Become a fan of Slashdot on Facebook


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:WHAT ABOUT MEMORY USAGE!!! (Score 1) 132

Now what about the real issue, MEMORY USAGE!!!

Chrome, the current Firefox and a few others are designed with the assumption that memory usage is not a real issue while speed is - hence all that stuff in tabs being kept in memory. Yes it sucks if you want to use anything other than their application at the same time or have an older machine with less memory than the maxed out dev machines, but those developers do not care about such a situation. The answer is an older version or a project that has a goal of a low memory footprint.

Having 16GB of DDR4 memory is great except I rarely exceed 4GB of usage even with multiple web browsers and tabs. Most of the time I use Chrome and my overall memory utilization (includes system applications as well) is around 1.5GB to 3GB. Just for your edification, I opened 20 tabs in Chrome and my memory utilization jumped from 2GB to 3GB. Maybe you are running Chrome on the wrong operating system.

BTW. I run Fedora 24 and on login I automatically run Konsole (six shells) , Dolphin, Ktorrent, System monitor and VLC. I actually am running a video at the moment as well as the twenty tabs in Chrome and I have barely gone over 3GB in memory. Of course having a Skylake Core i7 6700 (not into overclocking hence I never bothered with the "K" model) does help.

Submission + - Bang The Gavel (

wesley05fj writes: Bang the Gavel is a full service auction business dedicated to providing charities the country with an easy and highly effective way to raise money for their cause. In total, Bang the Gavel has helped thousands of charities raise tens of millions of dollars, and its leadership team serves on the Boards of several charities, showcasing their commitment to philanthropic efforts.

Submission + - A solution for DDOS packet flooding attacks (

dgallard writes: On October 21, 2016, a DDOS attack crippled access to major Web sites including Amazon and Netflix.

PEIP (Path Enhanced IP) extends the IP protocol to enable determining the router path of packets sent to a target host. Currently, there is no information to indicate which routers a packet traversed on its way to a destination (DDOS target) enabling use of forged source IP addresses to attack the target via packet flooding.

PEIP changes all that. Rather than attempting to prevent attack packets, instead, PEIP provides a way to rate-limit all packets based on their router path to a destination. In this way, DDOS attacks can be thwarted be simply only allowing them a limited amount of bandwith.

Submission + - Things You Need to Know About Racing Drones! (

urbandrones writes: Drone Racing is a notable game where individuals fly around their drones and race as quick as possible. Most Drones have FPV systems nowadays, which is the First Person View. There are cameras in the racing drones, which give them the vibe of flying as though they were in the cockpit.

Submission + - "Splat" of Schiaparelli Mars lander likely found (

Tablizer writes: "Views from NASA’s Mars Reconnaissance Orbiter released Friday show the crash site where Europe’s experimental Schiaparelli lander fell to the red planet’s surface from a height of several miles, leaving a distinct dark patch on the Martian landscape...

The image from MRO’s context camera shows two new features attributed to the Schiaparelli spacecraft, including a large dark scar spanning an estimated 50 feet (15 meters) by 130 feet (40 meters). Schiaparelli’s ground team believes it is from the high-speed impact of the lander’s main body...

A little more than a half-mile (1 kilometer) to the south, a bright spot appears in the image, likely the 39-foot-diameter (12-meter) supersonic parachute and part of Schiaparelli’s heat shield, which released from the lander just before ESA lost contact."

Submission + - How are all these IoT devices on public address space to be hacked? 1

ChesterRafoon writes: Nearly all of these IoT devices mentioned in the latest internet bot attacks are consumer devices — webcams, thermostats, DVRs, things like that. Most consumer (home) network setups would host these kinds of devices on private address space behind a NAT box of some type. So how on earth where all these devices exposed to the WAN so that telnet (of all things) could attempt to connect and hijack them?

Submission + - AT&T Buys Time Warner in $86 Billion Deal (

dos4who writes: AT&T Inc. has reached an agreement to buy Time Warner Inc. for $86 billion, according to a person familiar with the plans, in a deal that would transform the phone company into a media giant.

Submission + - Australian Man Claims His iPhone 7 Exploded And Destroyed His Car (

MojoKid writes: Are our ever more powerful, compact and thin smartphones putting us at risk? Or are we just more sensitized to events like smartphones blowing up since Samsung's nasty Galaxy Note 7 debacle? Regardless, it's beginning to look a lot like the latest smartphone feature trend is spontaneous combustion. While taking a surfing lesson, Australian Mat Jones put his brand-new iPhone 7 underneath some clothing on the seat of his car, safe and sound. Or, so he thought. Upon returning to his vehicle, it was filled with smoke and the source was undeniably his iPhone 7. Not only was the phone destroyed, but his car was torched as well. All smartphones using Lithium-ion batteries have the capability of exploding or catching fire, due to their internal chemical makeup, but under normal circumstances and operating conditions this should never be an issue. Extreme heat can be one contributor to a catastrophic event like this, but that seems an unlikely cause as temperatures are moderate right now at the South Coast of Australia — about 20C (68F) on average. The iPhone 7 in question was also not charging at the time as well. Apple is reportedly working with Jones to determine root cause of the explosion.

Submission + - Is Disclosure of Podesta's emails a Step to Far? (

mspohr writes: Interesting discussion between Glenn Greenwald and Naomi Klein on The Intercept on the limits of disclosure and privacy.
"...the author and activist Naomi Klein believes there are serious threats to personal privacy and other critical political values posed by hacks of this sort, particularly when accompanied by the indiscriminate publication of someone’s personal emails."
The article notes that back in the early days, Wikileaks carefully vetted its leaks to avoid compromising personal information. However, the latest leaks of DNC email have no editing and contain personal information such as discussion of personal problems of individuals unrelated to any public purpose.
"But personal emails — and there’s all kinds of personal stuff in these emails — this sort of indiscriminate dump is precisely what Snowden was trying to protect us from. That’s why I wanted I wanted to talk with you about it, because I think we need to continuously reassert that principle."
Do Wikileaks or journalists have any responsibility to privacy?

Submission + - Google Goes on Virtual Reality Hiring Spree Amid Daydream Launch (

An anonymous reader writes: Google, who began their journey into the world of modern virtual reality with 'Cardbord' in 2014 (, has since made the immersive technology central to the future of Android. The company announced Daydream (, a high-end Android VR initiative earlier this year, and announced the first Daydream ready phone and headset (the Google Pixel and Daydream View) earlier this month. Surrounding these announcements, the company has been adding significantly to its VR talent pool, publishing seven full time VR job listings in the last 30 days alone, and no less than 15 VR job listings in the last 12 months. Those new positions will augment the company's VR team which industry publication Road to VR speculates to number between 50 and 100 employees.

Comment Re:Hunger strike... how silly (Score -1) 67

Anybody really think they will let him die? Please! There will be feeding tubes going into both ends..

Well, I don't think he has anything to worry about since "Hacking" is not a crime and if it is made into one then I think that will be rather difficult to enforce since you would have to lock up most of the population of this planet. Now "Cracking" (think safe cracker) is a different matter.

IT writers, popular press and especially Holywood have been getting the definition of "hacker" wrong for over 25 years.

Even Wikipedia has got it wrong (from an older school perspective) in their initial definition of the word Hacker although if you read further the article does mention the historical difference between the words "hacker" and "cracker". Ah! the power of the ill-informed media.

Repeat after me "A computer hacker is someone who writes and modifies computer code. A computer cracker is someone who illegally breaks into computer systems". As an example, a hacker can write and modify computer code for nefarious purposes but it is only when that code is used for illegal purposes then the person who uses it becomes what is called a "black hat hacker", "script kiddy" or more accurately a "cracker".

Not convinced? How about downloading Wireshark . It's free and it is an excellent network checker. Run Wireshark in the confinement of your home and you are effectively hacking your own network by capturing and analyzing all packets. Run Wireshark outside your own home without permission (written is best) and you could be in trouble for trying to crack any networks that your PC can see.

Slashdot Top Deals

Despite all appearances, your boss is a thinking, feeling, human being.