Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Re:Secure by name (Score 2) 94

Windows NT was developed with better security than Unix from scratch. The permission mechanism is very powerful (too powerful according to some) compared to the basic Unix mechanism (root all powerful, users are members of groups, RWX rights, wheel to patch that up some). So no, not _always_ a late adopter. Compared to Unix that is - which I assume is what you like to compare to? Multics did a lot of security work back in the days but was mostly derided by the Unixians. Keykos with its capability system was also pretty damn secure if correctly configured etc.

Comment Re:Holy Blinking Cursor, Batman! (Score 1) 221

Some (but not all) SVGA cards had a sprite for the mouse pointer, the VGA standard didn't.

The big problem of using software drawn mouse pointers on the normal PC was that there wasn't a vertical blank interrupt on most VGA and SVGA cards (the original IBM VGA did support it IIRC but strangely it wasn't copied in the clones). That meant that there wasn't a guarantee that the drawing of the pointer was complete in a certain displayed frame leading to flicker and tearing.
Compatible code had to assume that the only way to synchronize with a frame was polling. Polling wasn't cheap then and it is even worse now (it uses an unusual feature of the x86 architecture, a separate I/O address space - handled very slow today for some reason), using double buffering wasn't trivial either even though the hardware would handle the buffer flip. One could simulate a VBL by timing a video frame with a timer and then set the timer to go off a little bit earlier than the start of the next frame - the interrupt handler would then poll the graphics card till the frame actually started, adjust the timer and call the drawing code. That wastes processor cycles and removes a precious timer for other use. Nowadays there are a lot of different timers available in the PC standard, back then there were very few and some (e.g. the RTC periodical timer) wasn't generally reliable.

The easy solution was to add one limited hardware sprite. Well adding a VBL interrupt would have been even easier for the graphics card manufacturer but getting an extra interrupt allocated back then wasn't realistic as a general solution.

Comment Re:Sounds nice! (Score 1) 124

There are no resource problems. It's a myth. It's the same as people complaining about increasing population in the US will soon lead to space problems - when the US is sparsely populated and have extreme amounts of resources not being used today.

Often (don't know if it applies to you) this is actually a complaint that the current society model will not continue unmodified in the future. That is true - already there are problems in certain hotspots where water and energy are consumed or rather wasted in extreme amounts. But that isn't a real problem, the world have always changed and we have changed with it.

Resources are available - we just need to learn to use them wisely even if that means moving people to other locations instead of e.g. settling in a desert environment and transporting water, food and electricity for watering grass, overeating in the extreme and cooling inefficient buildings.

Comment Re:No it isn't (Score 1) 36

You are doing it wrong - here's how you do it:

Emojis as generally used in forums, social media and phone-based messages are idiotic crap. Not only are there 10Gi versions of emojis (to make sure one can select a specific type that nobody knows what it actually means) but they look different on different platforms to ensure that not even those that would like to learn every single (useless) emoji have any chance to master the crap.

ASCII emojis are sometimes useful to add _some_ extra information and (if not automagically translated to animated crap as referenced above) is universal, WYSIWYG. Sure there are a lot of extra ASCII based crap too but they aren't used in practice, the crap mentioned above _ARE_ being used widely by idiots that can't understand that actually writing down what is to be communicated is better than using an obscure symbol...

And here we go further in effort to obfuscate communication by allowing the idiots to make more crap. Holy fucking shit is this scary!

(Or something like that - much more efficient IMHO ;)> )

Comment Re:Here's the actual problem, (Score 0) 191

First: it's not the "left" you are referring to, liberals are a better word but not correct either (using the definitions used in the rest of the world)
Second: it's mostly the extreme right that do those kinds of trolling. You should know that as you posted the above post yourself.

Comment Re:And now maybe we'll know why ... (Score 1, Insightful) 110

It have also been long suspected that UN strives for world domination and have plans to take control of the US via military force, that aliens insert tracking chips into people and that the MIB goes around harassing people that "knows" this with silent black helicopters.


Stop giving in to shitty conspiracy theories - there's no need for them. If there were secret backdoors inserted in hardware and software then we would know it, stopping such information from leaking via the engineers building the things would be impossible. Add to this the fact that many hardware designs are created and manufactured abroad or (not that unusual) as a co-operation between several teams in several countries. How could leaks be stopped unless all the governments in question work together and wipe the minds of the engineers after the designs are done? That's simply crazy!

It is more likely that the companies doesn't want to release the data as:
. they haven't documented it well enough.
. they don't want to add extra work for documentation for external consumption.
. they don't want to waste money on something that will not earn them extra money.
. there are hacks and holes in the specification that they don't want others to see. (not backdoor holes - crappy code holes)
. they don't want to have problems with people using the hardware out-of-spec, something that can lead to serious legal problems.
. they don't want competitors to see how they solved some hardware, software or hardware-software problem. Trade secrets are a thing.
. they don't want competitors to see that they use patented technology without license.

Of course there may be _some_ hardware manufacturer that is forced (as it would be a liability for them) to insert backdoors from a goverment agency, hard to prove otherwise. But again that would be either an unusual exception for an unusual case as otherwise the reveal of such backdoors from a certain country will lead to quick and hard economical problems. E.g. a processor manufacturer may suddenly get no orders from abroad and other processor manufacturers will be suspected to also have backdoors. Do you realize the impact that could have?

Comment Re:The management unit in all intel processors (Score 1) 110

Eh, no. UEFI implementations have been "hacked"* several times but AFAIK there is no instance of the security processor being tampered with.

(* back in the days we used to assume that access to hardware == access to the computer, it's just that hardware/software makes that much harder to do than before)

Comment Re:Won't be disclosing anything that's new or unkn (Score 1) 518

No the logic is the same as a suspect ordered to unlock a safe/hidden room/car etc. having to do that. If the locked space then contains something illegal it is valid evidence however the suspect isn't being forced to say there are illegal stuff there.

Or to make the comparison even easier: if police have a search warrant they have to be provided access to a location, failure to give that access is in itself a criminal act. Here the police have a search warrant for the disks and aren't given access to them.

The only way the analogy fails is that it is possible to genuinely forget a password. Well a key can be dropped too but it is easier to do a search of the suspects belongings than searching their memories...

Slashdot Top Deals

The disks are getting full; purge a file today.