Feeds:
Posts
Comments

Archive for the ‘OS’ Category

Chrome Error Symantec
Chrome it is!
I just downloaded it and tried to run it with this disappointing message:

The application failed to initialize properly (0xc0000005). Click on OK to terminate the application.

Some googling around brought me to this blog that had all links neatly ordered.

Seems the problem exists for users of Symantec Endpoint Protection (aptly abbreviated SEP).

Even without this activated, there is an underlying default rule that prevents Chrome from spawning process threads for it’s sandboxing (*). Just google around for Sysplant.sys and you will notice that Chrome isn’t the only one to suffer from this problem.

There are 2 solutions to this issue:
1) disable the sandboxing, but this basically defeats some of the strongest points of the browser. How to do it : Right click on the desktop icon (or menu icon) that launched Chrome and choose properties. Then add at the end of the target string (after the quotation marks) a blank and then –no-sandbox.
This turns off the sandbox behaviour of Chrome.

2) Disable Symantec’s behaviour as described here on the Symantec forums (you need admin access to your PC for this and this will also not work where the policies for Symantec Endpoint Protection are set centrally by your sysadmin.

1) Back up the registry on an affected system.
2) Open the registry on the Agent system by entering regedit from a run prompt.
3) Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SysPlant.
4) Open the Start DWORD.
5) Change the value to 4 to disable the drivers.
6) Reboot the system to commit the changes.

I personally prefer solution 3: Remove Symantec entirely and install a decent anti-virus/system protection system, but if you are stuck with the vile piece of crap that Symantec is, then option 2 is the preferred one untill Google launches an official solution (not workaround) for this issue.

(*) Chrome makes a separate operating environment for each process (group) it starts. Basically every tab ends up in its own micro environment thus preventing crashing tabs from taking your entire browser with them. More on this in Google’s explanation I mentioned in the post before.

Advertisements

Read Full Post »

Classic Monopolygame
Yesterday judge Colleen Kollar-Kotelly extended with two more years to oversight of Microsoft due to its non-compliance to the 2002 settlement on anti-trust charges.

While the filing states originally asked for oversight untill 2012, the judge leaves open the option to extend it beyond 2009.

(via The Register)

Read Full Post »

Photo Sharing and Video Hosting at Photobucket
As of today you can also enjoy Boing Boing in online TV format. They promise us small TV chunks every workday. First one can be found here.

Read Full Post »


Since about a few hours Microsoft’s WGA (Windows Genuine Advantage) Servers are down. As a result any XP or Vista install that tries to connect to this server doesn’t get a valid response and hence assumes the install is illegal.
Even if you previously did validate as a genuine Windows install, it will now claim your install is illegal or otherwise incorrect and as a result cut several features down to a reduced version of what you bought.

So you see: you never really buy Windows, your install just gets owned (or should that be pnwd) by Microsoft. You only pay for a “right to use”. No big deal you may think, but an issue like this means that in case MS decides to pull the plug on the WGA servers for XP (e.g. to boost Vista sales) your XP install suddenly degrades to the dreaded WindowsMillenium functionality.

(first mentioned on boingboing and on the MS forums)

Update : now also on Digg

Update 2 : and on arstechnica

Update 3 : and we have a solution from the maison des fenêtres themselves.

Update 4 : could this be the reason ? Also, following that guy’s report of what happened. In countries like UK where unauthorized entry in one’s computer is seen as a crime (ref. Computer Crime Act) so does this make MS punishable? I wonder how long it will take for mainstream media to pick up this one (especially this last update).

Read Full Post »

Photo Sharing and Video Hosting at Photobucket
Finally there is a breakthrough in the whole SCO debacle.
On friday the judge slashed all SCO’s hope on any further wins.
According to the judge they do not own the copyright to Unix.
So from now on they will see an avalanche pf problems coming their way:

  • SCO vs. IBM : they have no leg to stand on since what IBM alledgedly infringed upon in not SCO’s.
  • Customers vs. SCO: a lot of people got “FUD-ed” into buying a Unix license from SCO a rato of $699 per CPU. They cannow allgo to small claims court andvery easily claim their money back. Off course they will have to close the line on other former partnersand victims in order to collect.
  • Microsoft forked over some $30 Milion to SCO unther the terms of a Unix usage deal. However, they did pay for something that wasn’t SCO’s. Furthermore, in the community it was strongly suspected that MS payed up as a kind ofsponsoring of SCO to slander linux, Novel and IBM in one go. The effort however did not pay off as SCO lost the fight. Keeping in mind MS’s vulturelike behaviour in past situations, it would not surprise me of they passed the counter to collect here.
  • Novell will also very likely claim all the collected Unix fee’s as theirs since they arenow the only true copyright holder on Unix.
  • The state and court for fraudelous and frivolious lawsuits. Apart from this one, any further suit SCO brought on other parties with regards to the Unix copyright have no longer any merit.
  • Red Hat and other Linux vendors to claim various kinds of libel, slander, threats, …

Well the fun had to end somewhere. And on monday we will see if there is any value left on SCOX stock.

update : BOOM, opened this morning at $0.45  a share, which is down over 70%! See them vultures circling the sky above …

Read Full Post »

First coined at the end of 2005, when even web 2.0 was still a strange sounding name for the new web to come, web 3.0 now really starts to appear in real life and in more manifest forms.

Although I agree we now only see the power of web 2.0 unleashing it’s full potential, web 3.0 starts shimmering through and it’s more than just a powered up version of web 2.0.
Off course, what we see of it is not yet mature and needs a serious portion of work, but it most definitely manifests itself.

But let’ just look back to what web 3.0 stands for (this is just a shortlist of the most known definitions):

Photo Sharing and Video Hosting at Photobucket

You can keep going on adding definitions, but the basic premisis is that web 3.0 will add another layer of complexity in the archieved tasks while downgrading the difficulty.

For example, getting an article online required in the early days that you could write static HTML (even if in the end there were WYSYWYG editors). Next came the blog and CMS software that enabled web 2.0 and leveraged it due to the easy method for anyone to get text online. Web 3.0 will allow you to assemble you article in any way you want and mold it into any form you want.

The driving force behind this evolution towards web 3.0 is well understood by people like Sramana Mitra who described it well in this readwriteweb article.
Off course the classical group of people tend to see the push behind the move to web 3.0 coming from businesses and the need for business applications where they fail to notice that this collides with the idea of the driving factor behind web 3.0.

But if you look at the above list of web 3.0 definitions you will surely notice in each of these fields we are gaining ground :

  • Evolution: the tendency towards “execute” on the web is growing, think of Google’s list of applications they offer now as well as online applications like Basecamp.
  • Availability: with the iPhone now out the web 2.0 on mobile milestone is now definitely reached and we’re on the way to the next steps. s the tools for extra high speed broadband access increase in capacity while shrinking. See for example the PCMCIA card to connect to Wimax , the 802.11N speed routing gear (same size or smaller than those bulky 802.11A access points and receivers) the concept of wireless grid/meshing embedded in the architecture of the OLPC 100$ laptop. And now you already find some (pimped) fridges with web access, but then again you can now also buy an entire web server on an ethernet plug no bigger than a sugar cube.
  • Content: The earlier mentioned Basecamp/Backpack project supporting framework of online applications, Google’s package of online desktop tools (mail, calendar, contact, spreadsheet, documents, photo’s, …) which also integrate through the Google desktop tool with your desktop. Google gears which brings the notion of “online” to a new level (not necessarily by it’s novelty, but more due to it’s practical use) and not to forget the never-ending list of integration API’s for Facebook.
  • Architecture: Where Google Gears brings off-line and online closer, Bittorrent and the likes bring bandwidth to a new dimension (and help clogging it, off course). But also new concepts arise to intelligently handle traffic and not by throttling it but for example with advanced multi-casting, preliminary caching of data in network nodes and advanced load balancing do arise and bring a more grid like and intelligent aspect to the network. At the same time we notice increased granularity of the network with solutions like FON who support meshed wireless networking a bit like he earlier mentioned OLPC.
  • Driving factor: although the urge to form networks and communities tend to drive people to newer web services (both in consuming as wel as in developing them), the individual aspect increases. Where before people tended to cluster together in communities and hid in their anonimity, you now see more and more explicit individuality. This could be partially attributed to the fact that most people by now have a distinctly developed online personality, either very explicit on MySpace, Facebook or LinkedIn or more illicit in the various occurrences like blog posts, replies, del.icio.us bookmarks and Flickr photo’s.
    But people expect their online life to be more personalised. You log into Google once and your profile follows you around on gmail, calendar, reader, blogger. you log on to Yahoo and you are immediately logged on to Flickr. Your WordPress login is now a universal ID that you can use all over the web.
    Although you are part of a community, use an alias, have restricted access sites, … you still want it to be individual.

To finish just have a look at Yahoo’s pipes. It was well constructed, allows a more or less drag and drop method to collect and manipulate online data. both your own as somebody else and blend it together into a dish that you like to consume. the reason however this service is not running rings around the internet is that it is still too complex, requires more intimate knowledge of rss feeds, requires the user to know his or her favourite feeds, …
The day anybody with a bit of brains can manage and manipulate his or her “pipes” the way they want with the result they want we will have reached web 3.0 and others will be dreaming already of web 4.0 or 5.0.

Read Full Post »

Photo Sharing and Video Hosting at Photobucket
Once in the store we notice the mysteries and locks of the iPhone are peeled off bit by bit.

First of all there’s the usability aspect. Having no keyboard would kill blind typing, well it doesn’t if you read the reports.

Second, the applications on the iPhone wouldn’t be sufficient and awkward to use. Apparently they are not, after all, it is still Apple we’re talking about. Whether or not you find them sufficient is off course up to your own requirements and will also depend on the number of applications designed by others.

Third it would not sell. Well they did not yet reach the 1 milion pieces predicted for end of this year, but the opening weekend alone already accounted for 500000 to 700000 pieces sold, depending on the sources.

And now for the locks :

First off all, it is possible to use the iPhone without any form of subscription whatsoever, by using DVD Jon’s method.
The other option is to subscribe and then cancel within 2 days, allowing for a refund so basically you nealry don’t loose any money.
Third, an iPhone restore image is in the wild now. Nearly immediately it was found out that there was a naked password file available from the image which could easily be cracked using as mentioned John The Ripper on full disclosure already on sunday. Net result : password cracked in 3 days.

Expect the iPhone to quickly loose it’s simlock too, especially when they show up in Europe where linked sales is not allowed in some countries. As a result, apply will have to sell the phone without ties to a carrier. From then on it’s just a matter of copying an image of an unrestricted phone to unlock yours.

Read Full Post »

Older Posts »