Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Reason? GNOME3 (Score 1) 535

You can open a new terminal by middle clicking or by pressing ctrl-leftclick.

The following CPU-monitor is quite good https://extensions.gnome.org/extension/120/system-monitor/

Regarding fixed layout I would like to have an extension that allowed me to press a button, and have gnome-shell rearrange all the windows for me.

I personally never liked the upper left corner, so I use the axe menu. My only problem is that the axe menu does not allow me to arrange desktops. (I miss the old gnome 2 desktop applet) https://extensions.gnome.org/extension/327/axe-menu/

But my biggest problem is that gnome-shell is unstable. These days it freezes daily, so I have to open a terminal and write "gnome-shell --display=:0 --replace &". In the past I have had problems with extensions that suddenly caused everything to freeze after an update, but this time I cannot guess what is wrong.

Comment Re:I finally mostly like Gnome 3.4 (Score 1) 535

I use "alt ctrl up" and "alt ctrl down" and that works well.

You can also do "shift alt ctrl up" to move the present window to a desktop above the present one.

But I miss a shortcut for splitting a desktop into two. The shortcut should create a new desktop just above the present one and move the active window to a newly created deskop.

Comment Re:Wow (Score 1) 456

You can save a search term such as "tizen" or "warhammer" for later use. So instead of following a person you essentially follow a search term. That used to work fairly well.

I haven't had much success following people on Google+, because most posters cannot stick to one subject, so they end up polluting my stream with uninteresting posts.

Comment Re:NO. (Score 1) 349

You need to look at the consequences one at a time.

  • If students use e-books they they don't forget their books.
  • If the teacher distributes a pdf then the students don't throw it away.
  • Many students cannot type fast enough to take notes on an ipad.
  • You lose some students to Facebook, but at least the horizontal screen make it easy for the teacher to see what the student is doing.
  • The students need access to a real computer if they need to work on a long report or essay in class.
  • The students probably need access to a real computer if they need to work with spreadsheets.
  • If you install a browser with flash then you can use interactive websites to add variation to the lessons.
     

I am a high school teacher so some of these points may not ne relevant to young children.

Hardware

Submission + - DARPA to Rip Up Dead Satellites, Make New Ones

Hugh Pickens writes writes: "DARPA reports that more than $300 billion worth of satellites are in the geosynchronous orbit, many retired due to failure of one component even if 90% of the satellite works just as well as the day it was launched. DARPA’s Phoenix program seeks to develop technologies to cooperatively harvest and re-use valuable components such as antennas or solar arrays from retired, nonworking satellites in GEO and demonstrate the ability to create new space systems at greatly reduced cost. “If this program is successful, space debris becomes space resource,” says DARPA Director, Regina E. Dugan. However satellites in GEO are not designed to be disassembled or repaired, so it’s not a matter of simply removing some nuts and bolts says David Barnhart. “This requires new remote imaging and robotics technology and special tools to grip, cut, and modify complex systems." For a person operating such robotics, the complexity is similar to trying to assemble via remote control multiple Legos at the same time while looking through a telescope. "If you've got a satellite up there already, don't worry, this isn't going to be some illicit grave-robbing mission to create hordes of evil Frankensatellites," reports Dvice. "DARPA says the agency will make sure and get permission before it chops anything up for scrap.""
Security

Submission + - XML Encryption Broken, Need to Fix W3C Standard (ruhr-uni-bochum.de)

gzipped_tar writes: Researchers from Ruhr University Bochum demonstrated the insecurity of XML encryption standard at ACM Conference on Computer and Communications Security in Chicago this week. "Everything is insecure", is the uncomfortable message from Bochum.

As pointed out by the Ars Technica article, XML Encryption is used widely as part of server-to-server Web services connections to transmit secure information mixed with non-sensitive data, based on cipher-block chaining. But it is apparently too weak, as demonstrated by Juraj Somorovsky and Tibor Jager. They were able to decrypt data by sending modified ciphertexts to the serve by gathering information from the received error messages. The attack was tested against a popular open source implementation of XML Encrytion, and against the implementations of companies that responded to the responsible disclosure — in all cases the result was the same: the attack worked.

Fixing the vulnerability will require a revision of the W3C XML encryption standard, Somorovsky said. The researchers informed all possibly affected companies through the mailing list of W3C, following a clear responsible disclosure process.

Botnet

Submission + - Most Sophisticated Rootkit Getting An Overhaul (itworld.com)

jfruhlinger writes: "TDL4, a rootkit that helps build a powerful botnet, is pegged by security vendor ESET as one of the most sophisticated pieces of malware in the world. But its creators aren't resting on their laurels; they're rewriting some of the code from the ground up to make it difficult for antimalware to detect it, creating a hidden boot partition that gaurantees that malware code will be loaded even before the operating system is. It's part of a plan to turn TDL4 into a turnkey product that can be sold to other criminal operations."
Politics

Submission + - A Digital Direct Democracy for the Modern Age (whitehouse.gov) 1

lordofthechia writes: One month ago the White House created an online petition system by which constituents could directly voice any grievances and concerns to the US Goverment. Any petition that reaches 25,000 signatures (5,000 originally) is promised an official reply.

This weekend the first petitions will be closing and already many have far exceeded the required number of signatures. Is this the way for the voice of the electorate to gain more weight in modern politics or is it the web version of a placebo button? Will the President's office really consider the top pleas which include petitions to Legalize and Regulate Marijuana, Forgive Student Loan Debt, and Abolish the TSA?

Privacy

Submission + - Researchers ID Skype, BitTorrent Users (itworld.com) 1

itwbennett writes: "Researchers have figured out a way to link online Skype users to their activity on peer-to-peer networks like BitTorrent. The team was able to sift out the nodes through which Skype calls are routed and determine the user's real IP address by sniffing the packets. To correlate the identified Skype users with files shared on BitTorrent, the researchers built tools to collect BitTorrent file identifiers, a BitTorrent crawler to collect IP addresses on the network and a verifier to match an online Skype user with an online BitTorrent user. 'As soon as the BitTorrent crawler detects a matching IP address, it signals the verifier, which immediately calls the corresponding Skype user and, at the same time, initiates a handshake with the BitTorrent client,' they wrote."

Submission + - Nasdaq intrusion spreads to listed companies

SpzToid writes: "Nasdaq's Directors Desk is a program sold to listed and private companies, whose board members use it to share documents and communicate with executives. Apparently Directors Desk was infected during a breach widely publicized earlier this year. It has now become known that hackers were able to access confidential documents and communications of the corporate directors and board members who received this infected application, said Tom Kellermann, chief technology officer with security technology firm AirPatrol Corp. It is unclear how long the Directors Desk application was infected before the exchange identified the breach, according to Kellermann and another source."
Operating Systems

Submission + - Early Speed Tests For Windows 8

adeelarshad82 writes: You often hear in the software industry that performance optimization is one of the last steps in the software development process. That bodes well for Windows 8, considering at the early stage of Developer Preview—even before we've seen an actual beta—the nascent operating system is getting widespread praise for its performance, particularly in startup times. Anecdotal evidence is always encouraging, but PCMag decided to run some very early tests on the OS to see if the reports were wishful thinking or if there was a real, measurable boost in speed. Along with startup and shutdown times, they used several standard industry benchmarks to compare Windows 8 performance with that of Windows 7 running on the same machine.

Slashdot Top Deals

Nobody said computers were going to be polite.

Working...