Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:Uh, RTFA? (Score 1) 510

There is a Windows tool made by... HP? that allows you to create a bootable USB drive (hp usb format tool), you could use this to boot into Hi-Ren's Boot CD (actually Hi-Ren's may have instructions on creating bootable drives themselves, apparently yes; Many image explorer programs also support creating boot sectors for USB drives. Most recent Linux distros support creating bootable USB drives. Again, I would recommend something like HiRen for fixing Windows machines.

Comment Re:Recovery CD? (Score 1) 510

That way is the crazy way, there is a far easier way if you are just setting up your machine. The best way is to move the default profile accounts, delete existing accounts, and then create the new accounts you want, but unfortunately this requires a re-install. Basically do this (, for Windows 7 (some of the keys may be a little different). I've done this on my computer, and the only thing that persists on C:\ are a couple of AppData caches, although I think they are junctions. Using mount points/junctions is a little messier (and you'll have the paths existing in C:\ as well), but may be easier.

Unfortunately, it requires hard coding the drive letter of the user partition, which may not be desirable for some people.

That said, Microsoft absolutely should support changing it optionally (they won't do it as default for compatibility with poorly written applications; this is why there is a junction at C:\Documents and Settings\ for C:\Users, etc.)

Games and applications can be installed on a separate partition, on a per-application basis. Not all applications support this, but for the most part it works well.

Some programs used their own temp settings, others use the system variable %TEMP% (which can be changed to the new partition if you'd like).

Moving existing accounts is frustrating (I've done it under Vista), but can be done.

Comment Re:Pathetic (Score 1) 302

You're right, but do you honestly believe the government could have that kind of collusion with companies and ISPs without the public having a greater uproar? I think the reason the average person doesn't care now is because it doesn't matter now. It could be abused, but I have faith that market forces, right to protest, judicial systems, and democracy would see that wouldn't happen rampantly.

Every time a technology is introduced to make the world look a little more Orwellian (and I hate the word) or not, there is a lot of discussion/dissent and backlash and the net result is positive. We (assuming you are from a 'Western'/modern country) live in a time where personal freedoms and liberties are higher than ever before, why wouldn't that trend continue? We have been faced with technologies which people thought would oppress us, and it has never stayed.

Anyway, those are my thoughts on it. To your credit and those who think like you, at this point in the game, it's harder to say exactly what will happen. I respect you for arguing for your freedoms.

tl dr; My only point is that TPM/TC is a technology, not a conspiracy. People are the ones who are oppressing, not technology, and oppression has a poor track record.

Comment Re:Pathetic (Score 1) 302

I'll make an informative post.

A TPM or Trusted Computing scheme is a way to have a very difficult to modify part memory in the CPU where private keys can be stored. It does not mean trusting the user or trusting the machine, it is a way for the machine to verify software signed with a private key has not been altered. Period.

Obviously, Like all security (perhaps excluding quantum cryptography without a lot of luck) it can be broken. However, the idea is to make that break valid for one machine (keys are different, unless the generation scheme was broken with some fancy crytography) and involve a lot of time (like looking at the circuitry through an electron microscope.

As the GP said, there is potential for abuse. If you feel that this may happen, why would you run an OS that would want to abuse you in this way? If MS makes it so that Windows requires a TPM and scans your computer every minute, and that can't be disabled (as Windows would be modified/stop running), run Linux. A computer with a TPM (which, btw, have been out for awhile, you may already have one) doesn't require a "signed OS" or anything like that. That would be stupid, and would not actually work (as then the TPM would have to have knowledge of how the rest of the machine is running, which would mean that the chain of trust is broken, and the whole scheme could then be much more easily broken).

Comment Re:Pathetic (Score 1) 302

As the other poster said about Intel VT, and XP-mode is only available in Windows 7 Ultimate and Enterprise (i.e. the VLK version of Ultimate). It does not actually come with Windows 7 Professional, which most people would see as the business version. It does not come with Windows 7 Home Premium, which is what most end users would have.

The greatest problem Windows has is their licensing scheme and the people behind it. Engineers and developers do not run that company.

Slashdot Top Deals

We don't know who it was that discovered water, but we're pretty sure that it wasn't a fish. -- Marshall McLuhan