Search:

Type: Posts; User: Luke; Keyword(s):

Page 1 of 5 1 2 3 4

Search: Search took 0.12 seconds.

  1. Replies
    18
    Views
    1,676

    A trustable TPM would make software keylogger attacks too time intensive to use

    OK, suppose the TPM is used the way I envisioned using a trustable one: to contain only the bootloader/BIOS/kernel/initramfs hashes, not the disk keys. The result would be that a "first access" raid...
  2. Replies
    45
    Views
    7,188

    1080p streaming requires more than codec support

    I don't know what "MSE" stands for, but I do know that when using gstreamer with Firefox, it can play 1080p video, using 25% CPU on 4 cores and about 10-15% on the other 4 of an AMD FX-8120. Thus, on...
  3. Replies
    45
    Views
    7,188

    Use Gstreamer for ful H264 support

    Firefox also supports Gstreamer 1.0 and will use it. There is a bug in the plugin control page: it lists the Cisco plugin, saying it "will be installed shortly" even when using gstreamer. I don't...
  4. Replies
    18
    Views
    1,676

    To each move there is a counter

    Hacking and general life are like judo:each move has its counter. For instance, if you know license plates are read and tracked, it does not matter whether you are a protesting college student or a...
  5. Replies
    18
    Views
    1,676

    Don't know nature of previous case

    Don't know what they were prosecuting, but kiddie porn cases are often the thin end of the wedge to get the public to accept tools that will later be aimed at political dissidents, people who won't...
  6. Replies
    18
    Views
    1,676

    TPM not trustworthy against governmental surveillance

    My motherboards all have TPM sockets, but nowhere can I get a TPM that is itself trusted to plug into them! I have to expect that if Im put my disk encryption keys into a TPM made in any contry...
  7. Red Had vs Ubuntu: the civil war of FOSS?

    This has gotten to the point that I just had the thought that two new factions should be created for 0ad: Red Hat and Canonical, as they seem to be going at it like Rome vs Carthage. Seriously folks:...
  8. Best fix is to treat Chromebooks as bare hardware for your favorite distro

    From where I stand, this is just another reason why I would never use Chrome OS as installed but rather treat a Chromebook as a bare metal laptop sold free of the "windows tax." As far as I have...
  9. Replies
    13
    Views
    1,126

    Chokes on cables needed as well as tight case for RFI issues

    RFI can get out of even the best case by following a cable, and some cables, notably older style monitor cables make noise of their own. Monitor cable RFI is the worst, as it can potentially allow...
  10. Replies
    13
    Views
    1,126

    I hope all cases never follow this example.

    I too use 5.25 bays to hold hotswap RAID enclosures, and I often use DVD's to have video clips to someone who won't be able to offload them on the spot into a laptop and give back the flash drive. I...
  11. Death threats over coding disputes is REALLY out of line

    Assuming the threats are not motivated by accusations of NSA or personal spyware being believed, this is about as out of line as it gets. I've seen some hairy shit in my time, almost got killed when...
  12. Interpreted kernel modules?

    Moving even more code from compiled binaries to interpreted code strikes me as a bad idea that would create slow code that responds poorly. I just switched from Cinnamon to MATE, even though I really...
  13. Replies
    136
    Views
    54,827

    Sticky: Results of ad-enabled CPU usage test on Pentium 4 w/mint MATE live OS

    just ran this test as promised on another thread:

    On a slow wireless connection, ads failed to load on first try with a default Mint 32 bit MATE live disk on a 2.8 GHZ hyperthreaded Pentium 4....
  14. The slashdot story assumes people use all the same sites

    This story's estimate of $250 a year is based on the assumption that people would pay money to subscribe to the same sites they use now, instead of going offline, switching to free sites, or running...
  15. Replies
    19
    Views
    2,927

    Use GIMP instead cloud editors where spying is a concern

    That's a good reason to use GIMP-as good as any. On the other hand, I would not publicly trash anyone for deciding to support some form of Linux, even if my security requirements or non-use of money...
  16. What harsh reaction?

    Michael can say anything he wants in his own forums. Unlike most websites that use ads, he doesn't boot forum users for discussing adblocking! He also does not erect technical barriers to using the...
  17. CheckMATE for Windows 8?

    Makes me smile to hear of this just as I am rolling all my machines back to MATE-from Cinnamon, building a theme to look almost exactly the same on MATE's far lighter codepath, which is compiled...
  18. If Nvidia does not like mantaining 3 drivers

    If Nvidia does not like mantaining 3 drivers, they can do like AMD doing and review their code to exclude DRM bits, then start releasing enough source to let Nouveau catch up and take over. Since...
  19. Foxconn does have competitors

    Desktop motherboards can be obtained from companes that directly compete with Foxconn, such as Gigabyte. If you build your own hardware, you can bypass the worst component suppliers. To me that means...
  20. Sorry, adblocked surfing can never be stealing

    To not be laughed out of any courtroom with a "theft" claim, your hypothetical accuser of theft would have to show that he blocked access to his site when ads were blocked or not subscribed (as in a...
Results 1 to 20 of 100
Page 1 of 5 1 2 3 4