Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Comment Re:Go where? (Score 1) 231

Because the remote machine has access to other networks, so I can just access that management network without portforwardings and editing /etc/hosts. Much faster and flexibel for me personally, my connection to work is much faster than the networks X Window System was designed for so there is no lag everybody always complains about.

BTW the option to run a remote firefox if you are running a local one, is -no-remote on the remote machine.

Comment Re:only (Score 1) 178

You do know that s2disk supports encryption?
man s2disk:
" The uswsusp system supports encrypting the image written to disk and features a splash system, see uswsusp.conf(8) for more information"

                      If the "encrypt" parameter is set to 'y', the s2disk and resume tools will use the Blowfish encryption algorithm to encrypt/decrypt the image. On resume and suspend
                      you will have to supply a passphrase. By using a pregenerated RSA key, you can avoid having to type a passphrase on suspend. See the "RSA key file" option for more

man uswsusp.conf
" RSA key file
                      If this option points to a valid RSA key, which can be created with suspend-keygen, the s2disk tool will generate a random key for the Blowfish encryption that will
                      be passed to the resume tool within the image header with the help of the RSA cipher. Consequently you only need to type a passphrase on resume."

To me it looks like there is no security issue with supporting restoring state from hibernate and secureboot.

Comment Re:Not vendor fragmentation (Score 1) 318

The main difference and the main problem* to get older phones to run for me, is the amount of memory needed to run the next major version of Android.

1.x was happy with 96MB RAM available to the OS/apps. Trying to run 2.x on the G1 was doable but the constant battle for RAM kills performance and battery.

Upgrading to a G2 running 2.x I suddenly had more RAM unused than available on the G1, 384MB was plenty leaving a comfortable 100MB free. But trying to run 4.0.x on this phone results in the same situation als the G1 running 2.x, there is not enough RAM available for apps, even with compcache (swap in compressed RAM) it only leaves me with something like 30MB. Now if this phone only had a 100MB more it would just run 4.0.x fine even thought it is a single core 800Mhz CPU.

So now I'm waiting for a nice phone with 2GB+ RAM with a physical keyboard to replace the G2, but I doubt anybody will be releasing Android phones with keyboards anymore so maybe it will be a phablet next.

*:next to drivers, but hardware makers not making drivers available is not an Android versioning problem.

Comment Re:who buys Sony any more? (Score 1) 284

It was news on slashdot before the firmware release:

Moral of the story might be:
Don't upgrade before reading.

It might be nice of Sony to supply a changelog before the update on the machine itself. They present an EULA to the user, maybe below is the changelog (but we all know nobody reads the EULA).

Comment Re:who buys Sony any more? (Score 1) 284

But you didn't have to upgrade to a version without Other OS option, at the cost of losing other options (online play).

But I installed Linux on it and tried to use is, unless you had some use for the Cell SPEs it was useless. No GPU access, slow disk I/O and less RAM than a decade old machine. If you were targetting Cell/SPE from Linux you wouldn't have upgraded. To my understanding current GPU it much nicer target. For me nothing of value was lost, though I didn't gain anything in return.

Comment Re:Open network? (Score 1) 505

There are a few options:
-take part in an "open" network that has some accountability (eg FON (good luck finding a functioning hotspot))
-only allow VPN connections (good luck filtering)
-tunnel your open network through TOR, you will not be implicated in any unlawful actions (slow but not my problem)

Comment Re:I deployed it at our ISP recursive servers (Score 1) 313

"Or how do you think the signature of com gets onto the public key of Magic?"

It doesn't. And you are confusing a web of trust with CA, it's like PGP. com. can only tell a dnssec user what it thinks the public KSK of is. That should have been communicated in a secure way to com. It is oneway trust between direct parent-child relations in the dns tree.

Comment Re:Dutch Innovate (Score 1) 313

Like I said, for the local market dnssec presence is huge, and last time I checked NLD is still part of the real world and it still has some influence on it (especially considering its size).

But .com has everything in place to do dnssec. So if an owner of a .com wants to get dnssec support, they should get a dutch dns provider, there are many that give the customer the option to activate dnssec.

Comment Re:I deployed it at our ISP recursive servers (Score 1) 313

But there are no CAs in DNSSEC. There are only public/private keypairs under control of the owner of the domain. has 3 pairs/signatures to check:

  • .
  • com.
  • tells the com. authority what it's public KSK is.
com. tells the root zone what it's public KSK is.
The public KSK of the root is known by all people/software that want to check dnssec signatures (the weak point since how do you securely distribute and update that one?).

Comment Re:Dutch Innovate (Score 1) 313

Math fail detected: 250*10^6 domains, 5*10^6 .nl, 10^6 .nl with dnssec. So atleast 0.4% of all domains are dnssec:
5/250/5 == 0.004 * 100% == 0.4%
.nl is in the 5 top of most used country TLDs. .nl is used for about 70% of the domains targetting the dutch market. So dnssec implementation is huge for the local market. And while it still might not be perfect, it is better than just plain DNS.

Slashdot Top Deals

If you didn't have to work so hard, you'd have more time to be depressed.