Become a fan of Slashdot on Facebook


Forgot your password?

Comment Re:RHEL 5 (Score 1) 960

This is Red Hat you're talking about here, if they wanted something like that to work they would have gone with Debian - but oh, that doesn't have "Enterprise Support" which only means that you are paying so that if something goes wrong, you get to blame it on Red Hat

Comment Re:Hate to say it... (Score 3, Informative) 485

The OP apparently doesn't even know why he installed LogMeIn in the first place. From the LogMeIn website:

Key Features Remote Control Your Computer Access your desktop from anywhere. Wake-On-LAN Start a sleeping computer on LAN. PC or Mac compatible Anytime, anywhere remote access.

It does this by installing their remote desktop client on the host to remote into, proxies through their servers over regular HTTP / port 80, and also features a web based control/viewer. The following is an excerpt from Wikipedia

Users access remote desktops using either the LogMeIn Ignition stand-alone application or a web portal. The web portal requires either an ActiveX plugin for Internet Explorer, or an extension for Firefox (the LogMeIn plug-in for Firefox), or an extension for Safari (the LogMeIn plug-in for Safari), failing that it falls back to requiring Java in order to run a Java program,[3] and failing that it falls back to "a screen-shot based HTML remote control".[4] The web portal also provides status information for the remote computers and, optionally, remote computer management functions.

So he has all the remote desktop capabilities in the world he could want. All he needs to do is setup a script to take photos whenever the lid is opened, and check on the browser cookies to see what web-sites the thief is going to. Even if the Apple camera application doesn't support this, I'm sure there are plenty of F/LOSS camera applications that would.

Basically, he needs to do what this DEFCON hacker did. Failing all of that, he could provide the S/N and other info to the Vancouver PD and Apple, so that if the thief attempts taking it to an Apple store to have it wiped (and removing LogMeIn by doing so) if they follow their processes and check the S/N, they should see it is a stolen laptop...

Comment Re:They didn't need good lawyers (Score 1) 258

No. The GPL does NOT prevent you from downloading the software and not being able to install it. It prevents you from downloading and then redistributing it without making an offer for the source code. While they do not have to package the source with the binary download, they have to be able to give you the source for the program. The developer is allowed to charge a fee that makes sense to cover the costs of the CD or server bandwidth.

Also, a developer is allowed to charge for the binary, but again has to provide source to anybody that paid for the license to the binary. This means they do not have to provide source free of charge to anybody off the street just because they want the application for free.

The GPL isn't about restricting what the end user can do with the application, it's about preventing people and corporations from taking F/LOSS code that a lot of people worked on for free, or even paid developers by companies like Red Hat from having their code stolen by "Hypothetical Evil Company X" to be rebranded and sold for the profit of said evil company and not only not returning a dime of it to the original and rightful developers, but also to keep the application open for development by other people.

Comment Re:Conflicting goals? (Score 1) 382

Which is why I said it probably wouldn't be very secure :(

Also, I should have clarified that to get the server working in such a basic state takes "adding or modifying" said number of lines.

However, I still stand that no matter which server you choose it is currently easier to get it up and running through CLI instead of said kludged together RedHat or Webmin configurators, which seem to use backend scripts that fail to even write to the file properly...

Comment Re:Conflicting goals? (Score 1) 382

Exactly - when I went to school they taught using Fedora 6 with Webmin and the non-working Fedora GUI tools for managing Apache and SSL. Even if the tool configured Apache to start and host a site, they NEVER configured SSL properly, no matter if you followed the textbook, or tried any combination or order of clicking buttons in the Red Hat tool or Webmin.

After a while, I installed Debian 4 (right after it came out) one of my systems, looked around for GUI configurators, saw none, and so it seemed that the only way to do so on Debian was through CLI. Turns out, a basic Apache config (probably not at all secure) was about 3 or 4 lines in the config file, and SSL is only another 5 or 10 minutes through the command line where weeks of playing with GUI tools at school yielded nothing.

Point of the story being that Apache and SSL really are easier to config through CLI. Also, I never really went back to Red Hat/Fedora/Etc after that since they always seemed to be too bleeding edge - giving Fedora dependency hell, you go to update all packages on a system, they require newer libraries than in the repo, and can't update. I've never really had this happen on Debian but for once or twice on experimental.

Comment Re:Time for your head to explode. (Score 1) 122


The GP's point is if you are going to bother building a nuclear plant, why not just skip the oil and coal altogether? If you can build 1 or 2 nuclear plants that would replace 2 to 3 coal fired power plants, isn't that a much more straightforward path? Instead, somebody decided to only make the nuclear plant the middle man?

The same issue is one of the major roadblocks to electric cars. "Oh we're running out of oil for the cars, lets make a nuclear plant to harvest oil!" instead of "Lets build a nuclear plant, the electricity from which will power EV's!" If you're going to build a nuclear plant, at least make it actually effect the core issue more directly instead of prolonging you running out of gas - get rid of the gas altogether.

Comment Re:Dark predictions (Score 1) 347

If you've ever watched his show on the science channel, he never really explains how his ideas are supposed to work, and they seem to universally rely on *some_magical_unknown_element*.

There was an episode where he tried to discuss light-sabers where he described a frame made out of cermet that basically served as a gas pipe to vent heated plasma. He then went to say that the power source would be "some kind of super-awesome-nano-manufactured-battery".

His first mistake with this is that it wouldn't even be a light-saber, as that would use a laser (light) to create the "blade". His other mistake is using "unobtainium" to make his "theories" work by saying "Oh, all you have to do is fit a nuclear power plant into a D-Cell alkaline battery!"

Comment Re:Exchange (Score 1) 242

Actually, I think this is maybe the 2nd article I've seen where Google found something on the market to be malware - the other one being a proof of concept somebody put on there months back to see how many people would download it.

The majority of the articles you see mention "On 3rd party Market sites" - in other words, its the same old "warez" situation with Windows or any other OS. Cheap college kid or cheap person in general wants newly released app or game that normally costs $x.xx or $xx.xx amount of money, such as Photoshop - but because they don't want to pay for it, they pirate it from wherever they can even if it's obviously a "questionable" site, not thinking about the malware packaged in with it.

Comment Re:Thats why (Score 1) 473

What I'm hoping is that once they fully drop mail order DVD's (they've already said they will), Netflix will have the extra cash to purchase more titles for instant streaming and at a faster rate.

As a side note - it may be the PS3 not being powerful enough for the Netflix streaming app, the app itself sucks, or something else - but it gets worse about updating what you have in your queue (say if you finish a show and remove it) when you have over a 100 shows in the instant queue (I've got about 140 right now).

Slashdot Top Deals

Kill Ugly Processor Architectures - Karl Lehenbauer