Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Re:I was using Waterfrox (Score 1) 209

From your citation:

... that do not need to use either real mode or virtual 8086 mode in order to execute at any time ... Real-mode programs and programs that use virtual 8086 mode at any time cannot be run in long mode unless they are emulated in software ...

Speaking as someone who's been writing software since 1988, please enlighten us with more information on your background as a programmer. I strongly suspect the the GP was right in positing that you simply don't have the faintest idea what you're talking about.

Comment Re:It's about time. (Score 3, Insightful) 180

Speaking as someone who deals with Cisco gear on nearly a daily basis, I fully agree with the premise of people needing to understand the difference between Cisco gear and alternatives designed for smaller environments. That said, most of the issues with Linksys products in recent years have been attributable to Cisco neglecting the hell out of Linksys branded product lines, and simply using the resulting failures to attempt to sell Cisco branded gear. It's been truly shameful, and I'd love to see it come to a stop.

Comment It's about time. (Score 4, Interesting) 180

Linksys produced some decent gear prior to the acquisition. After Cisco bought the company, the default answer for any sort of serious trouble with SOHO gear became "oh, I see you're referring to our Linksys brand; if you're serious about small office or branch office communications, you need to upgrade to our HOLY SHIT THAT'S EXPENSIVE Cisco brand gear instead." This applied nearly universally to cases where a prior generation piece of Linksys gear had performed quite well in the same role. Here's to hoping the brand can get back to its roots instead of serving as a loss leader for more expensive gear.

Comment Re:Title is misleading (Score 1) 510

Attempting to justify the continued existence of unions by pointing to past efforts that resulted in the creation of an entirely separate (and useful) entity is a logical fallacy. Prior good work alone doesn't support something existed in perpetuity, unless you're also of the opinion that going to work for a single day should result in continued pay for a year whether you show up or not. You may well have other justifications to present, but this one doesn't work. No pun intended.

Comment Re:Feel Free To Waste Your Money (Score 1) 100

While I strongly advocate for IPv6 adoption/support at the ISP, large scale network, and datacenter levels, I believe you're totally correct on your basic premise. Until having native IPv6 connectivity for your LAN devices represents a value add in terms of functionality, IPv4 only capabilities are fine for them. IPv6 and IPv4 can and do comfortably coexist; in fact, this is how the Internet will look for many, many years to come.

Comment Re:Insane (Score 4, Insightful) 858

For what it's worth, I've met the man, and I've seen no signs that he was 100% insane. And I've met people that were pretty insane.

A guy walking down the street wearing a bathrobe chanting odes to aliens that resemble giant bunnies is only dangerous to the extent that motor vehicle collisions might occur due to the distraction of the spectacle. Conversely, people who generally appear stable and sane, but hold deeply ingrained lunatic views and occupy seats of power are the ones you need to worry about.

Comment Re:Researchers use responsible disclosure (Score 1) 76

The first rule of software is that all software beyond the barest of trivial examples will have bugs. Compilers are software, and have the same long and sordid history of bugs. Since compilers have been mentioned specifically, you might be interested in the classic work Reflections on Trusting Trust (it was apparently written by a guy who knows a thing or two about the topic, some Ken Thompson fellow).The same goes for test suites. In many cases, bugs translate to security vulnerabilities. In some cases, perfectly rational behavior demonstrated by entities known as programs results in unexpected behavior when they are made to exchange data. This phenomenon is referred to as "novel outcomes" in some circles, and "wow, that's some fucked up shit" in others. There is a reason the field of information security is as broad as it always has been, is, and always will be.

Your post proves you have never worked as a professional developer, or for an organization where your role was deeply connected to systems or development work. Heck, it proves you've never worked on any major open source project either, for that matter. I suppose we should all stop using anything resembling software immediately to prevent the planet from caving in under the weight of its own failure. Or perhaps you should take your obviously extremely advanced software engineering skills and produce the one true invulnerable platform for everyone, one layer and application at a time.

As Bruce Schneier famously said, "security is a process, not a product." That process never ends, and involves complexities I believe could be delicately framed as things that aren't exactly your area of expertise. That's okay, though; you can always start educating yourself immediately. We're all looking forward to your next batch of brilliant revelations on infosec strategy.

Comment Re:Why is McAfee's affair on Slashdot? (Score 1) 148

Man, I must be using my MacBook wrong, too. About a third of my active desktop real estate is perpetually occupied by a terminal window, and I've even got an icon for it in two places. It's almost like some people use Unix-based operating systems for, well, things that Unix-based operating systems are historically used for. Crazy.

Slashdot Top Deals

It has just been discovered that research causes cancer in rats.