×

Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

Comments

top

Judge Approves $450M Settlement For Apple's Ebook Price Fixing

I'm New Around Here Re:So good that the proxy battle is over (62 comments)

Sounds like it. Apple and 5 publishers tried to raise the price of new "e-books from the $9.99 price that Amazon had made standard".

So why does Amazon get to set the price, and not Apple or the publishers?

4 days ago
top

Judge Approves $450M Settlement For Apple's Ebook Price Fixing

I'm New Around Here Re:How about paying taxes first. (62 comments)

If they actually paid their taxes they would have to raise the price of ebooks. Look where that got them.

4 days ago
top

Judge Approves $450M Settlement For Apple's Ebook Price Fixing

I'm New Around Here Re: Socialism / fascism at its finest (62 comments)

A government is 'for' two things.

Set a duty roster of nighttime guards, so that people can sleep peacefully at night. The guards are there to wake everyone up if there is an attack.

Set a roster of people to build common-use structures such as roads or bridges.

Everything else is not 'what a government it for'.

And one of those two isn't essential to have the government involved.

4 days ago
top

Judge Approves $450M Settlement For Apple's Ebook Price Fixing

I'm New Around Here Re:Huge victory (62 comments)

Probably $1.

4 days ago
top

What Would Have Happened If Philae Were Nuclear Powered?

I'm New Around Here Re:I'm quite surprised it wasn't (519 comments)

Did you ever watch that TV show that had a girl die from a piece of the Mir space station when it de-orbited? She became a Grim Reaper, though I forget why.

about a week ago
top

Scientists Discover Diamond Nanothreads

I'm New Around Here Live in Concert (79 comments)

Nanothread and the Benzenes.

about a week ago
top

Scientists Discover Diamond Nanothreads

I'm New Around Here Re:Yes, but.. (79 comments)

Hey now, don't drag me into this discussion. It's been a long day and I just want to argue about politics.

about a week ago
top

Scientists Discover Diamond Nanothreads

I'm New Around Here Re:How about (79 comments)

So would my mom. The cancer had other ideas.

At least she's alive and doing well.

about a week ago
top

Scientists Discover Diamond Nanothreads

I'm New Around Here Re:It's a WAR for your SOUL! (79 comments)

This is very important.

Microsoft Kinect Spy System

THIS ARTICLE IS BEING SCRUBBED FROM THE NET. THE SITE IT WAS ORIGINALLY POSTED TO YANKED THE PLUG ON THEIR WHOLE SITE!!! COPY/PASTE THIS ARTICLE AS MUCH AS POSSIBLE TO DISCUSSION FORUMS, BLOGS, FACEBOOK, TWITTER, AND ARCHIVE AND MIRROR THIS DOCUMENT SO IT DOES NOT VANISH FOREVER!

"So you just got the Kinect/Xbox360 gaming system and you're having fun, hanging out in your underwear, plopped down in your favorite lounge chair, and playing games with your buddies. Yeah, it's great to have a microphone and camera in your game system so you can "Kinect" to your pals while you play, but did you read that Terms of Service Agreement that came with your Kinect thingy? No? Here, let me point out an important part of that service agreement.

        If you accept the agreement, you "expressly authorize and consent to us accessing or disclosing information about you, including the content of your communications, in order to: (a) comply with the law or respond to lawful requests or legal process; (b) protect the rights or property of Microsoft, our partners, or our customers, including the enforcement of our agreements or policies governing your use of the Service; or (c) act on a good faith belief that such access or disclosure is necessary to protect the personal safety of Microsoft employees, customers, or the public."

Did you catch that? Here, let me print the important part in really big letters.

"If you accept the agreement, you expressly authorize and consent to us accessing or disclosing information about you, including the content of your communications⦠on a good faith belief that such access or disclosure is necessary to protect the personal safety of Microsoft employees, customers, or the public."

OK, is that clear enough for ya? When you use the Kinect system, you agree to allow Microsoft (and any branch of law enforcement or government they care to share information with) to use your Kinect system to spy on you. Maybe run that facial recognition software to check you out, listen to your conversations, and keep track of who you are communicating with.

I know this is probably old news to some, but I thought I would mention it because it pertains to almost all of these home game systems that are interactive. You have to remember, the camera and microphone contained in your game system have the ability to be hacked by anyone the game company gives that ability to, and that includes government snoops and law enforcement agents.

Hey, it's MICROSOFT. What did you expect?

And the same concerns apply to all interactive game systems. Just something to think about if you're having a "Naked Wii party" or doing something illegal while you're gaming with your buddies. Or maybe you say something suspicious and it triggers the DHS software to start tracking your every word. Hey, this is not paranoia. It's spelled out for you, right there in that Service Agreement. Read it! Here's one more part of the agreement you should be aware of.

        "You should not expect any level of privacy concerning your use of the live communication features (for example, voice chat, video and communications in live-hosted gameplay sessions) offered through the Service."

Did you catch it that time? YOU SHOULD NOT EXPECT ANY LEVEL OF PRIVACY concerning your voice chat and video features on your Kinect box."

###

"Listen up, you ignorant sheep. Your government is spending more money than ever to spy on its own citizens. That's YOU, my friend. And if you're one of these people who say, "Well I ain't ever done nothing wrong so why should I worry about it?' - you are dead wrong. Our civil liberties are being taken away faster than you can spit. The NSA is working away on its new "First Intelligence Community Comprehensive National Cyber-security Initiative Data Center' to keep track of every last one of us. This thing will be the size of 17 football stadiums. One million square feet, all to be filled with more technology and data storage than you could imagine. And 30,000 spy drones are set to be launched over America which can each stay aloft for about 28 hours, traveling 300 miles per hour. WHY? Why do we want these things in our skies?

The military is now taking a keen interest in the Microsoft Kinect Spy System, the fastest selling electronic device in history. Conveniently self-installed in over 18 million homes, this seemingly innocent game system, armed with facial recognition programming and real-time recording of both sound and video, will be used by our own government to spy on and record us in our own homes.

And it doesn't stop there. Other game systems such as Nintendo's WWII are also being turned into government-controlled spy systems. WHY?

That's the real question. WHY?!!! Why is our own government spending billions and billions of dollars to spy on its own people? To keep us safe? Do you really believe that?"

Microsoft's Kinect System is Watching You
Published on Apr 5, 2012 by TheAlexJonesChannel:

https://www.youtube.com/watch?...

###

Big Brother alert: Microsoft wants to know how many friends you've got in your living room

- http://blogs.telegraph.co.uk/t...

By Mic Wright Gadgets Last updated: November 9th, 2012

- http://blogs.telegraph.co.uk/t...

"One of Microsoft's latest patent applications[1] is a humdinger. It proposes to turn the Kinect camera into a snitch for movie studios, reporting back just how many friends you've got in your living room and what they're watching. Think that sounds alarmist? Here's what it actually says: "The users consuming the content on a display device are monitored so that if the number of user-views licensed is exceeded, remedial action may be taken." It's that blatant â" a system to spy on private viewing habits.

If put into practice, Microsoft's plan could mean that the film you're watching suddenly stops playing if it detects that you've got more people squashed on to the sofa than the licence allows. You'd then be prompted to buy a more expensive licence to keep watching. It's as if Big Brother had built 1984's Telescreen not to monitor the population but to ensure no one was pirating the Two Minutes Hate.

In all likelihood, Microsoft will struggle to actually apply this patent in the real world. While copyright holders would be delighted, customers would be turned off by such a draconian system. But that's what's interesting about this application and patent applications in general: they often reveal what companies would do if they could get away with it. The black and white drawings and blandly technical language can cover immoral, scary and downright evil ideas.

There was an even more striking example from Apple earlier this year[2]. In September, it was granted a patent for "Apparatus and methods for enforcement of policies upon a wireless device", i.e. a system allowing companies or governments to remotely disable mobile phones and tablets in a particular area.

While Apple mentions benign examples such as preventing phone calls from disturbing concerts or ensuring devices are switched off on planes, it also states: "Covert police or government operations may require complete "blackout" conditions." That's exactly the kind of feature certain governments would love to use to suppress pictures and videos. The patent Apple put its stamp on is a handy form of censorship regardless of whether it will ever apply it.

Last year, Google's chairman, Eric Schmidt, said that the company would hold off from creating a facial recognition service because it would be "crossing the creepy line". Still, Google has filed for and been granted extensive patents in the area and, as its Project Glass augmented reality goggles move forward, who knows when the "creepy line" will shift?"

[1] http://appft.uspto.gov/netacgi...

[2] http://www.zdnet.com/apple-pat...

(C) Copyright of Telegraph Media Group Limited 2012

###

"People are aware that Windows has bad security but they are underestimating the problem because they are thinking about third parties. What about security against Microsoft? Every non-free program is a âjust trust me program'. âTrust me, we're a big corporation. Big corporations would never mistreat anybody, would we?' Of course they would! They do all the time, that's what they are known for. So basically you mustn't trust a non free programme."

"There are three kinds: those that spy on the user, those that restrict the user, and back doors. Windows has all three. Microsoft can install software changes without asking permission. Flash Player has malicious features, as do most mobile phones."

"Digital handcuffs are the most common malicious features. They restrict what you can do with the data in your own computer. Apple certainly has the digital handcuffs that are the tightest in history. The i-things, well, people found two spy features and Apple says it removed them and there might be more""

From:

Richard Stallman: 'Apple has tightest digital handcuffs in history'
www.newint.org/features/web-exclusive/2012/12/05/richard-stallman-interview/

###

Nobody Seems To Notice and Nobody Seems To Care - Government & Stealth Malware

In Response To Slashdot Article: Former Pentagon Analyst: China Has Backdoors To 80% of Telecoms 87

How many rootkits does the US[2] use officially or unofficially?

How much of the free but proprietary software in the US spies on you?

Which software would that be?

Visit any of the top freeware sites in the US, count the number of thousands or millions of downloads of free but proprietary software, much of it works, again on a proprietary Operating System, with files stored or in transit.

How many free but proprietary programs have you downloaded and scanned entire hard drives, flash drives, and other media? Do you realize you are giving these types of proprietary programs complete access to all of your computer's files on the basis of faith alone?

If you are an atheist, the comparison is that you believe in code you cannot see to detect and contain malware on the basis of faith! So you do believe in something invisible to you, don't you?

I'm now going to touch on a subject most anti-malware, commercial or free, developers will DELETE on most of their forums or mailing lists:

APT malware infecting and remaining in BIOS, on PCI and AGP devices, in firmware, your router (many routers are forced to place backdoors in their firmware for their government) your NIC, and many other devices.

Where are the commercial or free anti-malware organizations and individual's products which hash and compare in the cloud and scan for malware for these vectors? If you post on mailing lists or forums of most anti-malware organizations about this threat, one of the following actions will apply: your post will be deleted and/or moved to a hard to find or 'deleted/junk posts' forum section, someone or a team of individuals will mock you in various forms 'tin foil hat', 'conspiracy nut', and my favorite, 'where is the proof of these infections?' One only needs to search Google for these threats and they will open your malware world view to a much larger arena of malware on devices not scanned/supported by the scanners from these freeware sites. This point assumed you're using the proprietary Microsoft Windows OS. Now, let's move on to Linux.

The rootkit scanners for Linux are few and poor. If you're lucky, you'll know how to use chkrootkit (but you can use strings and other tools for analysis) and show the strings of binaries on your installation, but the results are dependent on your capability of deciphering the output and performing further analysis with various tools or in an environment such as Remnux Linux. None of these free scanners scan the earlier mentioned areas of your PC, either! Nor do they detect many of the hundreds of trojans and rootkits easily available on popular websites and the dark/deep web.

Compromised defenders of Linux will look down their nose at you (unless they are into reverse engineering malware/bad binaries, Google for this and Linux and begin a valuable education!) and respond with a similar tone, if they don't call you a noob or point to verifying/downloading packages in a signed repo/original/secure source or checking hashes, they will jump to conspiracy type labels, ignore you, lock and/or shuffle the thread, or otherwise lead you astray from learning how to examine bad binaries. The world of Linux is funny in this way, and I've been a part of it for many years. The majority of Linux users, like the Windows users, will go out of their way to lead you and say anything other than pointing you to information readily available on detailed binary file analysis.

Don't let them get you down, the information is plenty and out there, some from some well known publishers of Linux/Unix books. Search, learn, and share the information on detecting and picking through bad binaries. But this still will not touch the void of the APT malware described above which will survive any wipe of r/w media. I'm convinced, on both *nix and Windows, these pieces of APT malware are government in origin. Maybe not from the US, but most of the 'curious' malware I've come across in poisoned binaries, were written by someone with a good knowledge in English, some, I found, functioned similar to the now well known Flame malware. From my experience, either many forum/mailing list mods and malware developers/defenders are 'on the take', compromised themselves, and/or working for a government entity.

Search enough, and you'll arrive at some lone individuals who cry out their system is compromised and nothing in their attempts can shake it of some 'strange infection'. These posts receive the same behavior as I said above, but often they are lone posts which receive no answer at all, AT ALL! While other posts are quickly and kindly replied to and the 'strange infection' posts are left to age and end up in a lost pile of old threads.

If you're persistent, the usual challenge is to, "prove it or STFU" and if the thread is not attacked or locked/shuffled and you're lucky to reference some actual data, they will usually attack or ridicule you and further drive the discussion away from actual proof of APT infections.

The market is ripe for an ambitious company or individual to begin demanding companies and organizations who release firmware and design hardware to release signed and hashed packages and pour this information into the cloud, so everyone's BIOS is checked, all firmware on routers, NICs, and other devices are checked, and malware identified and knowledge reported and shared openly.

But even this will do nothing to stop backdoored firmware (often on commercial routers and other networked devices of real importance for government use - which again opens the possibility of hackers discovering these backdoors) people continue to use instead of refusing to buy hardware with proprietary firmware/software.

Many people will say, "the only safe computer is the one disconnected from any network, wireless, wired, LAN, internet, intranet" but I have seen and you can search yourself for and read about satellite, RF, temperature, TEMPEST (is it illegal in your part of the world to SHIELD your system against some of these APT attacks, especially TEMPEST? And no, it's not simply a CRT issue), power line and many other attacks which can and do strike computers which have no active network connection, some which have never had any network connection. Some individuals have complained they receive APT attacks throughout their disconnected systems and they are ridiculed and labeled as a nutter. The information exists, some people have gone so far as to scream from the rooftops online about it, but they are nutters who must have some serious problems and this technology with our systems could not be possible.

I believe most modern computer hardware is more powerful than many of us imagine, and a lot of these systems swept from above via satellite and other attacks. Some exploits take advantage of packet radio and some of your proprietary hardware. Some exploits piggyback and unless you really know what you're doing, and even then... you won't notice it.

Back to the Windows users, a lot of them will dismiss any strange activity to, "that's just Windows!" and ignore it or format again and again only to see the same APT infected activity continue. Using older versions of sysinternals, I've observed very bizarre behavior on a few non networked systems, a mysterious chat program running which doesn't exist on the system, all communication methods monitored (bluetooth, your hard/software modems, and more), disk mirroring software running[1], scans running on different but specific file types, command line versions of popular Windows freeware installed on the system rather than the use of the graphical component, and more.

[1] In one anonymous post on pastebin, claiming to be from an intel org, it blasted the group Anonymous, with a bunch of threats and information, including that their systems are all mirrored in some remote location anyway.

[2] Or other government, US used in this case due to the article source and speculation vs. China. This is not to defend China, which is one messed up hell hole on several levels and we all need to push for human rights and freedom for China's people. For other, freer countries, however, the concentration camps exist but you wouldn't notice them, they originate from media, mostly your TV, and you don't even know it. As George Carlin railed about "Our Owners", "nobody seems to notice and nobody seems to care".

[3] http://www.stallman.org/

Try this yourself on a wide variety of internet forums and mailing lists, push for malware scanners to scan more than files, but firmware/BIOS. See what happens, I can guarantee it won't be pleasant, especially with APT cases.

So scan away, or blissfully ignore it, but we need more people like RMS[3] in the world. Such individuals tend to be eccentric but their words ring true and clear about electronics and freedom.

I believe we're mostly pwned, whether we would like to admit it or not, blind and pwned, yet fiercely holding to misinformation, often due to lack of self discovery and education, and "nobody seems to notice and nobody seems to care".

(Remotely Attacking Network Cards)
http://theinvisiblethings.blog...

(Persistent BIOS Infection)
http://www.phrack.org/issues.h...

(BIOS --> Vbootkit code(from CD,PXE etc.) --> MBR --> NT Boot sector --> Windows Boot manager --> Windows Loader --> Vista Kernel)
http://www.securityfocus.com/c...

(The ROMOS project)
http://web.archive.org/web/201...

Secure boot is Microsoft's attempt to maintain computer OS market share as their influences is being stripped away by the likes of Google (Android) and Apple (iOS). With HTML5 on the way, we will have WEB based applications that rival desktop versions, and run on ANY device. The OS is just a layer to get to where the real work gets done, information exchange.

AND the worst part is, secure boot doesn't actually fix the problem it pretends it solves. It can't. This is the whole DRM of DVD's and BluRay all over again. Look at how well that is working out.

DRM is broken by design."
- linux.slashdot.org/comments.pl?sid=2985953&cid=40681007

"Richard Stallman has finally spoken out on this subject. He notes that 'if the user doesn't control the keys, then it's a kind of shackle, and that would be true no matter what system it is.' He says, 'Microsoft demands that ARM computers sold for Windows 8 be set up so that the user cannot change the keys; in other words, turn it into restricted boot.' Stallman adds that 'this is not a security feature. This is abuse of the users. I think it ought to be illegal.'""
- linux.slashdot.org/story/12/07/17/2326253/richard-stallman-speaks-about-uefi

I'm concerned about new rootkits which target PCI devices, such as the graphics card and the optical drives, also, BIOS. Where are the malware scanners which scan PCI devices and BIOS for mismatches? All firmware, BIOS and on PCI devices should be checksummed and saved to match with others in the cloud, and archived when the computer is first used, backing up signed firmware.

When do you recall seeing signed router firmware upgrades with any type of checksum to check against? Same for PCI devices and optical drives and BIOS.

Some have begun with BIOS security:

http://www.biosbits.org/

Some BIOS has write protection in its configuration, a lot of newer computers don't.

###

CIA Head: We Will Spy On Americans Through Electrical Appliances
Global information surveillance grid being constructed; willing Americans embrace gadgets used to spy on them
http://www.prisonplanet.com/ci...

###

Comparing the unique pattern of the frequencies on an audio recording with a database that has been logging these changes for 24 hours a day, 365 days a year provides a digital watermark: a date and time stamp on the recording.
Philip Harrison, from JP French Associates, another forensic audio laboratory that has been logging the hum for several years, says: "Even if [the hum] is picked up at a very low level that you cannot hear, we can extract this information." It is a technique known as Electric Network Frequency (ENF) analysis, and it is helping forensic scientists to separate genuine, unedited recordings from those that have been tampered with."
- http://www.bbc.co.uk/news/scie...
- http://cryptogon.com/?p=32789

###

"I'd worry about a Tempest virus that polled a personal computer's
CD-ROM drive to pulse the motor as a signalling method:

* Modern high-speed CD-ROM drive motors are both acoustically and
electrically noisy, giving you two attack methods for the price of one;

* Laptop computer users without CRTs, and the PC users that can afford
large LCD screens instead of CRTs, often have CD-ROM drives;

* Users are getting quite used to sitting patiently while their
CD-ROM drives grind away for no visibly obvious reason (but
that's quite enough about the widespread installs of software from
Microsoft CD-ROMs that prompted Kuhn's investigation in the first place.)"

http://catless.ncl.ac.uk/Risks...

###

"I'd worry about a Tempest virus that polled a personal computer' personal computer' CD-ROM drive"

Yes and the hard drive and in some PC's the cooling fans as well are under CPU control.

You can also do it with PC's where the CPU does not control the fan, but the hardware has a simple thermal sensor to control it's speed. You do this by simply having a process that uses power expensive instructions in tight loops, thus raising the CPU temprature (it's one of the side channels I was considering a long time ago when thinking about how the temp inside the case changed various things including the CPU clock XTAL frequency).

The change in sound side channel is one of the first identified problems with Quantum Key Distribution. Basicaly the bod who came up with the idea whilst first testing the idea could tell the state of "Alice's polarizer" simply by the amount of noise it made...

The CD-ROM motor idea I'd heard befor but could not remember where till I followed your link.

Dr Lloyd Wood has worked with the UK's Surrey Uni, the European Space Agency and Americas NASA and one or two other places as part of his work for Surrey Satellite Technology Ltd. He has been involved with CLEO (Cisco router in Low Earth Orbit) and other work on what's being called "The Space Internet".

Of interest is his work on Delay and Disruption Tolerant Networks (DTN). It's not been said "publicaly" as far as I'm aware but the work has aspects that are important to anonymity networks such as TOR.

You can read more on Dr Wood's DTN work etc at,

Lloyd Wood - Delay-Tolerant Networking work
http://personal.ee.surrey.ac.u...

The UK occupies an odd position in the "Space Race" it is the only nation who having put a satellite into space then stopped further space rocket development (the Black Knight launch platform was considerably safer and more economic than the then US and CCCP systems). The UK has however continued in the Space Game and is perhaps the leading designers of payloads for scientific and industrial satellites (it probably is on military sats as well but nobody who knows for sure is telling ;-)

Clive Robinson
Schneier on Security: Information-Age Law Enforcement Techniques
http://www.schneier.com/blog/a...

###

Schneier has covered it before: power line fluctuations (differences on the wire in keys pressed).

Thereâ(TM)s thermal attacks against cpus and temp, also:

ENF (google it)

A treat (ENF Collector in Java):

sourceforge dot net fwdslash projects fwdslash nfienfcollector

No single antimalware scanner exists which offers the ability to scan (mostly proprietary) firmware on AGP/PCI devices (sound cards, graphics cards, usb novelty devices excluding thumb drives), BIOS/CMOS.

If you boot into ultimate boot cd you can use an archane text interface to dump BIOS/CMOS and examine/checksum.

The real attacks which survive disk formats and wipes target your PCI devices and any firmware which may be altered/overwritten with something special. It is not enough to scan your hard drive(s) and thumb drives, the real dangers with teeth infect your hardware devices.

When is the last time you:

Audited your sound card for malware?
Audited your graphics card for malware?
Audited your network card for malware?

Google for:

* AGP and PCI rootkit(s)
* Network card rootkit(s)
* BIOS/CMOS rootkit(s)

Our modern PC hardware is capable of much more than many can imagine.

Do you:

        Know your routerâ(TM)s firmware may easily be replaced on a hackerâ(TM)s whim?

        Shield all cables against leakage and attacks

        Still use an old CRT monitor and beg for TEMPEST attacks?

        Use TEMPEST resistant fonts in all of your applications including your OS?

        Know whether or not your wired keyboard has keypresses encrypted as they pass to your PC from the keyboard?

        Use your PC on the grid and expose yourself to possible keypress attacks?

        Know your network card is VERY exploitable when plugged into the net and attacked by a hard core blackhat or any vicious geek with the know how?

        Sarch out informative papers on these subjects and educate your friends and family about these attacks?

        Contact antimalware companies and urge them to protect against many or all these attacks?

Do you trust your neighbors? Are they all really stupid when it comes to computing or is there a geek or two without a conscience looking to exploit these areas?

The overlooked threat are the potential civilian rogues stationed around you, especially in large apartment blocks who feed on unsecured wifi to do their dirty work.

With the recent news of Russian spies, whether or not this news was real or a psyop, educate yourself on the present threats which all antimalware scanners fail to protect against and remove any smug mask you may wear, be it Linux or OpenBSD, or the proprietary Windows and Mac OS you feel are properly secured and not vulnerable to any outside attacks because you either donâ(TM)t need an antivirus scanner (all are inept to serious attacks) or use one or several (many being proprietary mystery machines sending data to and from your machine for many reasons, one is to share your information with a group or set database to help aid in threats), the threats often come in mysterious ways.

Maybe the ancients had it right: stone tablets and their own unique language(s) rooted in symbolism.

###

âoeDisconnect your PC from the internet and donâ(TM)t add anything you didnâ(TM)t create yourself. It worked for the NOC list machine in Mission Impossibleâ

The room/structure was likely heavily shielded, whereas most civvies donâ(TM)t shield their house and computer rooms. There is more than meets the eye to modern hardware.

Google:

network card rootkits and trojans
pci rootkits
packet radio
xmit âoefm fingerprintingâ software
âoespecific emitter identificationâ
forums(dot)qrz(dot)com

how many malware scanners scan bios/cmos and pci/agp cards for malware? zero, even the rootkit scanners. have you checksummed/dumped your bios/cmos and firmware for all your pci/agp devices and usb devices, esp vanity usb devices in and outside the realm of common usb devices (thumbdrives, external hdds, printers),

Unless your computer room is shielded properly, the computers may still be attacked and used, Iâ(TM)ve personally inspected computers with no network connection running mysterious code in the background which task manager for windows and the eqiv for *nix does not find, and this didnâ(TM)t find it all.

Inspect your windows boot partition in *nix with hexdump and look for proxy packages mentioned along with command line burning programs and other oddities. Computers are more vulnerable than most would expect.

You can bet all of the malware scanners today, unless they are developed by some lone indy coder in a remote country, employ whitelisting of certain malware and none of them scan HARDWARE devices apart from the common usb devices.

Your network cards, sound cards, cd/dvd drives, graphics cards, all are capable of carrying malware to survive disk formatting/wiping.

Boot from a Linux live cd and use hexdump to examine your windows (and *nix) boot sectors to potentially discover interesting modifications by an unknown party.

about two weeks ago
top

The Downside to Low Gas Prices

I'm New Around Here Re:Stupid, trucks cause the problem (554 comments)

So, again, your argument is: Now it is simply large vehicles you don't like have no place in cities.

Sugar-coat it all you want, that is your position. Throw away the crutches.

about two weeks ago
top

The Downside to Low Gas Prices

I'm New Around Here Re: Stupid, trucks cause the problem (554 comments)

Hey, good to hear ya. I'm from up in Muskegon county myself. I was riding in Muskegon, Grand Haven, Spring Lake, and even to Grand Rapids once. Now I live where it doesn't snow. I see the train tracks that went past the farm I grew up on has been converted to a bike path from Grand Rapids to Muskegon. Wish we had that back then.

about two weeks ago
top

The Downside to Low Gas Prices

I'm New Around Here Re: Stupid, trucks cause the problem (554 comments)

Such a nice light dusting of snow.

Really. They make it sound like we are afraid of getting our tires wet. I rode on a trail through the woods where my feet made trenches as each pedal went around. It was safer than the road at the time. That was on the way home from work at around 10pm.

Besides absolute depth, snowbanks and hidden obstacles/ditches can't be ignored either.

about two weeks ago
top

The Downside to Low Gas Prices

I'm New Around Here Re:Stupid, trucks cause the problem (554 comments)

I'm sorry, did I simply say "OMG winter" in my earlier post? I don't think so.

By the way, you never mentioned how many meters of snow you get in your part of Germany. Where I lived it averaged several feet per month. Other places get much more than that. Some get far less snow, but the temperature is many degrees colder.

So, what is the average snowfall where you live? What is the average winter temperature?

about two weeks ago
top

The Downside to Low Gas Prices

I'm New Around Here Re:Stupid, trucks cause the problem (554 comments)

You originally wrote:

not "They have no place in cities", that's merely an opinion. One that can be reasonably backed up by citing road widths, corner radiuses turning circles, car widths etc.

So you are saying that the opinion that large SUVs shouldn't be allowed in cities is based on the physical characteristics relevant to their size, which is larger than standard passenger cars. These physical characteristics include their width compared to the road/lane, and their turning radius. Your argument apparently is that they cannot maneuver well enough to ensure the safety of other vehicles.

I brought up delivery vehicles, which are as large as or larger than SUVs. I pointed out that they maneuver adequately on city streets. Therefor SUVs should not be a problem, based on their physical characteristics.

Your next sentence shows the heart of your argument:

Just because it's possible to have a few of them about, doesn't imply that it's reasonable to have the streets filled with them.

You simply don't want them there. The physical characteristics you mentioned earlier were just a smoke screen. The rest of that post, excusing "critical" delivery vans while condemning vehicles that are "just taking up a crap load of space" further illuminate your true feelings.

This is no straw man, and you get no debate team points for trying to use that old crutch. This is taking your own words and arguments, and making a reasonable approximation of your thoughts and prejudices based on them.

My only contribution to your reasoning is assuming you have a car that you drive in a SUV-choked city. Why else would it be such a sore point for you? If that isn't the case, you either have no car or don't drive in a city, I will gladly rescind the clause at the end of that sentence. Now it is simply large vehicles you don't like have no place in cities.

about two weeks ago
top

The Downside to Low Gas Prices

I'm New Around Here Re:Stupid, trucks cause the problem (554 comments)

Well, I don't drive a car powered by crystal methamphetimine. Gasoline is much cheaper than the ice sold on the street corners.

about two weeks ago
top

The Downside to Low Gas Prices

I'm New Around Here Re:Stupid, trucks cause the problem (554 comments)

In a thread proposing putting all trucking companies out of business so that only farmers have the food they need, I think my post fits right in.

about two weeks ago
top

The Downside to Low Gas Prices

I'm New Around Here Re: Stupid, trucks cause the problem (554 comments)

Considering the original article is about lack of funds from fuel taxes, spending further trillions on rail over passes doesn't make a lot of sense.

about two weeks ago
top

The Downside to Low Gas Prices

I'm New Around Here Re:Stupid, trucks cause the problem (554 comments)

I'm sorry. I thought your argument was about physical characteristics such as turning radius and vehicle width in relation to lane width. That the numbers show large vehicles have no place in cities.

Now it is simply large vehicles you don't like have no place in cities where you are driving your privately owned car.

Again, sorry for the confusion on my part. I assumed you were being logically consistent and reasonable.

about two weeks ago

Submissions

I'm New Around Here hasn't submitted any stories.

Journals

I'm New Around Here has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?