×

Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

Comments

top

Cassini's Elaborate Orbital Mechanics

GeffDE Re:Sounds like... (116 comments)

An evolutionary approach has the same difficulties in dealing with local optima. There are techniques (like simulated annealing) that transform the nasty optimization problem into a nice (convex, or at least, single optimum) optimization problem such that the global optima of the two problems are identical. Then, the nice, solved optimization problem can be slowly transformed back into the original, nasty problem in such a way that you can find that global minimum.

more than 4 years ago
top

Why Use Virtual Memory In Modern Systems?

GeffDE Re:You mean physical memory right :-) (983 comments)

The Cult of Stupid spreads far beyond computers, sadly. Nobody wants to be a nerd seem like they know anything.

There, FTFY.

more than 5 years ago

Submissions

top

GeffDE GeffDE writes  |  more than 8 years ago

GeffDE (712146) writes "Researchers at the University of Pennsylvania have built a small device that can be placed inside a keyboard to steal private data. Called a JitterBug, "it adds small and calculated delays to keypresses, creating a covert network timing channel superimposed over an already established network connection. This timing channel allows the leakage of typed secrets over a network where a passive eavesdropper, having the capability to monitor network timing, can recover these secrets. The technique works for any interactive network application (e.g. SSH, VNC, etc)." A paper writte on the subject is available here."

Journals

GeffDE has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?