Follow Slashdot stories on Twitter


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Why? (Score 2) 127

For that reason I always wanted that the win32/win64 API will be a international standard managed by an official organization like ISO. That way Microsoft will lost evil control of an API that is actually a very effective tool to kick off any concurrent. This will allow Wine to implement a good implementation based on detailed documentation.

This is curious that no government on the planet require that win32/win64 are international standard, while there usually require standard certification on a tone of less critical parts of there infrastructure. OpenOffice did a genius master move by making ODF an international standard before Microsoft was able to do the same. If only Wine would get enough support to standardize win32/win64 before Microsoft. Seem to be an impossible dream actually.

Comment Re:Not really open source if the source isn't open (Score 2) 117

Whenever it's for hardware or for software, the point to make a project open source is to create a community to support and improve the project, not to make money. Starting from that point I found cheap clone a rater big advantage, because this offload the production problem and make the project accessible to more and more peoples with almost no management. Instead of fighting against clones, it better to take advantage of them.

Comment Re:How do you know? (Score 1) 279

Because the squashfs image of OpenELEC is read only and mostly one of the know images already published, the operations you describes could be done on the hacker PC. It can then find a way to generate the hacked image from the original by analyse the difference between the two. This recipe can then be directly applied to the partition of the target device probably without too much processing and memory.

I agree that this is much more work, but maybe not so difficult for a motivated hacker.

Comment Re: How do you know? (Score 4, Informative) 279

OpenELEC FAQ disagree:

What is the SSH login?
Shortcut: #SSH Login
Currently the login into OpenELEC has fixed settings.
  Login: root
  Password: openelec

How do I change the SSH password?
Shortcut: #SSH Password change
At the moment it's not possible to change the root password as it's held in a read-only filesystem. However, for the really security conscious advanced user, you can change the password if you build OpenELEC from source. Also you can consider logging in with ssh keys and disabling password logins.

Comment Re:How do you know? (Score 2) 279

It's possible to remount a file system with new permissions. See the details here:
Or to mount it in a other folder with different permissions.
Or to directly access the partition under /dev/sda1.

To make a read-only file system work as expected you have to use a hardware way to prevent writing to the memory. For example NOR SPI flash memory usually have a write protection pin. Of course that pin must be protected against unwanted operation that could drive it. In that case you can expect having a clean state after a boot. Secure boot is an other method to give the same kind of clean state after boot.

You still have issues that can live in the SDRAM as long as the device will run...

Comment Re:Why is Windows 10 the benchmark? (Score 1) 205

Maybe you should realize that every SDcard, eMMC, WiFi, or Bluetooth chip, contain a processor (generally 32 bits this days) to offload your main CPU.
Seriously, if a main processor with a RTOS will be able to do all by itself, then all peripherals would be virtual with just AFE to convert to/from analog signals.

The reality is that toady even small controllers contain DMA engine, interrupt controller and peripheral state machines good enough to offload the core from most of the communication fast low level details. Look at the implementation details of a Ethernet MAC and PHY for example. Good luck to recreate something like that with just a CPU and a AFE...

Dedicated peripherals are nothing different. Depending of there complexity and performances, a extra CPU/DSP/FPGA could be a far better design than trying to do the same thing with a RTOS on a central processor and a AFE. Not counting that the vast majority of the industry is going more and more toward highly integrated peripherals chips that integrate there own processor, and all of that for a very low price due to the massive production scale.

Even if your smartphone PCB let you think that there is just a single processor chip with his main cores because of the marketing, in reality it probably have something like a half dozen of extra dedicated CPU or DSP running all the peripherals fast low level details, not counting all the DSP like cores of the GPU itself...

Comment Re:Theory vs. Practice (Score 1) 391

And this is also very clear:

sub foo {
        $var = 22;
        $anothervar = 23;
        if ($var == $anothervar) {
                return $var1;

While wasting a line for each open brace is not so a problem for the functions, this make code really annoying to read if there is a lot of consecutive if-then blocks. K&R coding style is widely used for a reason.

Slashdot Top Deals

When it is incorrect, it is, at least *authoritatively* incorrect. -- Hitchiker's Guide To The Galaxy