Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Powering Phones, PCs Using Sugar

_0xd0ad Re: Amp hours per kilogram (199 comments)

According to the description on figure 4, the battery provides 0.5 volts:

EFCs are powered by 500âmM methanol, 7.2% wt/v glucose or 15% wt/v maltodextrin or dehydrated fuels at a voltage of 0.5âV.

Additionally, supplementary table S3 (PDF, page 11 of 14 or PNG) also lists the voltage at 0.5 volts.

about 8 months ago
top

Ask Slashdot: What Are the Hardest Things Programmers Have To Do?

_0xd0ad Re: Estimation (473 comments)

No, first you increment and then you shift left twice*. Increment is a unary operation, so you avoid an unnecessary operand.

about a year ago
top

Want To Hijack a Domain? Just Get a Fax Machine

_0xd0ad Re: A hack is not just a hack (162 comments)

Why does your browser use a crappy font for monospaced text? There's a setting for that. Mine uses Consolas. It's readable. And it differentiates between O and 0, and other characters that look similar (if not identical) in most other fonts.

about a year ago
top

Want To Hijack a Domain? Just Get a Fax Machine

_0xd0ad Re: "hack" (162 comments)

42

about a year ago
top

The W3C Sells Out Users Without Seeming To Get Anything In Return

_0xd0ad Re: Some questions (348 comments)

The reason for DRM's existence is to limit web content to those users who have the money (resources) to pay for it.

No, no... the reason for DRM's existence is to enable users who have the money to obtain content. Otherwise, the creators could keep it to themselves and nobody would benefit from it! Repeat after me: war is peace. freedom is slavery. ignorance is strength. DRM is good.

I joke, but I think there are must be people who actually believe this. It's the only logical explanation for some people's behavior. The W3C is just the latest example...

about a year ago
top

AMD Intentionally Added Artificial Limitations To Their HDMI Adapters

_0xd0ad Re: Why? (256 comments)

Yeah, unfortunately on mine the device was removed entirely. I tried to find an older driver that had it, but it always said that it wasn't the right driver.

about a year ago
top

AMD Intentionally Added Artificial Limitations To Their HDMI Adapters

_0xd0ad Re: Why? (256 comments)

Same reason as the newer RealTek sound drivers have disabled/removed the Stereo Mix recording device: DRM.

about a year ago
top

How long before most automobile driving is done by computers?

_0xd0ad Missing option: (472 comments)

Not nearly as soon as I'd like.

about a year ago
top

Charged Superhydrophobic Condenser Surface May Make Power Plants More Efficient

_0xd0ad WTF slashdot... (1 comments)

The unicode looked fine in the preview.

Editors, do your editing thing and please fix it if this story gets selected.

about a year ago
top

Scientists Create New "Lightsaber-Like" Form of Matter

_0xd0ad Re: Unfortunately, you need real molecules to do t (175 comments)

Did you read the whole article? One photon will be re-emitted in identical form to the original, but two photons will likely be re-emitted as a single, molecule-like unit.

about a year ago
top

ICS-CERT Warns of Serious Flaws In Tridium SCADA Software

_0xd0ad Re:Of course, since it's SCADA... (34 comments)

Actually, it's designed to be web-facing.

Niagara^AX is a software framework and development environment that solves the challenges associated with building Internet-enabled products, device-to-enterprise applications and distributed Internet-enabled automation systems.

Worse, this is a laughably simple exploit of the web-facing interface:

By default, the Tridium Niagara AX software is not configured to deny access to restricted parent directories... An attacker could exploit this vulnerability by sending a specially crafted request to the Web server running on Port 80/TCP

"The system insecurely stores user authentication credentials, which are susceptible to interception and retrieval. User authentication credentials are stored in the Niagara station configuration file, config.bog, which is located in the root of the station folder"

In other words, it's about as simple as GET /../config.bog HTTP/1.1

more than 2 years ago
top

LinkedIn Password Hashes Leaked Online

_0xd0ad Re:Hashes list link (271 comments)

Also, forgot to mention, isn't the implication of some cracked / some non cracked that whoever originally got their hands on the data only has the hashes, not the full passwords?

Of course, it's also possible that some scavenger started cracking the SHA-1 hashes in a file that someone else released...

more than 2 years ago
top

LinkedIn Password Hashes Leaked Online

_0xd0ad Re:Hashes list link (271 comments)

Thanks for that info.

I checked the tail end of the SHA-1 hash of my LinkedIn password; it wasn't in the list, neither zeroed or in full. I'd already signed into LinkedIn and changed it, so it's moot, but yeah, my password wasn't in the dump.

more than 2 years ago
top

Startup Skips IE Support, Claims $100,000 Savings

_0xd0ad Re:They skipped IE support on their ADMIN pages (273 comments)

Only it isn't. ...

"'jQuery', he mumbled". Well stop mumbling, either make with the argument (and the CODE), or shut the fuck up already. Show me the code that hooks the flag up to an action ... it's just not there.

Yes it is. Right here in the script.

jQuery(document).ready(
    function(){
        $('.commentSub .ui-icon.flag').live('click',
            function(fe){
                if($('#flag_comment').length>0){
                    $('#flag_comment').remove();
                }
                $(this).parent().append('<form id="flag_comment"><input type="hidden" name="comment" value="'+this.id+'"><input type="button" class="s" value="Report" disabled="disabled" onclick="reportCommentAbuse();"><input type="text" name="reason" class="t" placeholder="Specify reason" ></form>').parent().parent().addClass('flag-in');
                $('input[name=reason]').focus();
            }
        );
        $(".comment").hover(function(){},
            function(){
                if($(this).hasClass('flag-in')){
                    $('#flag_comment').remove();
                    $(this).removeClass('flag-in');
                }
            }
        );
        $("input[name=reason]").live('keypress',
            function(kp){
                var code=(kp.keyCode?kp.keyCode:kp.which);
                if(code==13){
                    $(this).prev().trigger('click');
                    kp.preventDefault();
                }
            }
        );
        $("#flag_comment .t").live('keyup',
            function(data){
                if($(this).val()!=""){
                    $("#flag_comment .s").removeAttr("disabled");
                }else{
                    $("#flag_comment .s").attr("disabled","disabled");
                }
            }
        );
    }
);
function reportCommentAbuse(){
    ajax_update(
        {
            op:'reportCommentAbuse',
            comment:$("#flag_comment input[name=comment]").val(),
            reason:$("#flag_comment input[name=reason]").val()
        },
        '',
        {
            onComplete:function(){
                Slash.busy('modal-fetch',false);
                $("#flag_comment").hide();
            }
        }
    );
    return false;
}

more than 2 years ago
top

LG Aims To Beat Apple's Retina Display

_0xd0ad Re:Cool tech, but (333 comments)

No, that's also because of issues with color dithering.

Most people expect their black and white printer to be able to print shades of gray. It doesn't have gray ink. It can't make gray ink. So it dithers.

more than 2 years ago
top

LG Aims To Beat Apple's Retina Display

_0xd0ad Re:Cool tech, but (333 comments)

That pixel-sized image is just a server-side script that logs some metrics based on the request the browser sent. It could send back a 404 error instead of a 1x1 transparent gif - it wouldn't matter. And it doesn't have to be an image; it could just as easily be a script or style tag, and the server sends back a 0-byte file after logging the request.

more than 2 years ago
top

Chinese Physicists Achieve Quantum Teleportation Over 60 Miles

_0xd0ad Re:Security though overlooking the obvious - (216 comments)

Thank you for your insightful explanation of why this would never work - if you were designing it.

more than 2 years ago
top

Chinese Physicists Achieve Quantum Teleportation Over 60 Miles

_0xd0ad Re:(Self-replying, I apologize) (216 comments)

If somebody can impersonate your peer at that exchange, you are owned.

It would get them nowhere, on its own. They would also need to intercept the entangled photon, without detection - which can't be done (in theory); that photon would simply be ignored, not used for the encryption.

It's basically like you're doing XOR encryption with a random one-time pad, known only to you and your target. The quantum encryption is basically the part that ensures that only you and your target can possibly know what the one-time pad contains (according to present interpretation of the laws of physics). Because any time your eavesdropper intercepts a single bit of the one-time pad, both of you are able to sense this and simply not use that bit.

more than 2 years ago
top

Chinese Physicists Achieve Quantum Teleportation Over 60 Miles

_0xd0ad Re:Security though overlooking the obvious - (216 comments)

Not the exact same thing - quoting from the paper,

Most recently, following a modified scheme, quantum teleportation over 16 km free-space links was demonstrated with a single pair of entangled photons. However, in this experiment, the unknown quantum state must be prepared on one of the resource entangled qubits and therefore cannot be presented independently. In our experiment, we demonstrate quantum teleportation of an independent unknown state...

more than 2 years ago

Submissions

top

Charged Superhydrophobic Condenser Surface May Make Power Plants More Efficient

_0xd0ad _0xd0ad writes  |  about a year ago

_0xd0ad (1974778) writes "The activities of bantam water droplets in just one region of a power plant could make a significant difference in the output of power plants, scientists say.

Right now, in current condenser designs, water congeals in a thin film on the condenserâ(TM)s surface. Before new water droplets can form there, this water must fall away from the surface and be conveyed back over the boiler. âoeTo have the most efficient condensing surface, you want to remove the droplets as early as possible,â says Dr. Nenad Miljkovic, postdoctoral associate at MIT and co-author on âoeElectrostatic charging of jumping dropletsâ.

When a water droplet forms on a sheet of metal coated with a superhydrophobe, the droplet can camp there only so long as it does not merge with another droplet. As soon as it weds with another droplet, the energy produced is so great that the two will âoejumpâ away from that surface, as if in urgent deference to the surfaceâ(TM)s severe water phobia. Scientists have proposed that this âoejumpingâ could be incorporated into power plant design. But, in prototypes, this âoejumpingâ design is not as efficient as engineers believe it could be. Some of the droplets will just fall back to the condenserâ(TM)s surface, recoating it and slowing the process down.

A newly discovered component to the âoejumpingâ process might allow scientists to eliminate this fall back. In an accidental find, the MIT team found that droplets donâ(TM)t just spring from the surface â" they also rebound from each other, because an electrical charge forms on the droplets as they flee the hydrophobic surface. So, if a charge is applied to the condenser system, the water droplets can be electrically prevented from returning to the surface, he said. âoeIf you utilize the fact that these droplets are charged, you can now create an external electric field, which can attract the droplets away from the surface, and make sure they donâ(TM)t return,â says Miljkovic.

At the moment, these are lab results, but the scientists say that they are confident that the charged âoejumpingâ can be reproduced on a macro-scale suitable for commercial purposes â" those possible applications include not just use in power plants, but also in de-icing technologies for airplanes and wind turbines."

Link to Original Source
top

PSN User Reporting Fraudulent Use Of Debit Card

_0xd0ad _0xd0ad writes  |  more than 3 years ago

_0xd0ad (1974778) writes "Yesterday's story about the ongoing PSN outage ended with this ominous revelation: "An 'unauthorized person' has PSN users' 'name, address (city, state, zip), country, email address, birthdate, PlayStation Network/Qriocity password and login, and handle/PSN online ID.' Billing address, password questions, and credit card info may also have been taken."

Now it appears that their worst fears may have been true. At least one PSN user has reported fraudulent charges being made to their debit card since the data leakage occurred. At this point it would probably be wise to immediately cancel any debit cards that you've used to make purchases on the PSN and to check your credit card activity frequently and report any unauthorized charges."

Link to Original Source

Journals

top

Agreeing vs. Disagreeing

_0xd0ad _0xd0ad writes  |  more than 2 years ago

There are people who can agree to disagree.

And then there are people who can disagree to agree.

My desire is to be the former.

Discuss, if you wish.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>