Search:

Type: Posts; User: Luke; Keyword(s):

Page 1 of 5 1 2 3 4

Search: Search took 0.15 seconds.

  1. Replies
    22
    Views
    1,687

    Anandtech adblock detecting code no obvious effect with NoScript and Ghostery

    In FF I got no surprising behavior from anandtech.com with my default browser setup of Ghostery and NoScript with all blocking on by default. That does not mean they are not detecting anything, could...
  2. Replies
    80
    Views
    13,448

    Small amounts of RAM more common than you think

    There is one obvious reason someone would build a desktop with 4G of RAM: if they are building or rebuilding from existing parts and that's what they've got. I built two machines from older Phenom II...
  3. You can install ffmpeg from source, someone could do a PPA

    This sort of thing could be easily countered in Ubuntu by a PPA, no reason such a PPA could not also have a debian version for manual addition to /etc/apt/sources.list . Apt won't give two shits in a...
  4. You don't need Crapple just to get reliablity.

    Buying overpriced sweatshop (Foxconn) goods from Crapple won't save your ass and won't pay for itself. I've never had one, exactly none of the laptops I have worked on came from them, and not ONCE...
  5. Replies
    22
    Views
    1,687

    Don't forget Gay kids that same age

    OK, I am 48 and use Firefox daily, as do probably hundreds of millions of people of all possible descriptions. Still, do NOT lump all 16 year olds (all teenagers, whatever) together as homophobes!...
  6. Replies
    39
    Views
    3,807

    Hardball's a game two can play

    If you've got opponents thinking in terms of piling on charges you've got bigger problems anyway and need to decide how you want to fight back. If they understand that cooperation and plea bargains...
  7. Replies
    39
    Views
    3,807

    I'm a US far left activist, my security requirements far exceed those of filesharing

    I am a far left (anticapitalist) activist in the US, and have been since the El Salvador War in the 1980's when we stopped Reagan's 1988 ground invasion of Honduras and deterred the 1980-1984...
  8. Replies
    39
    Views
    3,807

    There are always intentional providers of free service

    Libraries don't ask you to buy anything or have a library card, and some wifi access points get labelled "free wifi" to identify them for public use. Also, opening your wifi network while encrypting...
  9. Replies
    39
    Views
    3,807

    Not everyone has a house to themselves

    In my activist community, group and collective houses are very common, so are issues with getting the wifi to connect to everyone's computers. Obviously when running a group house-or just an open...
  10. Houses cost over 100 years income for me

    I don't own a house and the total value of all I own is surely less than the $3,000 or so that is formally exempt from seizure in any judgement. If you have a bank account and get sued, drain it,...
  11. At my income/asset level you are "judgment proof"

    No legal team required. I have no legally reachable income or assets of any kind. As such I would have no incentive to settle and every incentive to fuck with them and just plain get nasty. I could...
  12. Replies
    4
    Views
    3,117

    I get this on Gigabyte/AMD but it has no real-world effect I've ever observed

    I am running a Gigabyte board with an AMD processor and always get "Marking TSC unstable due to check_tsc_sync_source failed" in dmesg, in fact have ALWAYS seen this. I always assumed this was...
  13. Law enforcement is easily defeated in the world of computers

    The risk of something like this is close to zero in the US, the very nation behind all the copyright and patent maximalization. My advice is this: refuse to pay for any content due to the behavior of...
  14. Bug reports are needed, but so is bug discussion.

    Phoronix is not the place to REPORT bugs, but it is a good place in my experience to DISCUSS bugs that have also been reported.

    Last spring I had to deal with the DRI3/SDL issue, when SDL based...
  15. How about using this to sandbox browsers?

    This sort of sandboxing could be used to defeat browser-borne attacks that read hardware information such as any port of the FBI's CIPAV spyware programs to Linux. Also would
    confine privilige...
  16. Replies
    65
    Views
    18,813

    Wonder if this will work for Movit-enabled kdenlive?

    I don't have hardware capable of using this driver (Bulldozer with Radeon HD6750 in my video editor) but if this ever works for Kdenlive, that shared memory address space would be a game changer....
  17. I heard a report of different extensions being made malicious in Firefox

    I heard a report somewhere of this shit turning up in firefox extensions as well, but can't remember where. Anyway, if it can be done for one browser it can be done in another, as the basic concept...
  18. Is anyone else seeing Adcash while using Phoronix?

    If this shows up surfing Phoronix from a live disk, the problem is at Phoronix or at an adserver used by Phoronix. If this is so a lot of users should see it, at least in a single geographic area...
  19. Browser extensions are cross-platform

    That's the thing: a browser extension that does not use native operating system executables at all and simply runs in browser should be as OS-agnostic as a Flash game. If I had a machine stolen and...
  20. This is confirmed malicious, usually involves malicious browser extensions

    http://malwaretips.com/blogs/adcash-com-virus-removal/ shows that a number of "free" software programs available for Windows are using malicious browser extensions to open adcash.com windows that...
Results 1 to 20 of 100
Page 1 of 5 1 2 3 4