Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:"ip" instead of "ifconfig" is old news (Score 1) 433

I've been using "ip" for at least 8 years now...it actually allows you to assign multiple IP addresses to a single network device. I don't know how anyone lives with ifconfig anymore.

You mean like?: ifconfig eth0:1 10.0.0.1 netmask 255.0.0.0 broadcast + Of course, changing this in the Linux world merely moves Linux further and further away from the mainstream UNIXes, making managing a heterogeneous environment even more of a pain than it once was. Better to stay as close to a POSIX/XPG4.2 tool set for interoperability reasons.

Comment You'll still need multiple units: Multi-channels (Score 1) 100

This will merely increase the density of individual memory modules. However, with processors using multiple memory channels (for performance reasons) you will still require a separate memory unit per memory channel. For Intel Core i5/i7 processors this would be two units. For Xeons it would be sets of three.

Comment It's all about the manuals. (Score 1) 194

Seeing as the aim of the project is to create a tinkering platform for nascent, teenage programmers I was wondering why the idea to write a full, tutorial programming manual was dropped. The whole of the early '80s micro boom and bedroom coders was based upon not on the "cheap" hardware such as the BBC Micro and the Sinclair ZX81/Spectrum but mainly the comprehensive and very educational manuals which came with them. So, why was the idea of the accompanying educational material dropped?

Comment Re:Extradition is All the Rage! (Score 1) 244

Actually, due to a lop-sided treaty Tony Blair got through parliament after 9/11, basically the US can request the extradition of anyone without having to give evidence. The idea behind this was so that "terrorists" could be moved between the two countries without disclosing sensitive intelligence. The original treaty would have been two-way but the US legislature blocked the treaty at the US end. Unfortunately, because the treaty didn't have a clause which meant that it only came into power if both sides ratified it the UK end became binding even though the US end wasn't. Tony Blair stuffed it up again.

Comment Re:In other words (Score 2) 200

That had more to do with IBM using an architecture they opened up than Microsoft in a lot of ways ...

Indeed this is very true.

In the mid-80s there were a number of machines on the market which ran MSDOS but were not strictly PC compatible, for example the ACT Apricot F1, but these all fell by the wayside as not all software played by the rules and expected either a specific memory layout or specific type of graphics card (e.g. MDA, Hercules or CGA) to work. This was true of Lotus 1-2-3 and early versions of MS Word, where you needed specially modified versions to run on the Apricot.

Comment Re:No need to panic, merely be more careful. (Score 0) 370

Yes I have, and it's an attempt to retro-fit a useful security model to a system not designed to have such security from the beginning. Of course, because of the poor security decisions made by Microsoft in the 1980s and compounded in the 90s, such as allowing application installs to use the OS directory structure to place DLLs and configuration files and combining the system and application registries into one database, etc. If you add to that the 3rd party software producers who weren't forced to build software which had to operate in a non-privileged environment and hence required to run as Administrator who's applications are still causing problems and you still have a major security problem on your hands. Microsoft let the genie out of the bottle and it's very difficult to put it back in. That's entropy for you.

Comment No need to panic, merely be more careful. (Score 4, Insightful) 370

The story has the correct title but rather misses the point. Yes, it's not time to panic. There is a set of malicious tojan horse programs out there for MacOS. The current crop require the user to authorise their installation. i.e. the security weakest link (at the moment) being exploited is the one behind the keyboard. Very often this is the places where security is the weakest, just watch WarGames if you doubt this. MacOS is by design, with a greater degree of privilege and OS/Application separation, more resistant to attack than Microsoft Windows has been. However, this is not to say that it is not vulnerable. All systems are, be it design flaws or merely implementation flaws. Yes, I'm looking at you Linux, FreeBSD, OpenBSD, Solaris, HP/UX and AIX. No-one can rest on their laurels.

Comment Just the facts Ma'am. (Score 2) 263

I've noticed very much the opposite at work.

As you can see, there's been a general trend downwards, in jumps, since July-Sept. 2009.

The filters being used here are (1) IP addresses with valid DNS entries, (2) DNS blacklists, (3) ClamAV (with spam signatures added), followed by (4) SpamAssassin, which has been detuned so that it doesn't produce any false positives. Seeing as only a few spams actually get past ClamAV this is merely to catch those which don't have a signature yet.

P.S.: Off topic: Right on commander! ;-)

Slashdot Top Deals

"my terminal is a lethal teaspoon." -- Patricia O Tuama

Working...