Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re:ZFS needs ECC RAM (Score 1) 249

You said "ZFS needs ECC RAM". Implying that ZFS is special is this regard. The link however contains the following:

7 Beyond ZFS
In addition to ZFS, we have applied the same fault injec- tion framework used in Section 5 to a simpler filesystem, ext2. Our initial results indicate that ext2 is also vulner- able to memory corruptions. For example, corrupt data can be returned to the user or written to disk. When cer- tain fields of a VFS inode are corrupted, operations on that inode fail or the whole system crashes. If the inode is dirty, the corrupted fields of the VFS inode are propa- gated to the inode in the page cache and are then written to disk, making the corruptions permanent. Moreover, if the superblock in the page cache is corrupted and flushed to disk, it might result in an unmountable filesystem.
In summary, so far we have studied two extremes: ZFS, a complex filesystem with many techniques to maintain on-disk data integrity, and ext2, a simpler filesystem with few mechanisms to provide extra relia- bility. Both are vulnerable to memory corruptions. It seems that regardless of the complexity of the file sys- tem and the amount of machinery used to protect against disk corruptions, memory corruptions are still a problem.

ZFS needs ECC as much as every other file system.

Comment Re:ZFS needs ECC RAM (Score 1) 249

ZFS requires an absurd amount of RAM dedicated to managing storage.

And ZFS needs ECC RAM, errors must be detected because with ZFS there can be a write to the hard drive to fix a mismatched "checksum" when the software is requesting a read. Bad RAM is a much bigger problem with ZFS than other file systems. Its really not a good idea for consumer hardware.

Disputed, to put it mildly.

Comment Re:Use password strength as the criterion (Score 2) 232

That is essentially what they are doing. But, added to the simple rule based strength measure is a set of current rainbow tables. If they are throwing out the other silly rules, like mixed case, numerals etc and just looking at objectively weak passwords (a password in a rainbow table is objectively weak) then this sounds great.

Comment Re:All of the above (Score 1) 229


Local backup (with per user snapshots) to a dedicated backup server, which has RAID, and snapshots the backups (the backup server has ZFS).

The backup server is itself backed up to the cloud.

Local mail gets its own server and an extra layer of backup.

Yes, I am paranoid. I only worry that I'm not paranoid enough.

Comment Data General and Apple MPW (Score 1) 165

Data General's AOS/VS operating system had an undocumented command named "XYZZY." In the original 16-bit version, the response was: "Nothing happens." In a later 32-bit version, this was amended to: "Twice as much happens."


The Apple MPW C compiler had a notorious set of error messages (does this count as an Easter egg?). http://www.netfunny.com/rhf/jo...

Comment Identity Management (Score 1) 546

My registered email address no longer exists, and hasn't for years. It doesn't exist because the ISP no longer exists. I therefor have a problem with changing my email address to a valid one, since it will try to confirm to an email address that is no longer reachable.

It's a minor problem, but as you do the rewrite, I'd appreciate it if you gave it a few milliseconds of thought :)

Slashdot Top Deals

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (8) I'm on the committee and I *still* don't know what the hell #pragma is for.