Sunday, January 17, 2010

Microsoft Windows

So, I was trying to find some equivalent software between Mac and PC. I notice that there is virtually never a directly equivalent application, but I came to determine that Device Manager and System Profiler.

Anyway, I feel that I get more information from the Mac application and with less annoying dialog boxes. However, one can disable devices right from there on the PC. I think that apple gives you enough information to remove the appropriate KeXT's but Windows should not allow you to disable the processor, etc. It can get very dangerous. So, I am going to have to side with the System Profiler but I do give Windows 7 Device Manager its honorary mention. However, I do like how it can let you view the devices of other computers, and scan for hardware changes. But, then again Mac has console for that. I guess if you put System Profiler with Console then you get the same functionality.

This is why I don't like debating OS's for each bit of software, because there is rarely one software that has a functional equivalent so note that I am not comparing OS's, but rather comparing two similar (although not equivalent) pieces of software.

Monday, January 11, 2010

Little Trick

Let's say that you cannot find your mouse. What do you do?

The easiest thing to do is to just push your mouse or trackpad all of the way to the top left. After one or two strokes, depending on the size of your monitor, the mouse will be at the top left where it is fully visible.

Windows 7: File Manipulation Dislikes

I think that when you are using Windows Explorer in Windows 7 there is a problem with the overall idea. They give you too much information that is not necessary at the time when you are performing and action, particularly copying and pasting files.

This is proof to my theory that one of the major problems of Windows Explorer in Windows 7 is a lack of an intuitive system. It just doesn't know what to show you when. The only time it does is when it simply modifies the bar below the menu bar that gives you options. Even then, the location of items in the "organize" menu is not intuitive.

If Microsoft wants to get going they are going to have to make more intuitive products.

Friday, January 8, 2010

Data Encryption

So, I was contemplating some security ideas.

I thought this might be safe:
1. User 1 has his file and adjusts the binary on a side determined by his private key and reversible by his public key
2. This side is modified/locked
3. User 2 modifies/locks his side. It is important to know that 1 at each end of the halves must not be modified.
4. User 1 unlocks his side
5. User 2 unlocks his side

However, after contemplation I realized it is still not safe.
If user 2 used some form of redundancy to recover what he locked he must be protected from Mallory otherwise his lock can be found.

Also, Mallory only needs to accept the proper amount of data packets. If she knew both halves after User 1 initially sent it she could then notice what changes were made by User 2. This meant that Mallory could deduce what User 2 encrypted. Now, all she has to do is note what was decrypted by user 1 and now she has both halves.

I don't think data can be TRULY 100% always secured. What do you think?

Then, one could say that the users should be able to modify anything, even modify what was modified by the other user. So, let's say that happens. Well, in order for user 1 to decrypt their side they might would have to put it back in order. For example, let's say I sent YOU 10101. I encrypt it to 11101. Then you, not aware of what I corrected, encrypt it to 10001. I couldn't simply undo my actions because that means I change it to 11101 and send it to you. You would then undo your corrections and get 10001, which is obviously not 10101. This is lossy and lousy. Anyway, so then, I would use a redundant/error-checking system. Now, if Mallory could crack my computer they would have that. Thus, the message is not secure.

In sum, you can only have a secure setting if compression, and encryption are used to the fullest extent AND Mallory can not get into your computer.

Search This Blog