Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Finally a reason to upgrade to Windows 10? (Score 2) 124

After resisting for the better part of a year, I may finally have a reason to "upgrade" to Windows 10? The killer feature of Windows 10 is being able to remove features. Go figure...

Unfortunately, the most annoying feature I want to remove most often is Windows(tm).

Comment I got one question (Score 1) 410

How is that Magistrate Judge Kiyo A. Matsumoto treating you?

Which case is it, USA v. Shkreli Case "1:15-cr-00637" or "1:15-cr-00637-KAM"?

Any chance you would share the court records with us? It seems that the only "public records" I can find are behind a lawyer only pay wall
Unfortunately one needs either a PACER or login account just to check in on how you are doing.

Comment same but different (Score 1) 106

They broke no law that I can see, but they are an enabling technology. An analogy might be that they are like a car rental company that advertises that they have the best get-away-cars money can rent, where as Google is yor normal Hertz or Avis car rental that checks references and credit status before renting. Its not the same thing to index files with the intended audience of thieves vs a general indexing service that tries not to attract the wrong people. Yes, they index legitimate torrents, but that might not be their intended audience. The qualifier is "intent", and that is what the US court system needs to prove, if the extradition is successful. For the time being they are presumed innocent under current US law, so extradition might be a problem as it should be.

Comment MS hosting blockchain, forget it (Score 1) 43

One of the main tenants of the blockchain design is that it never have any one organization/person in control of more than 50% of the servers maintaining the financial transaction record. Microsoft will in this case have 100% of the servers, and thus could enable someone to walk off with the whole repository in what would be the biggest cyber-heist in all of recorded history. Of course we all trust Microsoft to never get hacked or do anything wicked in its own self interest.

Sorry, I'll keep with bitcoin than-you-very-much.

Comment Cobol/Mainframe vs new Kid with a PC (Score 1) 674

On my first job as a production line parts pusher we had major problems with managing the production line and inventory. Data Processing told us that a program we needed would be impossible even with with the heavy-iron mainframes. After the second lay-off the Industrial Engineer got riffed and left behind this thing call a PC that just happened to have a 3270 terminal controller board in it. That got me thinking. I reprogrammed the controller board in ASM, and using Borland Pascal Compiler I connected it to the mainframe "pretending" is was someone typing EBCDIC key code information to pull up their worthless production inventory programs, and scraped the screens to grab what I needed. It was the tail wagging the dog kind of implementation, trying to balance the real-time control necessary with the API simplicity I needed to make programming it easy for me.

Once I had the standard application pages so that it all groked correctly, and built my temporary DB on the other partition of the Mainframe, it took me only about 6 hours to write the program that DP was telling us was impossible to do. You should have seen the face of my managers face when I walked into his office carrying a very thick ream of printouts with the all the answers he needed that day. Once the DP manger got finished being chewed out by the president of the company, that same program, utilizing the Big-Iron mainframe and with a direct connection to the actual database, it took over 6 man-months to write the same in COBOL. DP offered me a job writing Cobol, and I said no, turned professional a couple of months later and never looked back. I decided solving problems was more fun than pushing parts through a factory.

Comment Re:Admiration and Trepidation (Score 2) 59

You have many processors (DMA, GPU, Bus controllers, network boards, IO boards, keyboards, etc) installed in your every day computers, and many pidgin holes in the memory pages that can be utilized for encrypted blobs. When the malware itself is not executed, touched by, or managed by your CPU then your white-list running under your CPU's control won't help much. You want to be running VT-d/IOMMU/IMA based software protection to lock things down as much as possible. While you wait for your BIOS to finish self-check, you could already be rooted by your network card DMA or GPU processor. Any whitelist (default deny policy) that is loaded _after_ you are already rooted, doesn't do a whole lot to keep you safe. Take the red pill to leave the hypervisor you didn't even know you had.

Comment Re:Don't have to buy one (Score 1) 207

Very good advise! I used to use this all the time, and it does a good job.

One other capability for new machines is TCG Opal SED drive technology, if what you are after is speed in securely wiping data. First off the drive can be encrypted for data at rest so there is no fear of someone mounting and reading it in the first place. But when they can't even see the partition table it makes it quite hard to mount it in the first place. Then you can just flip a single bit in the drives key and instantly everything in that region is wiped to the equivalent of AES256. The only way to recover it is to set the password back before the drive is reinitialized for some other purpose. You can even set up multiple regions, write or read protect them individually, install a fake (shadow) partition table, or even lock any of them to a pcr in the hardware TPM so partitions are unusable or even non-visible unless the machine was booted exactly in your own prescribed manor. Need to hide your banking data from ransomware anyone?

Comment With Math is there any choice? (Score 1) 192

I have been trying to get back into math for the past couple of years and one of my biggest gripes is there seems to be no good way to take notes on a computer for high level math. Sure you can learn Latex but it is time consuming to write/code and difficult to keep up or draw relations between different formulas. Any good apps out there for this? (Android or Linux preferred) Bonus points if it can actually compute or show connected relations between formulas.

Comment Hope they had the good sense to.. (Score 1) 91

I hope they had the good sense to encode a unique identifier into the LIDAR beam so that each car can tell its own LIDAR reflection from another, otherwise you will see a very different kind of "traffic jam" in the near future. Each car will be jamming the signals of every other car, and nobody will move an inch, not knowing where anything is. I searched the "news story" and found absolutely no indication that they even planned that far ahead. But don't worry, they didn't miss all the important Stock Market information. Now I know exactly what not to buy.

Comment Re:There's a lesson here (Score 1) 401

Agreed, and the Government also owns 'the problem'. The problem, is that the Government was too fast on the button to disassociate the phone from the backup account. Once they deactivated the phone's account there was no way to retrieve all the backup information for it, which should have contained a very good portion of what they wanted to know. Contacts, call logs, images, cloud info, etc. They would not have access to all the 'bits' from the empty/erased records on the physical memory chips, but they would have a good portion of the historical information going back over time, potentially before some of the records were erased.

Slashdot Top Deals

Whom the gods would destroy, they first teach BASIC.