corsac
|
2009-10-28
, 10:12
|
Posts: 94 |
Thanked: 28 times |
Joined on Oct 2009
|
#91
|
|
2009-10-28
, 11:03
|
|
Posts: 445 |
Thanked: 572 times |
Joined on Oct 2009
@ Oxford
|
#92
|
|
2009-10-28
, 11:05
|
Posts: 2,802 |
Thanked: 4,491 times |
Joined on Nov 2007
|
#93
|
The Following 4 Users Say Thank You to lma For This Useful Post: | ||
|
2009-11-06
, 14:01
|
|
Posts: 3,105 |
Thanked: 11,088 times |
Joined on Jul 2007
@ Mountain View (CA, USA)
|
#95
|
|
2009-11-06
, 20:23
|
Posts: 286 |
Thanked: 259 times |
Joined on Jan 2006
@ Cambridge, England
|
#96
|
Just like in any serious OSS conference, uploading the videos is taking longer than expected but we are working on it. :/
|
2009-11-07
, 04:48
|
|
Moderator |
Posts: 7,109 |
Thanked: 8,820 times |
Joined on Oct 2007
@ Vancouver, BC, Canada
|
#97
|
Just like in any serious OSS conference, uploading the videos is taking longer than expected but we are working on it. :/
|
2009-11-07
, 06:19
|
Posts: 474 |
Thanked: 283 times |
Joined on Oct 2009
@ Oxford, UK
|
#98
|
I understand there is an open and closed mode, but I gather that Maemo Security will use access control that is likely to be implemented below Root level, so can't Maemo 6 continue with the x-term even in closed mode? I rarely need root level access, it is more about my preference to manage files using the x-term, using it for SSH and simple geekness of having an x-term on a handheld device!
|
2009-11-07
, 06:32
|
Posts: 474 |
Thanked: 283 times |
Joined on Oct 2009
@ Oxford, UK
|
#99
|
In principle it could make use of Linux containers to support "side by side" DRM and no-DRM environments, with "root" available to the no-DRM environment, but the no-DRM environment is limited in what it can do to the DRM environment.
The kernel of course could not be modified if you have a DRM environment running.
|
2009-11-07
, 06:39
|
Posts: 474 |
Thanked: 283 times |
Joined on Oct 2009
@ Oxford, UK
|
#100
|
lbt's blog (thanks, qgil) raised a good point that has bothered me for a while now. With all of its new telephony features, the N900 can be seriously exploited by hackers, and we're going to have to work as a community to, as qgil said, encourage Extras apps and discourage the use of random, unknown repositories.
Having seen how easy it is to make a silly app for Facebook and get everyone to use it, it sends shivers down my spine to think of how hackers could post an .install file that points to a malicious repository full of nasty trojans and exploits disguised as fun little games.
The Following User Says Thank You to jjx For This Useful Post: | ||