Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Ask Slashdot: What To Do After Digitizing VHS Tapes?

wiredog Safe deposit box (239 comments)

External hard drives are cheap. I Have one in the safe deposit box at the bank, one at home, and I rotate them every couple of months. I just do a copy of /Users (on my Mac, /home on Linux, not sure what the WIndows equivalent is) to the hard drive.

yesterday
top

After Celebrity Photo Leaks, 4chan Introduces DMCA Policy

wiredog Re:Doesn't this pretty much kill 4chan? (134 comments)

What is the legal status for hosting a server with illegal information on it?
If they don't know, then they are not responsible. It's in the DMCA, or possibly the CFAA.

about two weeks ago
top

Interview: Ask Christopher "moot" Poole About 4chan and Social Media

wiredog So what do you think the chances are (220 comments)

That NSA and GCHQ are able to monitor 4Chan and track who the "anonymous" posters are?

about two weeks ago
top

Professor Steve Ballmer Will Teach At Two Universities This Year

wiredog He's as much of a scientist (179 comments)

as my History professors and English professors were.

about three weeks ago
top

Fugitive Child Sex Abuser Caught By Face-Recognition Technology

wiredog Re:It's tinfoil time! (232 comments)

Or Congress, which has oversight authority.

about a month ago
top

IBM Creates Custom-Made Brain-Like Chip

wiredog The Genisys of Skynet! (105 comments)

As good as any other theory, I guess.

about a month ago
top

With Chinese Investment, Nicaraguan Passage Could Dwarf Panama Canal

wiredog If Nicaragua wants to be to China (322 comments)

what Panama is to the US, then fine, go for it.

about a month ago
top

40% Of People On Terror Watch List Have No Terrorist Ties

wiredog The TSDB tracks names, not people. (256 comments)

There is a many to many mapping of those. (Should be many to one, but nothing is perfect.)

That is, my slashdot user name is one "name", so is my "real" name that people call me, which is not the full name on my birth certificate. So that's three names for one person.

Also, not all terrorist groups are in the middle east, or Muslim. Several are right here in the US, and Christian. (Or Jewish, not sure if any atheist groups are in the US).

about a month ago
top

40% Of People On Terror Watch List Have No Terrorist Ties

wiredog So 40% dwarfs 60%? (256 comments)

In which mathematical system is 40>60?

about a month ago
top

Western US States Using Up Ground Water At an Alarming Rate

wiredog Re:Lumping everyone together.... (377 comments)

better to deliver it to where it's needed (i.e. Phoenix) than sell it to southern California or let it flow into Mexico unused.

Because God forbid we actually let those dirty beaners get the water we promised to them by treaty, right?

about 2 months ago
top

Preparing For Satellite Defense

wiredog New potential battleground? (118 comments)

New since, umm, the 1960's? 1980's, anyway. The US has tested several different ASATs over the years, and has long had countermeasures. I assume other countries have countermeasures as well.

about 2 months ago
top

FreeBSD 9.3 Released

wiredog 2014 is the Year of the BSD Desktop! (77 comments)

Please try to keep posts on topic.
Try to reply to other people's comments instead of starting new threads.
Read other people's messages before posting your own to avoid simply duplicating what has already been said.
Use a clear subject that describes what your message is about.
Offtopic, Inflammatory, Inappropriate, Illegal, or Offensive comments might be moderated. (You can read everything, even moderated posts, by adjusting your threshold on the User Preferences Page)
If you are having a problem with accounts or comment posting, please yell for help.

about 2 months ago
top

Hacking Online Polls and Other Ways British Spies Seek To Control the Internet

wiredog This whole thing is wildly inaccurate. (117 comments)

Rounding errors, ballot stuffers, dynamic IPs, firewalls. If you're using these numbers to do anything important, you're insane.

about 2 months ago
top

Hair-Raising Technique Detects Drugs, Explosives On Human Body

wiredog The TSA has a new toy.. (162 comments)

It's gonna make going through airport security even more fun. Especially for those with pacemakers.

about 2 months ago
top

Thousands of Leaked KGB Files Are Now Open To the Public

wiredog And in 20 years (95 comments)

The Russians will release the complete Snowden Archive.

about 2 months ago

Submissions

top

Canon printer hacked to run Doom video game

wiredog wiredog writes  |  yesterday

wiredog (43288) writes "From the Beeb, the news that security researcher Michael Jordon has hacked a Canon's Pixma printer to run Doom. He did so by reverse engineering the firmware encryption and uploading via the update interface.

But does it play Barney Doom? And can you get Linux running on the thing?"

Link to Original Source
top

25th Anniversary of the Morris Worm

wiredog wiredog writes  |  about 10 months ago

wiredog (43288) writes "Yesterday was the 25th anniversary of the Morris Worm, the first malware to spread widely on the internet. The Washington Psot has a wrtiteup of the worm, it effects, and after-effects."
top

NSA is Collecting Lots of Spam.

wiredog wiredog writes  |  about a year ago

wiredog (43288) writes "Lots of it. Overwhelming amounts, perhaps. From The Washington Post

when one Iranian e-mail address of interest got taken over by spammers. The Iranian account began sending out bogus messages to its entire address book. ... the spam that wasn't deleted by those recipients kept getting scooped up every time the NSA's gaze passed over them. And as some people had marked the Iranian account as a safe account, additional spam messages continued to stream in, and the NSA likely picked those up, too....Every day from Sept. 11, 2011 to Sept. 24, 2011, the NSA collected somewhere between 2 GB and 117 GB of data concerning this Iranian address.

"
top

Samsung caught adding benchmark optimization code to Galaxy Note 3

wiredog wiredog writes  |  about a year ago

wiredog (43288) writes "From the article at ArsTechnica:

we can confidently say Samsung appears to be artificially boosting the US Note 3's benchmark scores with a special, high-power CPU mode that kicks in when the device runs a large number of popular benchmarking apps.

"
top

Why is the IRS targeting free software?

wiredog wiredog writes  |  about a year ago

wiredog (43288) writes "From the IRS "be on the lookout" list that listed "Tea Party", among others, as suspicious entities:

Open Source Software
These organizations are requesting either 501(c)(3) or 501(c)(6) exemption in order to collaboratively develop new software. The members of these organizations are usually the for-profit business or for-profit support technicians of the software.

"

Link to Original Source
top

Storm brewing over Weather Channel's bid for ".weather" TLD

wiredog wiredog writes  |  about a year and a half ago

wiredog (43288) writes "From the Capital Weather Gang blog comes the story of the various people and organizations objecting to the Weather Channel's attempt to grab ".weather" for themselves.

I don't know why they would try, since they don't actually do weather forecasting anymore. Just one reality show after another."

Link to Original Source
top

Tracking Chinese Cyber-Espionage Botnets

wiredog wiredog writes  |  more than 2 years ago

wiredog (43288) writes "From Brian Krebs, reporting on a large scale Chinese cyber-espionage operation:

the infrastructure that frames these these spy machines generally points in one of two directions: one group’s infrastructure points back to Shanghai, the other to Beijing.

“There have to be hundreds of people involved, just to maintain this amount of infrastructure and this much activity and this many spear phishes, collecting so many documents, and writing this much malware,” Stewart said

"

Link to Original Source
top

Microsoft Hunting Rustock Controllers

wiredog wiredog writes  |  more than 3 years ago

wiredog (43288) writes "From security reporter Brian Krebs comes further information on how Microsoft took out the Rustock botnet, and how it's going after the controller(s?), who are apparently based in St. Petersburg Russia.

Microsoft is required by law to now make a “good faith effort” to contact the owner(s) of Rustock control domains and other infrastructure the company has since seized, and to notify the individual(s) of the date, time and location of an upcoming court hearing in Seattle, Washington, where the defendants will have an opportunity to be heard.

Microsoft will publish the information on a Web site set up for this purpose – noticeofpleadings.com.

"

Link to Original Source

Journals

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>