Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Networking

Guaranteed Transmission Protocols For Windows? 536

Michael writes "Part of our business at my work involves transferring mission critical files across a 2 mbit microwave connection, into a government-run telecommunications center with a very dodgy internal network and then finally to our own server inside the center. The computers at both ends run Windows. What sort of protocols or tools are available to me that will guarantee to get the data transferred across better than a straight Windows file system copy? Since before I started working here, they've been using FTP to upload the files, but many times the copied files are a few kilobytes smaller than the originals."

Comment For those who can't use torrents, try metalinks (Score 2, Informative) 482

Not everyone can use torrents, so try out the metalinks. These are XML files that list mirrors & checksums, helping you find a server, and verifying that the download didn't have errors.

You can use DownThemAll! (Firefox extension), KGet in KDE4, GGet in GNOME, aria2, or metalink-checker (among many other Windows/OS X/Linux download clients).

The official .metalink files are available at
http://releases.ubuntu.com/releases/8.10/
http://releases.ubuntu.com/releases/kubuntu/intrepid/

Security

Child-Suitable Alternatives To Passwords? 895

An anonymous reader writes "Two months ago I donated my old PC to my little sister, who is 7 — I had promised she would get her own computer as soon as she can read and write properly. I then proceeded to answer her questions about how it works, as far as she inquired, and tried to let her make some choices when installing Debian (she can already use GNOME). As I explained password protection and encryption to her, I was pleasantly surprised when she insisted on protection measures being as strong as possible, so that no one else can screw with her computer. She knows that my younger brother has to endure strict parental control software that was installed on his machine without his consent. The significant problem is that she cannot permanently memorize abstract passwords, even if they are her own creation. I talked with a teacher who assured me that this is common at her age. My parents would probably be able to guess non-abstract passwords. What mechanism of identifying herself does the Slashdot crowd suggest?"
Data Storage

Making Use of Terabytes of Unused Storage 448

kernspaltung writes "I manage a network of roughly a hundred Windows boxes, all of them with hard drives of at least 40GB — many have 80GB drives and larger. Other than what's used by the OS, a few applications, and a smattering of small documents, this space is idle. What would be a productive use for these terabytes of wasted space? Does any software exist that would enable pooling this extra space into one or more large virtual networked drives? Something that could offer the fault-tolerance and ease-of-use of ZFS across a network of PCs would be great for small-to-medium organizations."
Google

Tax Accounting Evil at Google? 261

theodp writes "In its annual report, Google said it's done no tax-accounting evil, but the search giant acknowledged that both the IRS and SEC are taking a look at the way in which it accounts for income tax. Google is one of a number of U.S. companies that have come under fire for allegedly practicing 'profit laundering', i.e., moving book profits offshore to evade millions and even billions in taxes to the country where it really operates. In past SEC filings, Google has credited its Irish subsidiary for reducing its effective tax rate."
Windows

Windows Vista Keygen a Hoax 154

An anonymous reader writes "The author of the Windows Vista keygen that was reported yesterday has admitted that the program does not actually work. Here is the initial announcement of the original release of the keygen, and here is the followup post in which the same author acknowledges that the program is fake. Apparently, the keygen program does legitimately attack Windows Vista keys via brute force, but the chances of success are too low for this to be a practical method. Quote from the author: 'Everyone who said they got a key is probably lying or mistaken!'"
Unix

Define - /etc? 548

ogar572 asks: "There has been an ongoing and heated debate around the office concerning the definition of what /etc means on *nix operating systems. One side says "et cetera" per Wikipedia. Another side says it means 'extended tool chest' per this gnome mailing list entry or per this Norwegian article. Yet another side says neither, but he doesn't remember exactly what he heard in the past. All he remembers is that he was flamed when he called it 'et cetera', but that 'extended tool chest' didn't sound right either. So, what does it really mean?"

Slashdot Top Deals

"Luke, I'm yer father, eh. Come over to the dark side, you hoser." -- Dave Thomas, "Strange Brew"

Working...