISPs. Some ISPs block ICMP echo altogether upstream due to worms of the past using it as a popular technique (and congesting everything to hell).
Other than that, for IPV4, aren't only Unreachable and Time Exceeded generally used anymore for actual usage? Probably won't get "Header Parameter Problem" unless you're experimenting with the IP stack itself.
I don't know -as- much about ICMPv6, but it looks like there are 4 useful error messages, and 7 useful information messages, not counting echo; it's useful for infrastructure and servers to have echo on, not for home users who don't need to be pinged directly to see if they are alive.

DoS attacks are illegal, very obvious, and ISPs don't like it. I don't know what brought on THAT comment. I'm not particularly concerned about that, because I can be pretty sure they won't be getting access to my information if they're flooding theirs, and that tends to get law enforcement involved really quickly. If somebody keeps my piddly little desktop offline for a day, they get to go to jail. Even if my ISP might possibly be too dumb to filter it at the edge of the network (or at the source if in-network)... jail for them, a mild inconvenience for me. Somehow, I'm okay with somebody that stupid not being my problem.

Google collected a lot of data. It's beyond inane to assume they couldn't (or wouldn't) have obtained other details, when -I- can do so with a commodity bargain router and a few utilities (all of which can run on the router itself and don't involve 'breaking' or accessing anything, just passively listening). On open networks, everything's transmitted in the clear. YOU don't have to log in, if you can watch somebody else do so. I don't think Google cares that much, and isn't that nefarious. But it's purely naive to assume that just because Google got away with it, others aren't interested in information you transmit.

This is frigging Slashdot, isn't it common knowledge to secure your data (as best as possible) over a completely untrusted, and insecure network, notoriously vulnerable to external snooping from anyone with a $5 USB plug and a computer from the last 10 years? It's not some kind of national security thing, but I don't exactly feel comfortable with a hotel manager (or someone in the neighborhood if I were dumb enough to run an unsecured router for my own use) reading my personal correspondence with relatives and friends. That's a very basic privacy and trust issue, not one of location finding. It's also common sense.

There are a number of proofs of concept (http://samy.pl/mapxss/ for instance) showing that you can use javascript to determine public MAC information, and street address, using Google's own tools, but not requiring any sort of 'privileged' access to anything whatsoever. More than one person I knew had been able to locate their exact street address because their router had at one time been broadcasting. That one doesn't use a public IP address, but the MAC address. Assuming anyone CAN get access to it (which the cross-site-scripting can do on some routers), then they have your approximate street address.

And nothing in TFA (maybe you've read it), or anything I ever said, requires Geolocation Services, or anything else 'special' to be enabled in a web browser. And, various popular and common web browsers default geolocation to on, and don't prompt, besides that.

If you turn geolocate off, turn echo and trace off unless you have an immediate need for it (then turn it off after), then you're probably considerably better off. Similar to having a firewall, and other basic security procedures in the first place. Isn't anti-virus on any OS (unix mailservers and OSX have them too) a reasonable thing to have if you don't want viruses, spyware, or trojans delivered to or through your systems? So why is this any different? You may voluntarily turn off something that has zero practical use on the internet but has well known security risk, and makes you more likely a target.

The technique described in the article (which is, as usual, light on technical details), appears to just use pingback/trace on connection and general latency measuring vs. other sources, to try to narrow down where you are progressively until it gets you within 100 meters. The problem comes when you can't reliably measure the latency from a host. Connections from a user to a host aren't that useful for that purpose (different outbound path to you, than you are to them) and can vary widely. So the only feasible thing you could use, is an outbound unsolicited connection (assuming no congestion anywhere, of course). If it's flat rejected, you might be able to work around it. If it's dropped, you have zero reliable information except their IP address and their ISP (which you could've found using whois on the IP much faster).

I'm sorry, Mister or Miss 'Pundit', but you were well off the mark on this one, and constructed a straw man argument with things I didn't say or suggest.
In the end, the whole issue of not wanting your street address able to be located, either by advertisers, or stalkers, is a simple privacy issue. No matter the method, are you suggesting that you want people to be able to trace your physical location because of a post you made, or snoop on your assumed-private data? Because that's what I've been talking about, and saying how Reasonably Achievable it is to STOP those two from common sources, and be able to test/verify it for yourself.

That's slightly technical in nature, I suppose, but I hardly think it's above the head of a Slashdot reader, or unreasonable in nature or content. What's next?

Comment Route This Tomato! (Score 1) 207

Well, my router has defaulted to NOT respond to pings in the default configuration for years. Finally, there's a good reason not to, but seriously, even the known TCP/UDP traceroutes require an open inbound port on both the end host, and the same(?) on every intermediate host.
There's no good reason to have ping (and hence traceroute) enabled.
You're far more likely to have your IP address and/or your MAC address located by street address via Google, because 'everyone' tends to have unsecured wifi now.
Ignoring the facts of fast GPU-driven encryption cracking for wifi purposes, don't use unsecured wifi, and don't use your real MAC address for wifi.
It seems like RFID, they ignored predictions on technology advancement, so now anyone with enough hard drive space (by far the limiting factor, last I checked) and a $5 wifi adapter can can crack any 'encrypted' wifi (except apparently RADIUS, maybe)., but spending a few hundred dollars, is 'easy' if you're interested in looking at everyone's stuff, whether for creepy personal motives or profit.
Another reason to only use SSL or SSL+tor when on wifi.

Comment Re:The will to be free (Score 1) 648

"Everybody" uses Ubuntu, then complains about the bugs Ubuntu has had for a long time, and doesn't seem to be much of an issue for any other distribution.
Perhaps diversity is a good thing, no matter how much Ubuntu tries to package and sell Unity (in more ways than two).

Hardware and software support is directly a function of the linux distribution, not because of availability 'in the wild', but which ones manage to screw up the good deal that's already happened worse than others.

You can have fine-tuned death machine of acid and fire that you jigsawed together and quite probably can't reproduce again later, or you can a nicely pre-packaged steaming pile that takes most of the useful stuff away, tries to prevent you from installing things it doesn't happen to like, and introduces bugs by using an excessive number of 'custom' patches and self-advertising branding to every possible application, library, and utility. To date, there haven't been many exceptions. Many...actually, are there any? Can't name any off-hand that are both powerful, flexible, and LSB/posix/upstream compliant, but also have nice easy-install easy-setup easy-everything. (Sabayon doesn't count, since it's pre-packaged unflexible Gentoo, hence without the Gentoo part.)

Slashdot Top Deals

The one day you'd sell your soul for something, souls are a glut.

Working...