Forgot your password?
typodupeerror

Comment I don't get it (Score 2) 94

I really don't get it, every virtualization technology has the possibility to live migrate the virtual machine to a different physical host, vmware, kvm, openvz, xen, everyone has it, for at least three of them you don't need to have shared storage. Why don't they use it?

Windows

Windows Mobile 6.5 Launched, Panned 202

Barence writes "It's not Windows Mobile 7, but at least it's here. PC Pro has posted its full review of Windows Mobile 6.5, as found on the new HTC Touch2 handset, which is also reviewed. If you're expecting something to challenge Apple OS and Android, prepare for a very large let-down. The damning quote: 'Business users, as much as consumers, deserve a phone that's quick and intuitive to operate as well as one that hooks in neatly to Exchange and Outlook and is easy to manage centrally. If this is the best [Microsoft] can muster in the year-and-a-half's worth of development time since Windows Mobile 6.1 appeared, we'll be dramatically lowering our hopes for Windows Mobile 7.'"
Security

The Path From Hacker To Security Consultant 96

CNet has a series of interviews with former hackers who ran afoul of the law in their youth, but later turned their skills toward a profession in security consulting. Adrian Lamo discusses taking "normal every day information resources and [arranging] them in improbable ways," describing a time when he broke into Excite@Home's system and ended up answering help desk questions from their users. Kevin Mitnick, famous for gaining access to many high-profile systems, warns today's young hackers not to follow in his footsteps, saying, "A lot of pen testers today have done unethical things in their past during their learning process, especially the older ones because there was no opportunity to learn about security. Back in the '70s and '80s, it was all self-taught. So a lot of the old-school hackers really learned on other people's systems. And at the time, I couldn't even afford my own computer." Mark Abene explains how he got interested in phone phreaking, and how it led to a prison term and a career in computer security. Like Mitnick, he says that easy access to powerful modern computers removes part of the motivation for breaking into other systems.

Comment Re:!Troll (Score 1) 384

For data off and on look up apndroid in the market. Really neat app that renames all your APNs, thus effectively killing any data transfer.

Amen to everything else youve said, not having bt file transfers is equally pathetic as iphone.

Input Devices

The Best Keyboards For Every Occasion 523

ThinSkin writes "ExtremeTech has written an article on the best keyboards in every category, such as gaming keyboards (macro and hybrid), media center keyboards, keyboard gamepads, and so forth. Of course, the big companies like Microsoft and Logitech dominate these lists, while smaller companies like Razer, Ideazon, and others play an important role as well."

Slashdot Top Deals

There are two major products that come out of Berkeley: LSD and UNIX. We don't believe this to be a coincidence. -- Jeremy S. Anderson

Working...