-
Recent Posts
Recent Comments
Archives
- February 2023
- January 2023
- December 2022
- November 2022
- September 2022
- August 2022
- June 2022
- May 2022
- March 2022
- January 2022
- December 2021
- December 2020
- November 2020
- October 2020
- August 2020
- June 2020
- May 2020
- February 2020
- December 2019
- October 2019
- September 2019
- August 2019
- July 2019
- May 2019
- March 2019
- January 2019
- May 2018
- April 2018
- March 2018
- February 2018
- January 2018
- November 2017
- October 2017
- May 2017
- March 2017
- February 2017
- January 2017
- December 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- September 2015
- August 2015
- June 2015
- April 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- April 2014
- March 2014
- February 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- September 2009
- August 2009
- July 2009
- June 2009
- May 2009
- January 2009
Categories
Meta
Monthly Archives: January 2012
Another root exploit for linux
A few days ago, the following exploit was published: http://blog.zx2c4.com/749 Another small step in debunking the myth of linux security. What is also interesting is that this bug was introduced only recently: In 2.6.39, the protections against unauthorized access to … Continue reading
Intel Medfield vs ARM
I did an article on ARM and x86 about a year ago, since multicore ARMs were up and coming, and Windows 8 would allow them to be used in netbooks, notebooks or even desktops, as competing solutions to x86. That … Continue reading
Posted in Hardware news, Software news, Uncategorized
Tagged ARM, CISC, Intel, RISC, Windows 8, x86
13 Comments
Why I don’t use linux (and why you shouldn’t either)
As you may know, I have nothing against open source software. In fact, I am both a user of FreeBSD, and a developer of open source projects. But linux never sat well with me. It’s not so much the software … Continue reading
Just keeping it real, part 5.1
Picking up where I left off in part 5, the subpixel-corrected polygons on Amiga: The subpixel-correction in itself appeared to work. My analysis of the input terms for the blitter’s linedrawing appeared to be correct: you can specify the error-term … Continue reading
nVidia’s shader use for tessellation is NOT, I repeat NOT different from AMD’s
For some reason I keep reading the same misinformed nonsense about tessellation. A lot of people seem to think that nVidia somehow ’emulates’ tessellation on their shaders while AMD has a fixed-function unit. And for some reason they think that … Continue reading