Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

MIPS Tempts Hackers With Raspbery Pi-like Dev Board

Fnord666 Re:no price? (79 comments)

There's no price yet because they're giving away the first production run to people who are going to do interesting things with them.

The program is now closed anyway, so I guess we'll just have to wait and see

Thanks for your interest in the MIPS Creator CI20 development board. While the current programme is now closed, stay tuned for more information as the Creator programme progresses as part of the Imagination community.

2 days ago
top

TechCentral Scams Call Center Scammers

Fnord666 Re:They'd better learn Android... (247 comments)

Windows is on its way out, and soon everyone will be using a Mobile OS -- the scammers will IM you and claim they need to connect to your tablet or phone to remove malware.

Or have I just come up with the next great thing(tm)?

Quick, file a patent application!

5 days ago
top

TechCentral Scams Call Center Scammers

Fnord666 Re:I know two victims (247 comments)

I know two elderly people, both bilked out of $300. I see dozens of stories in this thread about how so many of us have been called and how you like to string them along and frustrate them. I've been called at least a dozen times. We need something other than just frustration to battle them. How can we prepare tools and tactics to respond and try to stop this?

Follow the money. If the scammers don't get paid then they go away. Hit them in the bank account.

5 days ago
top

"MythBusters" Drops Kari Byron, Grant Imahara, Tory Belleci

Fnord666 Re:good (361 comments)

Too much fluff, and in some cases not enough rigor in their tests for my liking.

In some cases? I'm not sure they have ever conducted a test that would be considered scientifically rigorous. I would suggest that if they were to submit their work for publication it would get bounced right back, but I've seen what passes "peer review" these days so I won't.

about a week ago
top

Do Readers Absorb Less On Kindles Than On Paper? Not Necessarily

Fnord666 Maybe this had something to do with it (105 comments)

Maybe this little tidbit, found at the end of the article, can shed some light on the cause of the difference.

The Elizabeth George study included only two experienced Kindle users, and she is keen to replicate it using a greater proportion of Kindle regulars. But she warned against assuming that the "digital natives" of today would perform better.

about two weeks ago
top

Rightscorp's New Plan: Hijack Browsers Until Infingers Pay Up

Fnord666 Re:As long as... (376 comments)

The difference is, you can't do much to force them to pay up, while they can cut off your internet access (and your livelihood) to get *you* to pay up.

Once you have a judgement against them you can turn the process over to a collection agency for a portion of the proceeds. Use the court to file a lien against their assets, equipment, etc. There's all kinds of fun you can have with this if you wish.

about two weeks ago
top

Rightscorp's New Plan: Hijack Browsers Until Infingers Pay Up

Fnord666 Re:Amost sounds like a good deal ... (376 comments)

Pay $20 versus hiring a lawyer and attempting to sue a wrongful accusation.

Or hold the ISP responsible for being complicit it this extortion scheme and take a chain saw to their fiber bundle.

about two weeks ago
top

Rightscorp's New Plan: Hijack Browsers Until Infingers Pay Up

Fnord666 Re:Now what could go wrong? (376 comments)

Are you sure you didn't sign it over to dice when you posted here? No, I am not willing to go wade through the Slashdot TOS to check right now.

No need. Just read the bottom of the page.

Comments owned by the poster.

about two weeks ago
top

Knocking Down the Great Firewall of China

Fnord666 Re:No signup without a Google Account? (167 comments)

No. Nobody can explain that because that is not the purpose of the tool....They can access a lot more content using this tool, not the same content more securely.

Incorrect. It does improves security by building a web of trust that makes infiltration by an opponent more difficult. It also improves security by compartmentalizing connection and peer information so that if a opponent does infiltrate the system, the amount of information that they can obtain about other participants is drastically reduced compared to other systems..

"In order for a censor to discover the IP addresses of your computer, they'd have to somehow convince you that they're a friend." Fisk explained. "It uses these real-world trust relationships to protect the IP addresses of these proxies because when you run Lantern in the uncensored world, you are a proxy.

Through a process called consistent routing, the amount of information any single Lantern user can learn about other users is limited to a small subset, making infiltration significantly more difficult.

about two weeks ago
top

NFL Fights To Save TV Blackout Rule Despite $9 Billion Revenue

Fnord666 Re:I fail to see why this is relevant... (216 comments)

I fail to see how this is relevant to the /. audience or how this matters in any meaningful way. It is professional sports after all...quite possibly one to the most useless aspects of our culture.

It is relevant to today's /. because it is a controversial topic that is likely to draw many comments which turn into page views and ad impressions. You must be thinking about the old /. which went away quite some time ago.

Having said that, it is also meaningful to you because you likely pay, via several different avenues such as taxes and cable fees, money to support the NFL.

about three weeks ago
top

NFL Fights To Save TV Blackout Rule Despite $9 Billion Revenue

Fnord666 Re:Punishes fans? (216 comments)

Also the horses become much more pleasant to be around when they are breeding.

Funny, I'm the same way.

about three weeks ago
top

FCC Mandates Text-to-911 From All US Wireless Carriers

Fnord666 Re:Changing nature of 911 (80 comments)

I don't think that's the intended use at all.

I'm guessing they're expecting texts more like "someone broke into my house, and I'm hiding in the closet", or "my husband is abusing me, and thinks I'm just cleaning up in the bathroom, but I need help", etc. Situations where being discreet is important, situations where people currently try to text 911, and often get no response.

Agreed. I don't think it's intended to replace a 911 call, but to provide an alternative in situtations, such as you provided, when a 911 call might not be practical. Another example would be during a mass casualty event where 911 calls can't get through because the towers are saturated. SMS messages use essentially no bandwidth and would be able to get through, providing emergency services and first responders with additional information about injuries, people who are trapped, etc.

about three weeks ago
top

FCC Mandates Text-to-911 From All US Wireless Carriers

Fnord666 Re:Great! (80 comments)

What carrier changes you for 911 phone calls? You don't even need a SIM card to make a 911 call.

All of them, but they don't charge the caller. They charge their subscribers. Subscribers are charged a number of vaguely described monthly "fees" like "Universal Service Fee". These fees are supposed to pay for mandated features like the ability to call 911. Another one of these "fees" pays for the the ability to port a number from one carrier to another. These mandated features only get imposed if the carriers get an approved way to bill customers for them somehow.

about three weeks ago
top

Yahoo To Add PGP Encryption For Email

Fnord666 Re:Why should anyone trust this or any other (175 comments)

I know PGP is open source, but who knows enough about both encryption math and programming to actually verify that the code is safe, and why should anyone trust them?

I do and many others do as well. Hopefully at least some of these others are outside of the reach of the US.

about three weeks ago
top

Yahoo To Add PGP Encryption For Email

Fnord666 Open Source? (175 comments)

It sounds like they plan on making the extension open source, which is mandatory or the whole thing is a non starter. Furthermore you better be able to match the checksum of the source version to the addons that might be available from the addon repositories for the browsers. We have to be able to confirm that what they say is the code is in fact what we are running in the browser.

Personally I'm not interested in anything that involves uploading my private keystore to a third party, encrypted or not, and without that you lose the main feature, portability, that comes with webmail.

about three weeks ago
top

Ask Slashdot: "Real" Computer Scientists vs. Modern Curriculum?

Fnord666 Timothy's Streak Continues (637 comments)

Hey Timothy, have you ever noticed that submenu over on the left of the front page? You know, the one that lists the various sections that you can posts stories to? Ever notice that there is one called "Ask Slashdot", which just happens to match up exactly with the premise of this story, not to mention the title. Why don't you do all of us who filter by section a favor and try posting "Ask Slashdot" stories to the "Ask Slashdot" section every once in a while? Thanks

about three weeks ago
top

The World's Most Hackable Cars

Fnord666 The Next Step in Remotely Controlling a Car (53 comments)

So this is just a basic attack surface analysis of a networked system. According to the article, the researchers are saying that these vehicles are vulnerable because operational components (brakes, etc.) are on the same network as non-operational components (radio, etc.).

By contrast, the 2014 Jeep Cherokee runs the "cyber physical" features and remote access functions on the same network, Valasek notes. "We can't say for sure we can hack the Jeep and not the Audi, but... the radio can always talk to the brakes," and in the Jeep Cherokee, those two are on the same network, he says.

This does tie in well with and extend their presentation last year where, given access to the car's network, they were able to manipulate its steering and braking systems. The trick will be to subvert one of the remotely accessible systems and then generate the necessary commands on the network in question using that subverted system. Maybe they are saving that presentation for 2015.

about a month ago
top

Recipe For Building a Cheap Raspberry Pi Honeypot Network

Fnord666 Or (68 comments)

Or I could do the same thing with VMs and not tie up a bunch of physical resources in the process.

about a month ago
top

Grad Student Rigs Cheap Alternative To $1,000 Air Purifiers In Smoggy China

Fnord666 Re:assholes everywhere (182 comments)

part of the problem is that many homes burn coal for heat, so it isn't just industrial pollution, nor from automobiles, the latter two are present during most of the year, with the former being a problem concentrated in winter.

Strapping a filter over the individual smokestacks would help reduce emissions significantly in that case too, especially over time.

about 1 month ago

Submissions

top

Google acquires Israeli security startup SlickLogin

Fnord666 Fnord666 writes  |  about 6 months ago

Fnord666 (889225) writes "SlickLogin, an Israeli startup and developer of smart identification technology through user smartphones has been acquired by Google for several million (the official transaction amount remains undisclosed). SlickLogin was founded under a year ago by Or Zelig, Eran Galili and Ori Kabeli. The company first unveiled its technology at TechCrunch Disrupt held last September. the company has yet to launch their product nor have they any customers to date."
Link to Original Source
top

Incredible 3D GIFs Created with a Simple Visual Effect

Fnord666 Fnord666 writes  |  about 6 months ago

Fnord666 (889225) writes "Animated gifs seem to be everywhere these days, but some gif creators are taking the visual experience of viewing quick clips of silent motion to another level. By carefully adding a couple of solid-colored (typically white), vertical lines to the moving images, an incredible three-dimensional effect is created. As characters and objects move into the foreground, they seemingly extend beyond the barrier of the image."
Link to Original Source
top

Nation's most notorious "troll" sues federal government

Fnord666 Fnord666 writes  |  about 8 months ago

Fnord666 (889225) writes "MPHJ Technology Investments quickly became one of the best-known "patent trolls" of all time by sending out thousands of letters to small businesses—16,465 of them, we now know—saying that if the business did not pay a licensing fee of $1,000 or more per worker, it would be sued for patent infringement. MPHJ claimed to have patents that cover any networked "scan-to-email" function.

As the debate over so-called "patent trolls" has flared up in Congress, MPHJ became the go-to example for politicians and attorneys general trying to show that patent abuse has spun out of control. "We're talking about bottom feeders," said Sen. Claire McCaskill (D-MO) in one Senate hearing focused on patent demand letters.

We now know that MPHJ has also become the first patent troll targeted by the Federal Trade Commission. The FTC's interest in MPHJ was revealed in an audacious "preemptive strike" lawsuit that MPHJ actually filed against the FTC on Monday. The suit, which names the four sitting FTC commissioners personally, says that the agency has overstepped its bounds and trampled on MPHJ's constitutional rights."

Link to Original Source
top

Court Strikes Down FCC Open Internet Order

Fnord666 Fnord666 writes  |  about 8 months ago

Fnord666 (889225) writes "WASHINGTON — On Tuesday, the D.C. Circuit Court of Appeals struck down the Federal Communications Commission’s Open Internet Order. In its decision, the court said that the FCC lacked the authority to implement and enforce its rules under the legal framework the agency put forth.

The FCC’s 2010 order was intended to prevent broadband Internet access providers from blocking or interfering with traffic on the Web. Instead of reversing a Bush-era FCC decision that weakened the FCC’s authority over broadband, and establishing solid legal footing for its rules, former FCC Chairman Julius Genachowski pushed for rules under the complicated legal framework the court rejected today."

Link to Original Source
top

Hackers Steal Card Data from Neiman Marcus

Fnord666 Fnord666 writes  |  about 8 months ago

Fnord666 (889225) writes "Another day another data breach. Apparently high end retailer Neiman Marcus has also suffered a breach of credit card data. Krebs on Security has the news:.
"Responding to inquiries about a possible data breach involving customer credit and debit card information, upscale retailer Neiman Marcus acknowledged today that it is working with the U.S. Secret Service to investigate a hacker break-in that has exposed an unknown number of customer cards.""

Link to Original Source
top

AllThingsD co-founders launch new tech site, Re/code.

Fnord666 Fnord666 writes  |  about 8 months ago

Fnord666 (889225) writes "The founders of popular technology website AllThingsD have launched a new digital news and review website after parting ways with Dow Jones back in September.

The site, Re/code, was announced on Thursday by co-founders Kara Swisher and Walt Mossberg. The site and conference, which will be called Code, are to be managed by Revere Digital LLC, which received investments from the NBCUniversal News Group as well as Windsor Media, founded by former Yahoo chairman and CEO Terry Semel. The first conference under the new company will be held in late May outside Los Angeles."

Link to Original Source
top

Secret New UAS Shows Stealth, Efficiency Advances

Fnord666 Fnord666 writes  |  about 9 months ago

Fnord666 (889225) writes "A large, classified unmanned aircraft developed by Northrop Grumman is now flying—and it demonstrates a major advance in combining stealth and aerodynamic efficiency. Defense and intelligence officials say the secret unmanned aerial system (UAS), designed for intelligence, surveillance and reconnaissance (ISR) missions, is scheduled to enter production for the U.S. Air Force and could be operational by 2015.

Funded through the Air Force’s classified budget, the program to build this new UAS, dubbed the RQ-180, was awarded to Northrop Grumman after a competition that included Boeing and Lockheed Martin. The aircraft will conduct the penetrating ISR mission that has been left unaddressed, and under wide debate, since retirement of the Lockheed SR-71 in 1998."

Link to Original Source
top

Twitter Implements Forward Secrecy for Connections

Fnord666 Fnord666 writes  |  about 9 months ago

Fnord666 (889225) writes "Twitter has enabled Perfect Forward Secrecy across its mobile site, website and API feeds in order to protect against future cracking of the service’s encryption. The PFS method ensures that, if the encryption key Twitter uses is cracked in the future, all of the past data transported through the network does not become an open book right away.

“If an adversary is currently recording all Twitter users’ encrypted traffic, and they later crack or steal Twitter’s private keys, they should not be able to use those keys to decrypt the recorded traffic,” says Twitter’s Jacob Hoffman-Andrews. “As the Electronic Frontier Foundation points out, this type of protection is increasingly important on today’s Internet.”"

Link to Original Source
top

Apple, betrayed by its own law firm

Fnord666 Fnord666 writes  |  about a year ago

Fnord666 (889225) writes "When a company called FlatWorld Interactives LLC filed suit against Apple just over a year ago, it looked like a typical "patent troll" lawsuit against a tech company, brought by someone who no longer had much of a business beyond lawsuits.
Court documents unsealed this week reveal who's behind FlatWorld, and it's anything but typical. FlatWorld is partly owned by the named inventor on the patents, a Philadelphia design professor named Slavko Milekic. But 35 percent of the company has been quietly controlled by an attorney at one of Apple's own go-to law firms, Morgan, Lewis & Bockius. E-mail logs show that the attorney, John McAleese, worked together with his wife and began planning a wide-ranging patent attack against Apple's touch-screen products in January 2007—just days after the iPhone was revealed to the world."

Link to Original Source
top

FBI Pursuing Real-Time Gmail Spying Powers as "Top Priority" for 2013

Fnord666 Fnord666 writes  |  about a year and a half ago

Fnord666 (889225) writes "Despite the pervasiveness of law enforcement surveillance of digital communication, the FBI still has a difficult time monitoring Gmail, Google Voice, and Dropbox in real time. But that may change soon, because the bureau says it has made gaining more powers to wiretap all forms of Internet conversation and cloud storage a “top priority” this year."
Link to Original Source
top

Researchers Demonstrate 3D Spy Trojan for Mobile Phones

Fnord666 Fnord666 writes  |  about 2 years ago

Fnord666 (889225) writes "Researchers at the University of Indiana at Bloomington and the Crane Division of the Naval Surface Warfare Center (NSWC) created a program to use a phone's camera to take surreptitious pictures of its surroundings, weed out poor photos, and send the remaining stills back to be used to construct a 3D model of the environment. Called PlaceRaider, the project shows that virtual thieves and spies could identify and steal information from a remote location, the researchers said in a paper posted online on Sept. 26."
Link to Original Source
top

Research Shows Half of All Androids Contain Known Vulnerabilities

Fnord666 Fnord666 writes  |  about 2 years ago

Fnord666 (889225) writes "According to an article on threatpost, the Kaspersky Lab Security News Service, "About half of all Android phones contain at least one vulnerability that could be used to take control of the device, according to new research. Duo Security, which launched a free vulnerability scanning app for Android this summer, said their preliminary data from users shows a huge number of the devices are vulnerable to at least one of the known Android flaws.""
Link to Original Source
top

Novel text analysis uses PageRank to identify influential Victorian authors

Fnord666 Fnord666 writes  |  about 2 years ago

Fnord666 (889225) writes "A literature professor has developed software using Google's PageRank algorithm that has identified Jane Austen and Walter Scott as the most influential authors of the 1800s.

Matthew Jockers of the University of Nebraska analysed 3,592 digitized novels published in the UK, Ireland and the US between 1780 and 1900 using a combination of Google's algorithm, machine learning and a series of techniques used in computational text analysis including stylometry, corpus linguistics and network analysis."

Link to Original Source
top

US-CERT discloses security flaw in Intel chips

Fnord666 Fnord666 writes  |  more than 2 years ago

Fnord666 (889225) writes "The U.S. Computer Emergency Readiness Team (US-CERT) has disclosed a flaw in Intel chips that could allow hackers to gain control of Windows and other operating systems, security experts say.

The flaw was disclosed the vulnerability in a security advisory released this week. Hackers could exploit the flaw to execute malicious code with kernel privileges, said a report in the Bitdefender blog.

"Some 64-bit operating systems and virtualization software running on Intel CPU hardware are vulnerable to a local privilege escalation attack," the US-CERT advisory says. "The vulnerability may be exploited for local privilege escalation or a guest-to-host virtual machine escape.""

Link to Original Source
top

New Twist On Ancient Math Problem Could Improve Medicine, Microelectronics

Fnord666 Fnord666 writes  |  more than 2 years ago

Fnord666 (889225) writes "A hidden facet of a math problem that goes back to Sanskrit scrolls has just been exposed by nanotechnology researchers at the University of Michigan and the University of Connecticut.

Called the "filling problem," it seeks the best way to cover the inside of an object with a particular shape, such as filling a triangle with discs of varying sizes. Unlike the traditional packing problem, the discs can overlap. It also differs from the "covering problem" because the discs can't extend beyond the triangle's boundaries."

Link to Original Source
top

A new approach to motion capture

Fnord666 Fnord666 writes  |  about 3 years ago

Fnord666 (889225) writes "Traditional motion capture techniques use cameras to meticulously record the movements of actors inside studios, enabling those movements to be translated into digital models. But by turning the cameras around — mounting almost two dozen, outward-facing cameras on the actors themselves — scientists at Disney Research, Pittsburgh (DRP), and Carnegie Mellon University (CMU) have shown that motion capture can occur almost anywhere — in natural environments, over large areas and outdoors."
Link to Original Source
top

VAT to be implemented in the US?

Fnord666 Fnord666 writes  |  more than 4 years ago

Fnord666 (889225) writes ""Have you heard about the value-added tax (VAT), a horrible new tariff Americans will soon have to shoulder? The alarm is sounding on the conservative Web site Townhall.com, in the editorials of The Wall Street Journal, and on the opinion pages of The Washington Post (as well as in the pages of NEWSWEEK): consumers can expect to soon see the feared VAT sneaked into price tags nationwide.""
Link to Original Source
top

Toktumi releases Line2 VoIP app

Fnord666 Fnord666 writes  |  more than 4 years ago

Fnord666 (889225) writes ""For a little $1 iPhone app, Line2 sure has the potential to shake up an entire industry. It can save you money. It can make calls where AT&T’s signal is weak, like indoors. It can turn an iPod Touch into a full-blown cellphone. And it can ruin the sleep of cellphone executives everywhere.

Line2 gives your iPhone a second phone number — a second phone line, complete with its own contacts list, voice mail, and so on.""

Link to Original Source
top

Fnord666 Fnord666 writes  |  more than 7 years ago

Fnord666 (889225) writes "According to an article in tgdaily, Best Buy Burbank has given the boot to the ten people waiting for the Sony PlayStation 3 launch. According to our sources in the line, Best Buy kicked the group off property on Friday afternoon November 10th. ...The group was in high spirits Wednesday night when we interviewed them for our "PS3 fans quit jobs and postpone engagement to wait in line " article. At that time they seemed to have the full support of Best Buy and several employees walked by to chat with the group. ...It's unknown if the call to move the campers was a Best Buy corporate decision or if instructions came down from the Empire Center, the mall where Best Buy Burbank is located, property management. Calls to the Best Buy corporate offices and Best Buy Burbank went unanswered."
top

Fnord666 Fnord666 writes  |  about 8 years ago

Fnord666 writes "On Monday, interface developer Synaptics, together with Pilotfish, an industrial design company, announced a keyless prototype of a mobile phone that is all screen — all touch pad screen, to be exact. ..."Device manufacturers want to have larger and larger LCDs, so suddenly you need to have a touch input system on top of the LCD — and that's what we're suggesting here," said Mandi Mena, senior corporate marketing manager for Synaptics. ...This creates new possibilities such as assigning functions to two-finger taps, closing tasks by swiping an "X" over them, performing drag and drop applications, and answering the phone by simply pressing it next to your face. ...The two companies worked together to develop the phone, which uses Synaptics' ClearPad touch screen technology and interaction design with Pilotfish's user interface and industrial design. ..."We see the enabled ClearPad technology as something that can be applicable to remote controls or any sort of handheld device that is experiencing the same content overload that mobile phones are experiencing today," Mena said."

Journals

top

D&D Cofounder Dave Arneson has died

Fnord666 Fnord666 writes  |  more than 5 years ago "APOLIS -- Dave Arneson, one of the co-creators of the Dungeons & Dragons fantasy game and a pioneer of role-playing entertainment, died after a two-year battle with cancer, his family said Thursday. He was 61. Arneson and Gary Gygax developed Dungeons & Dragons in 1974 using medieval characters and mythical creatures. The game known for its oddly shaped dice became a hit, particularly among teenage boys. It eventually was turned into video games, books and movies. Gygax died in March 2008." - The Huffington Post

top

Fnord666 Fnord666 writes  |  more than 6 years ago This article on macworld is just a waste of server space. I especially like the second editor,

who's as gung-ho about the iPhone 3G as ever.

Apparently he has not one, but two 1st gen iPhones, yet he can't even get signal most of the time! He doesn't use text messaging, so why does he even have the thing? He could just as easily use an ipod touch and wifi to do everything else. Instead he is planning on getting an iphone 3G, which uses a faster network that he will get "the day before never". If this is the technical insight I can expect from macworld, I'm glad I don't subscribe.

In true Slashdot fashion, I'll just end with a question:

Why would anyone listen to this person?

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>