Language Selection

English French German Italian Portuguese Spanish

"Kid Computers"

Filed under
Linux
Hardware

Halloween night is now the official time of the year I start my Christmas shopping. Having seen a really cool toy on TV I thought my youngest nephew would like I went to my local Toys "R" Us and began to search the store. When I found no sign of the object of my attention it was time to look a bit for me. Even a 38 year old uncle likes toys.

So I went into the electronics section and asked about Wii availability. Then a nutty idea came to me, in a toy store yes, I asked, about "sub notebooks". The guy said that we didn't have anything except "kid computers" I looked over in the direction he was pointing and saw the "Eee" display. "Kid computers", I thought? Happy to see them I noticed the white Eee701 was Windows XP and with no flag logo I assumed (and the sales guy told me I was right) that the black Eee701 was Linux. What a great surprise to actually see the Eee701 in an electronics section of a toy store. But all they had were 701s and my paws won't handle a 701 with any great comfort. So I told the sales guy I was looking for a 1000 and thank him for his time.

The drive to my next destination that evening was occupied with the phrase "kid computers," in a tone reminiscent of Colin Baker's version of the Doctor in an "are you that stupid not to know this" attitude?

Rest Here




More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News