Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Harvesting Wi-Fi Backscatter To Power Internet of Things Sensors

AYeomans Why use wireless power? (138 comments)

... when there's much more energy in light or heat?
Solar cells power calculators and garden lights pretty well. Domestic lights put out 5-100 watts of power distributed around a room.
Wifi power levels are much lower - 0.15 watts or so.

about a month and a half ago
top

How Stanford Engineers Created a Fictitious Compression For HBO

AYeomans Re:Meh (90 comments)

Metadata? You just let the NSA store it for you.

about 2 months ago
top

What Are the Genuinely Useful Ideas In Programming?

AYeomans Packaging and productionising (598 comments)

No mention of how to make professional installation packages which can be maintained in a production environment.

Really the list is "things every coder should aim to know". Need much more to get the "software engineer" label.

about a year ago
top

What Are the Genuinely Useful Ideas In Programming?

AYeomans Security (598 comments)

Amazingly security, secure programming, defensive programming, security testing don't make the list.
Maybe that's why there are so many code vulnerabilities out there.

about a year ago
top

Researchers Release Tool That Can Scan the Entire Internet In Under an Hour

AYeomans Re:Slashdotting the Internet (97 comments)

Maybe it will, especially if people have high bandwidth connections. But I suspect most people will be on ADSL or cable.

Now the default zmap syn scan uploads 432 bits (54 bytes) per packet, that's 14 bytes Ethernet frame, 20 bytes IP and 20 bytes TCP. Which means the full 2^32 IPv4 address range needs 1.855 Terabits upload. That's 0.51 hours at 1 Gbit/sec, or 5.15 hours at 100 Mbit/sec, or 51.5 hours at 10 Mbit/sec, or 515 hours (21.5 days) at a more common ADSL uplink of 1 Mbit/sec. Remember the A in ADSL is for Asymmetric - uplinks are much slower than downlinks.

(These are not quite right - times could be faster if large parts of the address space are black-listed, also there's no need to transmit all the Ethernet header on the uplink, the actual number of bits depends on connection technology.)

about a year ago
top

Ask Slashdot: Light-Footprint Antivirus For Windows XP?

AYeomans Simplicity! (294 comments)

Check out http://www.simplicitycomputers.co.uk/.

They make computers specifically designed for novice and more elderly users. You can either get full computer systems, or a USB "homekey" to boot other computers. It's based on Linux Mint, by the way.

(You don't mention whether you volunteer or get paid to service computers. If you get paid, avoid this approach as you might be out of a job! But if you volunteer, it should cut your maintenance workload.)

about a year ago
top

NSA Backdoors In Open Source and Open Standards: What Are the Odds?

AYeomans The old ones are the best... (407 comments)

As mentioned in alt.privacy in 1993:-

A lot of people think that PGP encryption is unbreakable and that the
NSA/FBI/CIA/MJ12 cannot read their mail. This is wrong, and it can be a deadly
mistake. In Idaho, a left-wing activist by the name of Craig Steingold was
arrested _one day_ before he and others wee to stage a protest at government
buildings; the police had a copy of a message sent by Steingold to another
activist, a message which had been encrypted with PGP and sent through E-mail.

                Since version 2.1, PGP ("Pretty Good Privacy") has been rigged to
allow the NSA to easily break encoded messages. Early in 1992, the author,
Paul Zimmerman, was arrested by Government agents. He was told that he
would be set up for trafficking narcotics unless he complied. The Government
agency's demands were simple: He was to put a virtually undetectable
trapdoor, designed by the NSA, into all future releases of PGP, and to
tell no-one.

                After reading this, you may think of using an earlier version of
PGP. However, any version found on an FTP site or bulletin board has been
doctored. Only use copies acquired before 1992, and do NOT use a recent
compiler to compile them. Virtually ALL popular compilers have been
modified to insert the trapdoor (consisting of a few trivial changes) into
any version of PGP prior to 2.1. Members of the boards of Novell, Microsoft,
Borland, AT&T and other companies were persuaded into giving the order for the
modification (each ot these companies' boards contains at least one Trilateral
Commission member or Bilderberg Committee attendant).

                It took the agency more to modify GNU C, but eventually they did it.
The Free Software Foundation was threatened with "an IRS investigation",
in other words, with being forced out of business, unless they complied. The
result is that all versions of GCC on the FTP sites and all versions above
2.2.3, contain code to modify PGP and insert the trapdoor. Recompiling GCC
with itself will not help; the code is inserted by the compiler into
itself. Recompiling with another compiler may help, as long as the compiler
is older than from 1992.

about a year ago
top

Botched Security Update Cripples Thousands of Computers

AYeomans Does anyone track the hsitory of bad updates? (274 comments)

While there are lots of reports of bad updates from the various AV vendors in news articles, does anyone consistently track the history of these bad updates by vendor, date, and ideally impact?

about a year and a half ago
top

Ask Slashdot: Rescuing a PC That's Been Hit By Scammers?

AYeomans Re:Just the obvious (320 comments)

Just install GRUB to the MBR! Usually automatic when installing Linux.

about 2 years ago
top

Ask Slashdot: How To Clean Up My Work Computer Before I Leave?

AYeomans Re:Nuke it from orbit (547 comments)

Note this won't necessarily work when writing zeros - you might get a file with a "hole" in it. Been there, done it, noticed the problem when getting ridiculously fast transfer times for the dd command.

more than 2 years ago
top

Ask Slashdot: How To Clean Up My Work Computer Before I Leave?

AYeomans Re:Nuke it from orbit (547 comments)

http://computer-forensics.sans.org/blog/2009/01/15/overwriting-hard-drive-data/ has some experimental stats on recovering known bits of data from drives. Note "bits" - longer strings have rapidly diminishing probability of getting anything back.

Back in the old days of floppy disks, though, it was fun to demonstrate recovery of data, especially when they had been written on a 40-track drive and read on an 80-track drive.

more than 2 years ago
top

Ask Slashdot: How To Clean Up My Work Computer Before I Leave?

AYeomans Re:Nuke it from orbit (547 comments)

ccleaner for Windows http://www.piriform.com/CCLEANER has an option for overwriting free space. So you could delete all your files, profile, user registry, temp files. Empty waste bin, then use the ccleaner wipe free space option. And hope you remembered everything that needed deleting.

more than 2 years ago
top

Ask Slashdot: How To Clean Up My Work Computer Before I Leave?

AYeomans Re:Nuke it from orbit (547 comments)

Once is probably enough, but not always for SSDs. (Not that the original poster has those on a 10 year old machine ;-)
Some of those may de=duplicate identical blocks. Under some circumstances, writing zeros with dd (e.g. to a file) will result in the creation of a file with "holes" rather than overwriting the file.

A reasonably safe process is to write changing pseudo-random data to all blocks, then write zeros to all blocks. Won't necessarily delete any reallocated bad blocks, but you can't read those through normal drive operations. A pass of zeros makes it easy to check the disk is clean and is nice to later users of disk imaging software, as that software has no need to copy zero blocks. But that's bordering on OCD tidiness!

more than 2 years ago
top

Ask Slashdot: How To Clean Up My Work Computer Before I Leave?

AYeomans Re:Nuke it from orbit (547 comments)

As I note earlier, photorec http://www.cgsecurity.org/wiki/PhotoRec will get the data back easily. And it's free.
(Working out which recovered files are useful is another matter, most filename information won't be recovered.)

more than 2 years ago
top

Ask Slashdot: How To Clean Up My Work Computer Before I Leave?

AYeomans Re:Nuke it from orbit (547 comments)

Photorec will get it back, do-dah, do-dah
Photorec will get it back, all the do-dah data!

Seriously, http://www.cgsecurity.org/wiki/PhotoRec will recover practically everything after a simple format and re-install.

more than 2 years ago
top

Android Phones Get Dual Accounts

AYeomans A long time ago... (109 comments)

... in a decade far, far away we used to use multi-user operating systems. Which used to keep one user's data private from another - unless they explicitly wished to share. They also let the sysadmin install software packages for everyone to use, or each user could run their own local programs - which could not access other user's data.

Sounds familiar? So why propose a "solution" that only gives application-layer (rather than OS-layer) protection between users? That only protects properly one (corporate) user - isn't my personal data of at least equal value? That can't easily be extended to several users (think "e-banking user" which shares no data at all with "games user")? And there's no inherent reason why the different user programs can't share the same display screen either, with different passwords and screen lock timeouts - so you don't need a password to run Angry Birds, but do to unlock your contacts.

more than 2 years ago
top

Ask Slashdot: Create Custom Recovery Partitions With FOSS?

AYeomans Re:Redo Backup & Recovery (133 comments)

+1 for this. Not at all geeky to use - it's a neat front end to partclone (partclone.org).
Compresses the filesystems, so it can be really fast to restore, especially if you clean it up (CCleaner) and defrag it first.
You can also put this on a bootable CD/DVD with the restore image.

more than 2 years ago
top

Ask Slashdot: What OS For a Donated Computer?

AYeomans Re:Ubuntu (360 comments)

Also consider how much time and money it takes *you* to install the systems in the first place. Especially if the PCs need to run an office suite, music, video and photo software.

What I've personally done is:
a) boot up Ubuntu off USB stick
b) wipe the whole hard drive using "dd if=/dev/zero of=/dev/sda bs=10M" (10 secs your time, 20-30 mins elapsed [typically ~2GB/minute])
c) Install Ubuntu (1 min your time, 10 mins elapsed when using USB)
d) Install updates (1 min your time, 30 mins elapsed if off internet, 10 mins if off USB).

If you are installing lots of machines, consider updating the USB with all updates. If you have older machines, consider Lubuntu instead. The OEM install is nice if you want the recipient to create the initial account.

If you need to use Windows, the same principles apply. Use a USB drive to install it, it's faster than CD. Download all pieces of software and updates, also to USB. But you will need to run rather more installers than with Ubuntu. How much is your time worth?

more than 3 years ago
top

Ask Slashdot: Easiest Linux Distro For a Newbie

AYeomans Re:Ubuntu + VMWare Player (622 comments)

Quite right, installing pure Windows 7 on a newish machine is about as easy as installing Ubuntu.

Installing a usable computer system is another matter though. On Ubuntu, you already have office, music and photo software, and a few clicks on the Software Centre menus gets you any other software and codecs you want. On Windows, you will need to find quite a few more applications, each from their own website, and download and install them in a myriad of ways.

Wouldn't it be nice if there was a Windows App Store even half as good as any major distro's repository?

more than 3 years ago

Submissions

AYeomans hasn't submitted any stories.

Journals

AYeomans has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>