Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - DynDNS now requires a monthly login to maintain a free account (dyn.com)

alanmeyer writes: DynDNS.org has been a great tool for users hosting web services from home. I've used it for years without too much hassle. However, today I received an email stating that in order to keep a free account, I will now be required to log in to the web site each month. I'm also told that this may be "frustrating" but that I can avoid this by subscribing for $10 (for the first year — presumably moving to the normal price of $29.95 per year thereafter).

Apparently, their cost model isn't holding up anymore. Are there any alternatives? For now, I'm just going to login once a month. If I decide to pay then for $30/year, it would seem like I can almost just buy my own domain instead of using one from dyndns.org.

Here's the email copy-and-paste:
Starting now, if you would like to maintain your free Dyn account, you must log into your account once a month. Failure to do so will result in expiration and loss of your hostname. Note that using an update client will no longer suffice for this monthly login. You will still continue to get email alerts every 30 days if your email address is current.

We understand that the possibility of resulting service interruptions may be frustrating, so we are offering a transition upgrade offer to VIP status (Dyn Pro) for just $10 USD for the first year. Under this status, login will not be required and service will remain uninterrupted for an entire year.

Comment A Company Called Apple (Score 1) 189

"I apologize. I offer a complete and utter retraction. The imputation was totally without basis in fact, was in no way fair comment, and was motivated purely by malice, and I deeply regret any distress that my remarks may have caused you, or your family, and I hereby undertake not to repeat such a slander at any time in the future."

Comment Re:SpinRite (Score 1) 297

Nowadays, IDE keeps a list of bad/remapped sectors and does all this in the background *as long as it's told to* -- if nobody ever reads offset 17543, nobody knows that is about to go bad (lets say ECC can correct for 1 in 96 bits, and right now there's an error in 1 of 108 bits), and over time, that will degrade to 1-in-96 at which time the data is lost. If SpinRite (or any other parity scrubber) reads the data while it's good, the drive electronics should notice the high error rate and refresh it. Some drives won't write the correct data back to the disk unless told to (it slows the drive down)...

I mostly agree with this. Sectors can degrade over time, so a "refresh" will essentially fix it. The problem is that drives don't necessarily do this (some drives have offline scans, but it's not guaranteed). As you've pointed out, a degrading sector can go unnoticed until someone actually requests to read that sector. And, perhaps this is where most people are frustrated with Spinrite's marketing. Just doing a read and then re-write to a sector isn't magic. The point is that when Spinrite encounters an error that it cannot read, it goes thru a series of steps to try and *enable* the HDD to read the sector. For example, it moves the actuator at varying distances from the target LBA to try and get it to seek settle at a slightly different location on the track. This is important because tracks are typically wider than the read head, so you can have different but acceptable actuator/head locations on the same track/sector.

My point about the ATA command is that Spinrite is only using standard commands; not undocumented commands or anything secret like that. However, what is "special" are the sequence of commands used to help the drive recover sectors that get a read error.

Ok, using what you just said, explain the "Dynastat Data Recovery" in Spinrite. To refresh your memory, that is where it claims to be working down to the bit level. You cannot address individual bits or even bytes on a drive, either with BIOS or direct ATA commands. And before you say something stupid about "averaging" or other mathematical BS, a modern drive can only return one of two things for a sector request. The correct data when the ecc matches, or an error.

I'm not sure what Spinrite is using, but there is a way to do this. It's not widely used, but there's a command called "Read Long", along with a complimentary "Write Long":

INT 13h AH=0Ah: Read Long Sectors From Drive (Reference: http://en.wikipedia.org/wiki/INT_13H#INT_13h_AH.3D0Ah:_Read_Long_Sectors_From_Drive)

This returns data including bad data along with the ECC. This allows for error bits to be read along with the correction field. You can use this to essentially do offline error correction, but it will also give you the ability to get "parts of a sector".

Comment Re:Passwords are for philistines (Score 2) 167

Anyone see these guys on a port other than 22?

+1. Moving to a different service port dropped my failed login attempt logs down to nothing (at least, for now). Prior to that, my logs still weren't too big because I block IPs after #MAX_ATTEMPTS within a 24 hour window. However, the attempts were coming in at a rate of 10 minutes apart. Still, they got blocked. It's just that the hacking community seems to be well aware of trying to keep the number of attempts / unit time down to avoid detection.

Comment Re:SpinRite (Score 2) 297

Spinrite is lying about even using ATA commands

You seem to have it in for Spinrite, but it's not clear why. If you listen to Steve's podcast (Security Now), you'll know that he is very careful on how he describes the technical aspects of his products (including Spinrite). I'd be very surprised if you or anyone could point to any of GRC's literature on Spinrite that would prove he's "lying" about anything.

I'm not sure where Spinrite claims anything other than using Int13 commands. That's how it gets its minimalist compatibility with a DOS system using the system BIOS. For a SATA drive connected directly to the motherboard thru a standard SATA host adapter use regular ATA commands.

A USB connected SATA HDD simply gets help from the BIOS so that it can use Int13, converting to the USB commands, and then over the USB bridge, eventually going back to a standard ATA command (the only commands a SATA drive knows).

My point about the ATA command is that Spinrite is only using standard commands; not undocumented commands or anything secret like that. However, what is "special" are the sequence of commands used to help the drive recover sectors that get a read error.

Comment Re:SpinRite (Score 3, Informative) 297

Spinrite may do an OK job of exercising disks, but 90% of what it claims to do is BS.

This is a very uniformed opinion about Spinrite. Spinrite has a large population of testimonials that prove that "it works". It's main purpose is data recovery and data maintenance on magnetic-based rotational media.

Your example of a USB drive is just another way of saying "flash", for which Spinrite is not targeted to fix.

Indeed, there are no more "low level" commands like in the day of old HDD technology. However, Spinrite uses the standard ATA command set to do everything possible to get your data off your drive. It does this very well and you'll be hard pressed to find other programs that do it better that don't cost a lot, lot more money (think data recovery repair center).

It's also a terrible data recovery program, since it can only write recovered data back to the same disk

Spinrite doesn't target this case. Backing up is what you do *after* you use Spinrite to first correct the few sectors that are preventing your system from recognizing the disk in the first place.

You really need to review the product, what it's targeted to do, and the testimonials before you continue to bad mouth a product that has been shipping for as long as Spinrite has.

Comment Oblig (Score 1) 400

All right, all right, I apologize... I'm really really sorry... I apologize unreservedly... I offer a complete and utter retraction. The imputation was totally without basis in fact, was in no way fair comment, and was motivated purely by malice, and I deeply regret any distress that my remarks may have caused you, or your family, and I hereby undertake not to repeat such a slander at any time in the future.

Comment Lefty (Score 1) 426

I'm left handed and I'm accustomed to having to play some games that were made for right handers anyway. I mean, the location of the D-Pad on a NDS (as well as many other gaming controllers) is basically easier for a right hander to play. I still enjoy using / playing it.

I guess I've just adjusted to living in a (mostly) right-hander's world.

Comment Worse user experience (Score 1) 2

I've used bluetooth mice and keyboards at work and home. It's nice if the computer already has a bluetooth adapter as they don't require an extra port. In addition, the bluetooth has better range, so it's nice for a conference room where the computer is far from the keyboard & mouse.

However, for most applications, the negatives outweigh the positives.

Compared to the IR/RF counterparts, bluetooth devices are slow to respond. This is because of power management. The bluetooth devices consume more power, so they aggressively go into power-down modes to increase battery life. As a result, they take extra time to come out of the low-power modes and that's annoying, bordering unusable.

In addition, the fact that bluetooth requires an extra pairing process, when the device becomes unpaired it takes extra steps to restore it. Devices become unpaired when you push the connect buttons on the bottom of the device. This happens a lot when users think that the device isn't working (because it's slow to respond, see above).

These 2 issues result in a worse overall user experience.

Wireless Networking

Report Rips Government Wireless Network Effort 54

coondoggie writes with this excerpt from NetworkWorld: "Like a bunch of children in a sandbox unable and perhaps unwilling to share their toys, multiple key government agencies cannot or will not cooperate to build a collaborative wireless network. The Government Accountability Office report (PDF) issued today took aim at the Departments of Justice, Homeland Security, and the Treasury which had intended what's known as The Integrated Wireless Network (IWN) to be a joint radio communications system to improve communication among law enforcement agencies. However IWN, which has already cost millions of dollars, is no longer being pursued as a joint development project, the GAO said. By abandoning collaboration on a joint implementation, the departments risk duplication of effort and inefficient use of resources as they continue to invest significant resources in independent solutions. Further, these efforts will not ensure the interoperability needed to serve day-to-day law enforcement operations or a coordinated response to terrorist or other events, the GAO said."

Adobe Flaw Allows Full Movie Downloads For Free 166

webax writes with this excerpt from Reuters: "[An Adobe security hole] exposes online video content to the rampant piracy that plagued the music industry during the Napster era and is undermining efforts by retailers, movie studios and television networks to cash in on a huge Web audience. 'It's a fundamental flaw in the Adobe design. This was designed stupidly,' said Bruce Schneier ... The flaw rests in Adobe's Flash video servers that are connected to the company's players installed in nearly all of the world's Web-connected computers. The software doesn't encrypt online content, but only orders sent to a video player such as start and stop play. To boost download speeds, Adobe dropped a stringent security feature that protects the connection between the Adobe software and its players." webax also notes that the article suggests DRM as a potential solution to the problem.

Slashdot Top Deals

Any given program will expand to fill available memory.