lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080313162711.3d483e6c@cuia.boston.redhat.com>
Date:	Thu, 13 Mar 2008 16:27:11 -0400
From:	Rik van Riel <riel@...hat.com>
To:	Daniel Phillips <phillips@...nq.net>
Cc:	Alan Cox <alan@...rguk.ukuu.org.uk>,
	David Newall <davidn@...idnewall.com>,
	linux-kernel@...r.kernel.org
Subject: Re: [ANNOUNCE] Ramback: faster than a speeding bullet

On Thu, 13 Mar 2008 11:14:39 -0800
Daniel Phillips <phillips@...nq.net> wrote:

> Scream is an exaggeration, and FUD only applies to somebody who
> consistently overlooks the primary proposition in this design: that the
> battery backed power supply, computer hardware and Linux are reliable
> enough to entrust your data to them. 

That's a reasonable enough assumption, to anyone who has never dealt
with software before, or whose data is just not important.

People who have dealt with computers for longer will know that anything
can fail at any time, and usually does unexpectedly and at bad moments.

Some defensive programming to deal with random failures could make your
project appealing to a lot more people than it would appeal to in its
current state.

-- 
All Rights Reversed
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ