Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Simple, Free Web Remote PC Control?

bruunb Re:logmein.com (454 comments)

There is teamviewer which is a similar option as well, and free for non commercial use.

more than 4 years ago
top

Wine Project Frustration and Forking

bruunb It is open source... (470 comments)

... if you write a piece of code for a project with a specific functionality that is requested and you finish it and the requested functionality for your piece of code has changed, then you have still written the code that was "asked" for.

If it is a problem with the fact that time changes, code changes, goals changes then fork the project, otherwise keep up the spirit and evolve with the project.

I don't think I've ever worked on a project where the end goal has been the same for anybody, small differences here and there and then the never ending "if we have this feataure, then we can do ..." and so on and then the projects evolve beyond the initial project goal... aka. "evolution".

I can't see what the problem is, yes the DBI's life in wine is a rather difficult thing, but the changes of the overall project be it open source or in the future a more commercially oriented organizational structure and environment, then it is still a piece of code in the project that is needed, from what I can understand. Commercial or not, then wine is a good thing and if the chief maintainer goes commercial, then a lot of developers would most likely abandon the project and move on to other tings or as you say fork the project.

Either way, I don't see the problem as being the maintainer, but rather an piece of evolutionary jump for the project. Wine has been very slow to gain momentum and for me the only program I use it for (or rather will) is VMWare Infrastructure Client, but not being a great hacker with the knowledge to hack wine, I'm waiting, more or less patiently :-) I'll gladly pay for wine (or the the possible fork) when it is supported to get rid of a virtual machine just to run that program.

As it is now, I think it is way out in the future, open source or commercial, so either way the problem for me seems more like an evlutionary bump in the road than a time for a fork.

Is it early monday morning and I've missed the point or is it a minor problem?

more than 5 years ago
top

Could Fake Phishing Emails Help Fight Spam?

bruunb Re:Seriously? (296 comments)

Somebody might be able to ensure some sort or of public/private keypair cryptology between the SMTP servers to encrypt the message-id or what other information is used to say "this is the message you can fetch for user X". Possibly a publicly signed key, somewhat like the current SSL-certificate signing.

That way the only "change" to the SMTP protocol would be

  - fetching the message from the receiving SMTP server that would normally just receive everything
  - some encryption based on the MX record validity/certificicate signing to ensure the correct receiver fetches the mail

I don't think that it would be a big issue or problem to implement.

more than 5 years ago
top

Could Fake Phishing Emails Help Fight Spam?

bruunb Re:Seriously? (296 comments)

Well either sign/encrypt the message with the receivers key or just make the SMTP protocol fetch the mail from the MX server that is says it comes from, this will make sure that approx. 90% of all spam will never reach you inbox since they need to have a valid MX record for the mail to orriginate from.

To day the SMTP protocol goes like this:

userA@sub1.example.com sends a mail from a spoofing SMTP server at some arbitrary IP address to someuser@sub2.example.com, the sub2 SMTP server receives everything from SMTP server from the IP address, "thinking" it is from SMTP at sub1 and puts it in the inbox of someuser@sub2.example.com.

If it was "reverse"-SMTP then it would be like this:

The spoofing SMTP sever at some IP sends a mail for userA@sub1.example.com to someuser@sub2.example.com.
The SMTP server at sub2 gets the inital handshake from the spoofing SMPT IP server and then, according to the senders email address eg. the "From:" tag, contacts the MX SMTP server for that email address to fetch the actual mail.
Since the SMTP server for sub1 does not have the mail that is being sent by the spoofing SMTP server, the SMTP transaction is dropped and the mail never reaches the inbox of someuser@sub2.example.com.

Simple solution to a major problem. No valid MX record for the spoofed email disables the spammer from sending a spoofed email.

It will make it easier to track down spammers since they need an actual domain with an MX record, but it does not, however, solve the problem with fake domain registrations for MX records or hacked DNS records (I'm thinking demographic information (name, address, contact information etc.) But as I understand then work is in progress to make this better... or perhaps not, might just be a dream I had :-)

more than 5 years ago
top

Midnight Commander Development Revived

bruunb Re:Text displays in today's environment? (304 comments)

I never got that ZZ or :wq thing that I see a lot of coworkes use? I always use :w when I've made or finished a sentence and :x to quit and save. Rarely the :q! option. I think it comes from the old unstable network days at the dorm in the late '90... I must be getting old or something like that:x

more than 5 years ago
top

Midnight Commander Development Revived

bruunb Re:Text displays in today's environment? (304 comments)

Don't take this the wrong way, but I laughed out loud when I read you comment, I feel the same way about the MC editor (and any other for that matter :w appears often when I'm in a GUI program). CLI + VI(M) and you have all you need. Gnome/KDE is only for having mulitple terminals open on one screen - great for log-watching when developing.

more than 5 years ago
top

Midnight Commander Development Revived

bruunb Re:Norton is going to be pissed... (304 comments)

You don't need X, all you need is a terminal.

MC does not take up the 1.4 Mb + shared libs + Gnome or N Mb + shared libs + KDE , which by the way only works if you have X also.

The 100% customizable build-in menu at the touch of a finger (F2) and of course file-extension feature works great - better than KDE or Gnomes version of the file-extension association lists... that don't work in all programs anyway.7

And it is almost as fast and versatile as the CLI. "Pure" CLI is still faster if you know the way around you keyboard...

And most of all no stupid mouse you have to reach out for when you want to view(F2)/edit(F3), copy(F5) or move(F6) a file (+ many more), the only thing you have to do is to reach an inch or a bit more depending on your keyboard and you got your action. When you do "system administration" work at the terminal then the mouse is not really an option.
If you don't believe me then give it a few weeks of testing. All there is to it, that goes for any and all GUI applications, is _not_ to use the mouse if there is a keyboard shortcut, including getting to menu items etc. It won't take you long to figure out that you loose time with the mouse, in just about any thing that is not drawing or moving windows around your desktop.
GUI = pretty pictures and tennis elbow, CLI = the fastest (also the choice that you need the most knowledge about GNU utilities to use), MC = CLI made easy and you get "free" visualisation of the filesystem.

If you aren't used to the CLI or the approx. 1000 "default" GNU utilities that comes with a default GNU/*nix installation that enables you to do just about anything you can thing of, excluding what your girlfriend can do, if you have one, then MC is the best way to get things done, fast and easy.

And of course, nostalgia from the "good" old DOS days where Norton Commander and DOS Navigator (some old MIT/russian NC clone that is much better than both NC and any NC clone I've run across, including MC).

more than 5 years ago
top

Sony's Solid State 2.4 Pound Laptop Reviewed

bruunb Re:$4000? (214 comments)

I've got a Dell X1 weighing in on 1140 grams according to the specs... battery time is not something that is recommended but then I don't use it much outdoors anyways.

60 gig of (normal) hdd and 1280megs of ram for the small fee of about $3k almost 2 years ago... and it runs Gentoo and hasn't failed once... yet that is

about 7 years ago

Submissions

top

Oracle bought Sun on April 20, 2009

bruunb bruunb writes  |  more than 5 years ago

bruunb writes "From oracle.com: Oracle Corporation (NASDAQ: ORCL) and Sun Microsystems (NASDAQ: JAVA) announced today they have entered into a definitive agreement under which Oracle will acquire Sun common stock for $9.50 per share in cash. The transaction is valued at approximately $7.4 billion, or $5.6 billion net of Sun's cash and debt. "We expect this acquisition to be accretive to Oracle's earnings by at least 15 cents on a non-GAAP basis in the first full year after closing. We estimate that the acquired business will contribute over $1.5 billion to Oracle's non-GAAP operating profit in the first year, increasing to over $2 billion in the second year. This would make the Sun acquisition more profitable in per share contribution in the first year than we had planned for the acquisitions of BEA, PeopleSoft and Siebel combined," said Oracle President Safra Catz.

What will become of MySQL and Java ?"

Link to Original Source

Journals

top

What is a hack?

bruunb bruunb writes  |  more than 10 years ago

Why does anyone need to think about security? Well, because some people does not respect your privacy, but then you can argue that everything that you put on the net or in the perifial is public knowlegde.

I'll argue that everything is public, since the Internet was created to share information and not hide it... if you can argue agains that then please let me know!

I'll also argue that privicy is of importance, since some information can be used to do harmfull things... like use your bank-account for one, impersonate you, etc. etc.

All that you can do with your own information, someone else can also do with your information - excpet perhaps "use your wife" :-)

A little word of advise - don't use software you don't trust, need or know what is.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...