18 posts • joined 26 Oct 2009
Give it away
>>the Binux trolls couldn't resist trying to push their favourite operating system, an OS they can't give away<<
Tell you what, why don't YOU agree to give away every device in your possession that runs Linux? The sysadmins can take them with them on their project.
XP->Win 7 not usually an option on same hardware
It does not make sense to migrate a desktop system running XP into windows 7-8. For windows 7-8 you need a hardware upgrade with more memory, more cores, better graphics card bigger hard drive etc
Indeed, so what IS happening to the old hardware? Maybe Simon Sharwood can tell us?
goto is goto keyword of sloppy coders (potentially)
@ Paul J Turner
>>What's the difference?<<
The difference is that one goto was produced by a human and the other goto/jump was produced by a machine. The latter doesn't make mistakes.
goto is deprecated not because it's inherently bad but because it can encourage sloppy spaghetti code
How can you have a secure phone when you know nothing about its hardware?
Better to start with something like this maybe?
>>Just take Chrome off and put Linux on. Gets rid of all the google spyware.
Just take ChromeOS off and put a different Linux on. Gets rid of all the Google spyware thats software-based
The majority of these exploits apply to client Java deployments, and can only be exploited through untrusted Java Web Start applications, and untrusted applets.
Hmm. So that means *trusted* code can't use the vulns? That sounds counter-intuitive to say the least. What's more, Web Start apps and applets ordinarily can only become trusted by the user allowing them to run.
Are they rootable? Is IT rootable? If so, (i suppose depending on connectivity) i'm sure that would massively increase the interest value for us geeks
>>It uses a mixture of hardware and software lockdowns to keep out malware
For "to keep out malware", can we read "to keep the buyer from owning it"?
How it works
"It acknowledges packets on the wire (electrically) and then loses them into the void somewhere inside the firmware. "
Would that be firmware that is closed source by any chance? Either way, I find it strange that such a project has seen fit to accept the provision of closed source blobs.
>>Shylock uses a battery of tricks to escape detection by anti-virus scanners
But would possibly be detected by a little pattern matching against a Gutenberg edition of the works of one W. Shakespeare?
Which distro to pick is of course a concern but that's a separate issue. El Reg needs to come up with a policy on that
No mention of Linux
Surely it's not too much trouble to throw in a Live disk and tell us how this hardware fares with the Linux distro in question?
Perhaps if this trend of self-defensive demands for source code continues it might be useful to employ the term 'felching' in this, er... cleaner context?
No root login welcome
>>Windows machines for the vast majority of users should only be run in unprivileged mode, the authors also recommend<<
Best practice in Unix is to disallow root login. Is this even possible in Windows?
Of course, for most of its lifespan, root login has been the ahem... default in Windows and still is, though UAC has been shoehorned in at the last moment
Switch to BT as your ISP Stuart - they don't support IMAP for non-business customers - problem solved ;-)
Maybe stagnation of the app is a reflection of the stagnation of the protocols. Perhaps they should be looking at implementing different ones and simultaneously asserting an alternative nexus of control to the Benign Empire?
>>Technically correct, you can't run MS Office under it<<
Not even that is
- Analysis Oh no, Joe: WinPhone users already griping over 8.1 mega-update
- Opportunity selfie: Martian winds have given the spunky ol' rover a spring cleaning
- OK, we get the message, Microsoft: Windows Defender splats 1000s of WinXP, Server 2k3 PCs
- Spanish village called 'Kill the Jews' mulls rebranding exercise
- NASA finds first Earth-sized planet in a habitable zone around star