Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!



Police Raid PS3 Hacker's House, Hacker Releases PS3 'Hypervisor Bible'

rockNme2349 Re:Cheating (448 comments)

I would probably take precautions if it was me, but is a police raid really an acceptable response to a civil disagreement?

more than 3 years ago

Police Raid PS3 Hacker's House, Hacker Releases PS3 'Hypervisor Bible'

rockNme2349 Re:Cheating (448 comments)

If this is how people think then we have already lost...

more than 3 years ago

Teachers Back Away From Evolution In Class

rockNme2349 Re:America has jumped the shark (947 comments)

She truth, while painful, is good for you.

I remember when my girlfriend dropped a big she-truth on me. It took me a week to recover.

more than 3 years ago

Sony Reveals the Next Generation Portable Console

rockNme2349 Re:Storage medium? (244 comments)

At last, Sony sees the error of their ways in choosing disks over cartridges!

more than 3 years ago

Ford Building Cars That Talk To Other Cars

rockNme2349 Re:These systems which preach safety and security. (239 comments)

More importantly to me, is whether or not these are implemented using open standards.

Car-to-Car communication isn't helpful when 10% of them use FORD wireless communications, 10% have GM brand Safety wireless etc. etc.

more than 3 years ago

Encrypt Your Smartphone — Or Else

rockNme2349 Re:How? (304 comments)

My Blackberry is set with an 8-character moderately complex password, but the key is to have a try limit. If you enter a bad password ten times, my Blackberry will nuke itself clean of all data.

This is definitely a good idea, as long as the data isn't too sensitive. You need to remember that a sufficiently equipped adversary won't be brute forcing your encryption on the Blackberry, but on their own system after they've extracted the encrypted data. Probably one of the best security measures you can have is a physical chip which contains the key, with a physical self destruct after too many attempts. I remember reading an article about a flash drive like this. This of course assumes that you can make this chip very hardened from an attacker extracting the key.

But I mean if it's only someone casual you're worrying about, and not the NSA you're probably fine.

more than 3 years ago

GE Venture Will Share Jet Technology With China

rockNme2349 Re:Repeating history (266 comments)

Thanks. That was my misunderstanding.

more than 3 years ago

GE Venture Will Share Jet Technology With China

rockNme2349 Re:Repeating history (266 comments)

Of course as we all know, the whole thing about prisoner's dilemma is that it falls apart in the long-term.

Wait, don't you have that backwards? The prisoner dilemma as I understand it is ONLY stable in the long-term. If you only perform one iteration of the prisoners dilemma, then the dominant strategy is to choose the "bad" move. However if you can account for there to be many iterations then the maximum profit is found in both parties performing the "good" move, which is easier for large corporations who only have a few rivals.

more than 3 years ago

First Ceiling Light Internet Systems Installed

rockNme2349 Re:Welcome to 1994... (179 comments)

i agree, it's little different from wifi, but i don't understand why it's better than wifi? ... It doesn't work through drywall.

I don't claim to understand this system completely, but that sounds like a feature to me. Crowded apartment building? This gives an alternative to a saturated wifi network.

more than 3 years ago

Jerry Brown Confiscates 48,000 Cell Phones

rockNme2349 Re:So what about... (738 comments)

Just want to make a point here about a common fallacy when doing math in cell phone plans.

If you have a plan for $40 which gives you 450 minutes, it only costs you $40/450=8.9 cents per minute if you use exactly 450 minutes.

For example, If you use 300 minutes in a month, it costs you $40/300 = 13 cents per minute.

If you use 500 minutes in a month, assuming they charge 25 cents per minute overages (the actual number isn't important), then you pay ($40+50*$0.25)=$52.5/500 =11 cents per minute.

This is why tiered plans are deceptive.

I would also be cautious in assuming that since the average phone bill is $36/month that the phone companies are charging $36/month per phone. I would assume that someone as large as a government organization doesn't have to deal with tiered plans, and can just purchase minutes at a set rate. This means that assuming that the price of the phone is negligible (maybe not), the better deal for the organization is simply from whoever bills them a lower rate for the minutes (you or the phone provider).

Most likely though this is a better deal for both of you. You subsidize buying a phone and a plan for the government, and (assuming you would buy a phone anyway for personal use) since you were not using your entire 450 minutes anyway and did not have to increase your plan, you get some of your minutes partially refunded by your employer.

more than 3 years ago

Doubling of CO2 Not So Tragic After All?

rockNme2349 Re:Even if it only raises temperature 1.64 degrees (747 comments)

Neat fact:

Raising the partial pressure of CO2 exponentially results in a linear increase in the pH.

This is because the Concentration of CO2 in the water is determined using Henry's Law, a linear relationship between partial pressure in the gas and liquid concentration. At the relevant concentrations the concentration of H+ is linearly related to the concentration of CO2 in the water.

more than 3 years ago

A Peek At South Korea's Autonomous Robot Gun Turrets

rockNme2349 Re:Tower defense, the real world version. (298 comments)

Autonomous Turrets? A Trifle. Just send wave after wave of your own men until they reach their preset kill limit.

more than 3 years ago

The DIY Car Computer vs. the iPad

rockNme2349 Re:Why not... (202 comments)

That's boring, think of all the stuff you could do while...

hold on, I gotta change lanes...

more than 3 years ago

Cracking Passwords With Amazon EC2 GPU Instances

rockNme2349 Re:Dictionnary attack doesn't show any weakness (217 comments)

If the cracker HAS the hashed password file then your security has already been breached. There's about three things on any system that need access to that file: the login system, the password change system and possibly the admin.

The general idea of hashing passwords is that even if an adversary gains access to the password file it can still be secure. This accounts for things that you might not have foreseen, such as intercepted communications. They don't have to access it in storage necessarily. Now you can always say that your users should be using encrypted connections to your server, but the point of the hash is to have a second line of defense, since a password is a very unique type of information where the data doesn't need to be accessed, simply matched. Even if you encrypt your communications, are you sure it is secure? Will it always be secure?

more than 3 years ago

Considering a Fair Penalty For Illegal File-sharing

rockNme2349 Re:Ill gotten gains (728 comments)

If we gained less from this than we paid, of course we'd need to either fix the system or abolish it entirely.

The funny thing though, is that I know plenty of people who make music for free, and have no problem even just giving it away. The thing that makes taxi cabs different from music, is that people make music for fun, and will do it for free. I have no doubt that if copyright no longer applied to music, the only people who would stop making music would be the giant corporations who have just turned music in to mass produced shit. Mainstream artists will still be rich, even if they never sold an album, because they'll be able to draw massive crowds to live performances. They just won't be AS rich. However, everyone else will be benefiting from a tremendous boost in culture, when they are able to download as much music as they want from the mainstream artists who are still making money, but would be exposed to more music created by people with no ulterior motive other than to have fun.

Now as a disclaimer, I don't want to step on anyone's toes here, but I personally think there is no reason being a musician has to be someone's career, it can just be a hobby, which is why if they abolished copyright laws on music tomorrow, I wouldn't have the slightest care about society's wealth of music, because people have and will continue to create it.

more than 3 years ago

Ubuntu Dumps X For Unity On Wayland

rockNme2349 Re:Ok great for beginners (640 comments)

...but I still know a LOT of people who forward X over SSH, and there are still a lot of professors who are advising their students (at least in the engineering schools I have seen) to do the same. I guess this is one of those times that just saying, "I use Linux!" will not convey what people think.

You mean, "I use GNU/Linux!"

more than 3 years ago


rockNme2349 hasn't submitted any stories.


rockNme2349 has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>