Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Typical Microsoft (Score 5, Insightful) 308

Microsoft goes and makes a decision for their users and doesn't even tell them about it.

If they decided that a full registry backup wasn't necessary for certain things, that is fine. Just not make a back up. However, instead they tell you the backup was done successfully and create a fake backup file. I mean, that is a bad decision.

Comment I personally recommend the AMD A-Series (Score 2, Interesting) 207

If you aren't going for the top of the line in processing speed, the AMD A-Series will generally get you more processing power for the money than the Intel equivalents.

If you can do with even less graphics power, similar to that of the intel Skylake processors, you could go with the AMD E-Series, but you would see performance loss in graphically intense desktop applications like web browsing and multimedia. If this is tolerable, then go ahead and save the extra money.

As of motherboards, it depends on what you want to do. So long as you don't want overclocking, any of the basic motherboards will do as the advanced voltage regulators really don't give an advantage on low-end processors unless you overclock. However, I'd recommend getting the better chipset if you want USB 3.0 and other features. If not you can go with the basic model.

As of RAM, for an economy machine you want 4GB to 8GB of RAM, and you probably should go ahead and dual-channel the ram if the motherboard supports it, because it will not cost much extra and almost double your RAM access speed.

Comment It's fairly simple to combat this. (Score 1) 80

The most effective means against distributed brute force attacks is blocking the number of attempted logins on a particular user-name per a time period. (Query rate limited by user-name, regardless of source.)

Additionally, requiring a 1 second time limit between login queries for the same user-name should combat this and other means of increasing query.

Comment Hopefully he will maintain it in sync (Score 5, Insightful) 688

Hopefully he will keep his branch in sync and offer back his contributions like other developers who have done the same thing.

Many developers felt that working on the main Linux kernel tree involved too much politics and in-fighting and chose to maintain their own dev branches for their patches. Any that keep their trees in sync have successfully continued to contribute, and left the politics for when their projects were ready for merging. Any that didn't keep in sync, well . . . at least we don't worry about those projects anymore.

Comment Re:Tempest in a tea pot (Score 2) 235

WebM codecs such as VP8 and VP9 are also supported on nearly every device. W3.org, Google and the companies supporting ARM have put their full force behind the VPx codecs, and thus the WebM container format. Every Chrome and Firefox user can view it, and if you have device without browser support, you can download either a third party browser such as Firefox or the wikipedia app for most devices, and that will support it.

Support for WebM codecs is very widespread. As of companies backing VP8 and VP9, they include nVidia, AMD, Intel, Google, and the major manufacturers of ARM chipsets. Many of these companies are implementing hardware optimizations and hardware support for the VP8 and VP9 codecs.

Comment The best solution is to lock down Silverlight (Score 2, Insightful) 153

For plugins like silverlight that run code rather poorly sandboxed, you should lock them to a whitelist, so that only web sites you have preapproved can use them.

Additionally, you should only run them on an unpriviledged user. (Something many Windows users don't do with anything as a regular practice.)

These two measures won't eliminate your risk, but they will dramatically reduce it.

Slashdot Top Deals

My problem lies in reconciling my gross habits with my net income. -- Errol Flynn Any man who has $10,000 left when he dies is a failure. -- Errol Flynn

Working...