Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Windows 8 (x86) is general-purpose, unlike RT (Score 1) 393

Reading EzInKy's parent comment and his comment again, it still seems like he's implying that Windows 8 is not a general computing device. He never mentions game consoles, iOS, Windows Phone, and Windows RT and ends with "Can't believe Microsoft sold the hardware manufacturers on this shit.". Looks like he's talking about Windows 8 and not Windows RT(which isn't the cause of decline of PC anyway).

Comment Re:I don't hate Windows 8 (Score 1) 393

That's the funny thing about Slashdot, everyone starts adding their own anectdotes about their personal reasons instead of looking at a comment from a broader perspective.

I still haven't gotten an answer from anyone about why a Windows 8 device is not a general computing device, yet that post is still +4 insightful.

Post any anti-MS garbage and get voted up in the echo chamber. In fact the more BS and misleading it is, the more upvotes it gets.

Comment Re:Surface Pro 2 is twice as expensive per user (Score 1) 393

What general computing are you prevented from doing on a Surface Pro 2?

Computing while someone else in the household is using it. For the same price, I could buy one Surface Pro 2 or two laptops.

That doesn't make any sense and is completely out of context.

If those two laptops come with Windows 8, what general computing are you prevented from doing on them?

Your Windows H8 is coming through :)

Comment Re:Expected (Score 0) 393

Yeah, it really sucks but that is not solely the cause. It's the lockdown that is the cause of the eminent death of the PC industry. Why buy a general computing device that doesn't let you do general computing? Can't believe Microsoft sold the hardware manufacturers on this shit.

What general computing are you prevented from doing on a Surface Pro 2?

The fact that this comment is +4 insightful is precisely why Slashdot is in decline.

Comment Re:Expected (Score 3, Informative) 393

Pasted from one of my earlier comments:

Here are some references about boot malware which UEFI secure boot can prevent.

http://www.chmag.in/article/sep2011/rootkits-are-back-boot-infection

http://www.theregister.co.uk/2010/11/16/tdl_rootkit_does_64_bit_windows/

http://www.computerworld.com/s/article/9217953/Rootkit_infection_requires_Windows_reinstall_says_Microsoft

I recommend reading atleast the first link.

Here's one juicy bit:

TDL4 is the most recent high tech and widely spread member of the TDSS family rootkit, targeting x64 operating systems too such as Windows Vista and Windows 7. One of the most striking features of TDL4 is that it is able to load its kernel-mode driver on systems with an enforced kernel-mode code signing policy (64-bit versions of Microsoft Windows Vista and 7) and perform kernel-mode hooks with kernel-mode patch protection policy enabled.

When the driver is loaded into kernel-mode address space it overwrites the MBR (Master Boot Record) of the disk by sending SRB (SCSI Request Block) packets directly to the miniport device object, then it initializes its hidden file system. The bootkit’s modules are written into the hidden file system from the dropper.

The TDL4 bootkit controls two areas of the hard drive one is the MBR and other is the hidden file system created at the time of malware deployment. When any application reads the MBR, the bootkit changes data and returns the contents of the clean MBR i.e. prior to the infection, and also it takes care of Infected MBR by protecting it from overwriting.

The hidden file system with the malicious components also gets protected by the bootkit. So if any application is making an attempt to read sectors of the hard disk where the hidden file system is stored, It will return zeroed buffer instead of the original data.

The bootkit contains code that performs additional checks to prevent the malware from the cleanup. At every start of the system TDL4 bootkit driver gets loaded and initialized properly by performing tasks as follows: Reads the contents of the boot sector, compares it with the infected image stored in hidden file system, if it finds any difference between these two images it rewrites the infected image to the boot sector. Sets the DriverObject field of the miniport device object to point to the bootkit’s driver object and also hooks the DriverStartIo field of the miniport’s driver object. If kernel debugging is enabled then this TDL4 does not install any of it’s components.

TDL4 Rootkit hooks the ATAPI driver i.e. standard windows miniport drivers like atapi.sys. It keeps Device Object at lowest in the device stack, which makes a lot harder to dump TDL4 files.

All these striking features have made TDL4 most notorious Windows rootkit and it is also very important to mention that the key to its success is the boot sector infection.

Another bit:

The original MBR and driver component are stored in encrypted form using the same encryption. Driver component hooks ATAPI's DriverStartIo routine where it monitors for write operations. In case of write operation targeted at the MBR sector, it is changed to read operation. This way it is trying to bypass repair operation by Security Products.

Comment Re:Article was corrected (Score 1) 255

So why was it pulled then? Just because Google wanted it to be gone? Or maybe because CM was trying to get shipped on devices?

Cyanogen Mod Goes Commercial To Make "Available On Everything, To Everyone"
http://slashdot.org/story/13/09/18/1626237/cyanogen-mod-goes-commercial-to-make-available-on-everything-to-everyone

Submission + - Google starts tracking retail store visits on Android and iOS

recoiledsnake writes: Google is beta-testing a program that uses smartphone location data to determine when consumers visit stores, according to agency executives briefed on the program by Google employees. Google then connects these store visits to Google searches conducted on smartphones. If someone conducts a Google mobile search for “screwdrivers,” for instance, a local hardware store could bid to have its store listing served to that user. By pairing that person’s location data with its database of store listings, Google can see if the person who saw that ad subsequently visited the store.It is easiest for Google to conduct this passive location tracking on Android users, since Google has embedded location tracking into the software. Once Android users opt in to location services, Google starts collecting their location data as continuously as technologically possible.

Comment Play store? (Score 1) 82

Comment Re:Subjects in comments are stupid (Score 1) 157

Oh, what do you do on it? Can you draw like this? http://www.youtube.com/watch?v=puyMmARTqck

Oh wait, it even has shitty lag. http://www.geek.com/android/the-nexus-7-lag-dilemma-and-why-theres-no-real-fix-1560784/

Enjoy your lagfest.

I don't get all the nonsense hate. Comparing a Nexus 7 to a Surface Pro is like comparing a lawn mower with a jet engine. Of course it going to burn more fuel because it can do more. .

Slashdot Top Deals

This file will self-destruct in five minutes.

Working...