Search:

Type: Posts; User: - bill; Keyword(s):

Page 1 of 18 1 2 3 4

Search: Search took 0.02 seconds.

  1. Replies
    15
    Views
    1,003

    Actually, that depends on the implementation. ...

    Actually, that depends on the implementation. For example, a RAID-5 implementation that refuses to support write activity again after a power outage until it has reconciled all parity information...
  2. Replies
    15
    Views
    1,003

    They are as I stated. For random Read operations...

    They are as I stated. For random Read operations smaller than the stripe chunk size (which was typically 128 - 256 KB a decade ago and is likely more now) a RAID-5 array of N disks can provide N-1...
  3. Replies
    15
    Views
    1,003

    It would be of far more benefit if the...

    It would be of far more benefit if the implementation weren't brain-dead: to obtain the write integrity that you mention it requires that every write visit every disk in the RAID set (vs. perform...
  4. Replies
    50
    Views
    3,810

    My impression is that many and possibly even...

    My impression is that many and possibly even most exploit attempts aimed at XP (hardly a system that no one was bothering to exploit) would have applied to Win2K as well, and even some that were...
  5. Replies
    50
    Views
    3,810

    Agreed: for all the things that MS can...

    Agreed: for all the things that MS can legitimately be criticized for, support duration is not AFAICT one of them. I haven't tried to run Windows Update on a Win9x system in nearly a decade but it...
  6. Replies
    50
    Views
    3,810

    Obviously preferences differ, but no surprise...

    Obviously preferences differ, but no surprise there. If I preferred XP I'd already be using it, as I've had a retail license for a decade or so which I do have installed and occasionally use when I...
  7. Replies
    50
    Views
    3,810

    I'm afraid that preparing for Win7's demise is a...

    I'm afraid that preparing for Win7's demise is a bit premature for me since I'm still preparing for the demise of Win2K, which I've used for most of my computing activity - including Internet access...
  8. Replies
    17
    Views
    9,311

    Ah, Drew: I see that you weighed in again to set...

    Ah, Drew: I see that you weighed in again to set up some of your usual straw men late enough that I was no longer tracking this thread.



    Of course it has meaning and sense, Drew: you just...
  9. Replies
    18
    Views
    4,378

    Of course you can pull files off a...

    Of course you can pull files off a whole-disk-encrypted volume that won't boot: see page 35 of the User Guide. The degree to which True Crypt is extremely well-designed is one reason why I plan to...
  10. Replies
    16
    Views
    1,897

    Coincidentally, TrueCrypt does a pretty good job...

    Coincidentally, TrueCrypt does a pretty good job of securely deleting free space if you simply allocate as large a file as you can as a TrueCrypt container and then initialize it (which fills it with...
  11. Having spent many years looking for the ideal...

    Having spent many years looking for the ideal (for me, anyway) backup mechanism resulting in having none at all beyond creating disk/partition images at random intervals (my luck in never having...
  12. Replies
    16
    Views
    1,897

    I'm puzzled why anyone would feel that they...

    I'm puzzled why anyone would feel that they needed to replace TrueCrypt absent any indication whatsoever that it is more vulnerable to attack than (or even as vulnerable to attack as) the potential...
  13. Replies
    17
    Views
    9,311

    Ah, Drew - is this that famous dry British wit or...

    Ah, Drew - is this that famous dry British wit or are you living in an alternate reality where Steve Synofsky is triumphantly running all of Microsoft now, where Win 8 market penetration progress is...
  14. Replies
    85
    Views
    8,274

    I'm not particularly interested in the exact...

    I'm not particularly interested in the exact nature of your problem - it's entirely sufficient to understand that you have no interest in correcting it. The description of the Chappell article at...
  15. Replies
    85
    Views
    8,274

    That's why when I FIRST corrected you I 'read in'...

    That's why when I FIRST corrected you I 'read in' nothing at all:



    It was only after you appeared incapable of understanding this correction that I added detail specific to the context of the...
  16. Replies
    85
    Views
    8,274

    You really need to learn to read more carefully,...

    You really need to learn to read more carefully, CLiNT: in your last post you assert no less than 4 times that I am 'advocating' or 'advising' people to continue using XP, whereas in fact I am...
  17. Replies
    85
    Views
    8,274

    No, I did not. As the context was that of...

    No, I did not.



    As the context was that of a 32-bit virtual address space I used that, but my observation applies equally to ANY virtual address space (a term which I'm beginning to suspect you...
  18. Replies
    85
    Views
    8,274

    Ah - I now seem to recall that you don't...

    Ah - I now seem to recall that you don't understand what the difference between fact and opinion is and aren't interested in learning. Forget that I brought it up again.



    So explaining that...
  19. Replies
    85
    Views
    8,274

    You really ought to be more careful about...

    You really ought to be more careful about presenting personal opinion as absolute truth. In fact, people HERE who are eminently capable of making their XP systems reasonably secure DO seem...
  20. Replies
    85
    Views
    8,274

    Dear me, you have misread my intent completely. ...

    Dear me, you have misread my intent completely.



    The incorrect statement (which indeed does not contain the word 'cannot') was:



    The 32-bit virtual address space is in no way extendible: ...
  21. Replies
    85
    Views
    8,274

    But also a diminishing target as the XP universe...

    But also a diminishing target as the XP universe continues to dwindle. A better gauge of potential attractiveness to the bad guys may be the total XP-related target size (number of unpatched XP...
  22. Replies
    85
    Views
    8,274

    Yes, I know what you said. It was incorrect in...

    Yes, I know what you said. It was incorrect in that 1) the virtual address space cannot be 'extended' and 2) the additional RAM can be put to good use without any application support (though can...
  23. Replies
    85
    Views
    8,274

    Please explain how that alleged difference...

    Please explain how that alleged difference applies to the specific situation under discussion here, where until now XP's flaws and vulnerabilities were getting publicized but NOT by and large getting...
  24. Replies
    25
    Views
    5,802

    Good chance for 'yes' there too (there are often...

    Good chance for 'yes' there too (there are often mitigation procedures available to use), though by no means a lock. The latter possibility was the whole point of the exercise I described about...
  25. Replies
    25
    Views
    5,802

    So let's see: XP users who are actually using IE...

    So let's see: XP users who are actually using IE rather than already using something more appropriate can protect themselves by disabling vgx.dll (as can any other IE users on other Windows...
Results 1 to 25 of 430
Page 1 of 18 1 2 3 4