Follow Slashdot stories on Twitter


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:I wouldn't have (Score 1) 125

I doubt that using 64 bit or 128 bit addresses would have increased the complexity for users that much. It just would have been a couple of extra characters to type in. IPX used 12 byte protocol addresses and it wasn't that big of a deal.

For developers, the biggest hassle would have been switching from a single dword to an array of some sort to hold the protocol address on 32 bit systems. No more simple register compares. But next to the logic for handling fragmentation/reassembly and IP options, it still would have been simple.

It would have been nice to have had something like IPSec transport mode from the start, but only if it were an optional component and if it didn't hard-code encryption or integrity algorithms. Also, for lightweight and low-end systems during the '80s and '90s, mandatory encryption support in the stack would have been overkill. Hobbyists would have preferred a smaller memory footprint.

I kinda wish that IPv4 would have made IP options a separate header, as they are in IPv6. Variable length IP headers are a little bit of a pain to work with.

Comment Re:Or the actual reason(s) (Score 2) 761

"The audio connector is more than 100 years old," Joswiak says. "It had its last big innovation about 50 years ago. You know what that was? They made it smaller. It hasn't been touched since then.

Not true. The 2.5mm plug was released, as were the OMTP and CTIA 4-ring jack standards.

I would have been fine with Apple moving from a 3.5mm to 2.5mm plug. Adapters are cheap and the plug is an industry standard.

Comment Re:if true, expect deaths and stories about them (Score 2) 47

I'd expect public outcry to be over more mundane issues, like noise, privacy, and operator trespass. Imagine living near a celeb and having to deal with the paparazzi flying drones. Or professional photographers flying drones over residential tourist attractions, like Lombard Street in SF. It would get incredibly annoying very quickly.

Comment Re:Would buy (Score 1) 135

There are a couple of cellular resellers who have basic plans with either no data or with very cheap data. The AT&T reseller I use has a $10/mo plan that includes 300 minutes, 50MB of data, and 50 MMS texts and a $15/mo plan that doubles it to 600/100MB/100MMS.

Look around. All four of the major providers in the U.S. resell their service. I believe that the big 4 in Canada do the same.

Comment Re:Is there a downside to upgrading to 10? (Score 1) 665

If you have older hardware, you might have difficulties getting the drivers to work.

One issue of note is the loss of the XDDM video driver subsystem that allowed video drivers from XP to be used on Vista and W7. Microsoft removed it from W8 and later OSes. So if a WDDM video driver was never released for your graphics chipset, you will be stuck with VESA SVGA video under W8 and W10.

There are still a number of Pentium 4M and Pentium M laptops in use where this is an issue. I have an older Thinkpad that I use when on vacation and that the kids use at home that has the i855GME chipset. I have a friend that still uses her Inspiron 5100 that has an AMD Radeon 7500M chip. Neither will ever see a Microsoft OS newer than W7.

Comment Re:Simple (Score 3, Interesting) 166

I have the same problem as you. The emergency call button is too easy to activate and the power menu can be activated without unlocking the screen. Both are design faults. Some third party Android editions remedy the second problem, but not the first.

My ancient Nokia brick phones had a screen lock. They also had a bypass for emergency calls. But instead of automatically dialing 911/999, it brought you to the dialer screen. The only number you could enter was 911/999. Anything else would prompt for the unlock code.

I've seen people argue that dialing emergency services should be as simple as possible, that a catastrophic injury might make navigating menus and dialers difficult. For every scenario like that, how many times have emergency call centers run out of free operators, with a butt dialer or two being enough to push them to capacity?

Comment Re:Dept. of Energy compromised by cyber attackers (Score 1) 35

Have you considered not connecting your critical infrastructure directly to the Internet. The fact that the 'Cyber attackers' can even see your computers shows extreme complacency by whoever is in charge of your 'computers'.

For all we know, their network wasn't attached to the Internet and that there was an air gap between it and the outside. Problem is, it isn't terribly difficult to insert your own back door. In many cases, you just need a wireless adapter and the proper software. Even if they're not running an IP network, you can encapsulate their traffic and send it through your eavesdropping device.

Comment Light on details (Score 2) 35

The problem with the article is that it is very light on details. How is an attack defined? Does it include a simple port scan or does it require something more targeted and defined? Of systems that were compromised, how many of them were non-sensitive public web servers in a DMZ/TZ and how many of them were internal servers containing sensitive data?

Using the weakest metrics, my employer's external facing network is attacked thousands of times a day. It isn't a matter of if we're being hit by a traffic flood at any given time, but by how many clients and at what rate.

Would be nice if they actually tallied the incidents by severity and general attack type.

Comment Re:No support for dynamic address assignment?!? (Score 1) 287

It doesn't; it's capable of picking out an address that doesn't conflict with anything else on the same segment. But then you don't know which address is Bob's phone and which is Fred's, so you can't tell who to fire for downloading cat videos.

Sure you do. You can enable logging of neighbor discovery protocol (NDP) packets and logging on dynamic host registration. It isn't as simple as a DHCP lease, but it can be done. And given that IPv6 addresses tend to be fairly static, Bob and Fred will probably have the same address day after day.

Comment Re:Selling of Medical Data? (Score 1) 142

I'm also curious if this runs afoul of HIPAA privacy rules. They may only be able to sell it using an opt-in clause. Also, the penalty for not opting-in cannot be significant because it could be seen as coercion by a judge.

This is just one more reason why this country needs a privacy amendment in the constitution. Corporations should not be allowed to sell private personal data to other corporations or to the government without prior approval. It is sad that the EU is so far ahead of the US on this issue.

Comment Re:Throttling phone plans vs Net Neutrality (Score 1) 272

Yes and no. Some carriers like T-Mobile made deals with companies like Pandora where data from Pandora did not count towards your monthly high-speed quota. That's probably not allowed anymore.

In the case of Sprint, it sounds as if this has more to do with truth in advertising. If they were throttling high-volume users at arbitrary points, that could result in a violation.

I run a small WISP and I instituted monthly quotas. After a user's allotment is gone, that user's connection slows to 256kbps. But I make sure that the quota is listed prominently on any sales material, that they can check it on their status page and that an email is generated when they get down to 10%. Nobody can argue that they didn't know about it. And there are no exceptions to the traffic counter - traffic is traffic.

Comment Re:Highly evolved animals can also smell bull**** (Score 4, Insightful) 637

Third world standards? Add rooftop solar to every house in the sun belt, wind turbines off the coasts and micro nuclear reactors around population centers and the US could drop to pre-WWII emissions for less money than what we've sunk into the Middle East over the past 30 years.

Slashdot Top Deals

You can tune a piano, but you can't tuna fish. You can tune a filesystem, but you can't tuna fish. -- from the tunefs(8) man page