Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Submission + - Cobalt-60, and Lessons From a Mexican Theft (thebulletin.org) 1

Lasrick writes: George Moore and Miles Pomper examine the theft of a truck containing Cobalt-60 and find that, while Mexico did the right thing and reported the theft promptly, they were under no obligation to do so according to international rules and the IAEA. This was true even though the stolen material was 3,000 curies, making it a Category 1 source (the most dangerous). Great discussion.

Submission + - Soviet Union Spent $1 billion on 'Psychotronic' Arms Race with the US (medium.com)

KentuckyFC writes: During the Cold War, the US and the Soviet Union battled on many fronts to demonstrate their superior technical and scientific achievements. While the race to put a human in space and then on the Moon is famous, a much less well-known battlefront was the unconventional science of parapsychology, or psychotronics as the Soviets called it. Now a new review of unconventional research in the Soviet Union reveals the scale of this work for the first time and the cost: as much as $1 billion. The Soviets had programs studying how "human energy" could influence other objects and how this energy could be generated independently of humans using a device called 'cerpan'. The Soviets also had a mind control program similar to the CIA's infamous MKULTRA project. Interestingly, the Soviets included non-local physics in this work, such as the Aharonov-Bohm effect in which an electromagnetic field can influence a particle confined to region where the field strength is zero. And they built a number of devices that exploited the effect, although research in this area appears to have ended in 2003.

Comment Re: apples and oranges (Score 1) 5

Unfortunately I lack knowledge in who these guys are in taking up the cache. My question is thus: what risks does Greenwald and cohort run of getting assassinated to keep this under wraps (and to send a message to anyone who would want to continue the work)? Snowden is hiding out in Russia for a reason. Where are these guys going to be located that they think they're safe from getting picked up Osama style while flouting around that they have ALL of the data AND they plan to release it all?

Comment I might be as excited about all this as you! (Score 1) 8

Having started and gotten a lot of work done on a book, I know it can be difficult. Its been years and I have not been able to finish it time, research and other hurdles. But it is so exciting to see that you have a copy of your book in your hands - how awesome does that feel? Maybe you can email us before you post it on /. so we can make sure to login and upvote your submission.

Comment A few ideas (Score 1) 9

I'm not entirely sure what you mean by bar code generator, but is this what you're looking for? http://www.barcode-generator.org/

For a title name, how about "Star Drops"?

For adding the copywrite, you don't have to change the page numbers if you added as Roman Numerals (I.E. i,ii,iii,iv etc.). I've seen than in quite a few books. That way you can keep your page numbers the same and still be able to add more before the table of contents.

Do you want to merge, add to, create PDFs? I have Adobe software that allows me to make one mega file out of many smaller PDFs. If this is what you need, let me know as I may be able to do it for you. You can always reach me by email.

Submission + - Magma reservoir under Yellowstone is much bigger than previously thought (nature.com)

schwit1 writes: The reservoir of molten rock underneath Yellowstone National Park in the United States is at least two and a half times larger than previously thought. Despite this, the scientists who came up with this latest estimate say that the highest risk in the iconic park is not a volcanic eruption but a huge earthquake.

Jamie Farrell, a postdoctoral researcher at the University of Utah, mapped the underlying magma reservoir by analyzing data from more than 4,500 earthquakes. Seismic waves travel more slowly through molten rock than through solid rock, and seismometers can detect those changes.

The images show that the reservoir resembles a 4,000-cubic-kilometre underground sponge, with 6–8% of it filled with molten rock. It underlies most of the Yellowstone caldera and extends a little beyond it to the northeast.

Submission + - Toyota's Killer Firmware (edn.com) 1

Smerta writes: On Thursday, a jury verdict found Toyota's ECU firmware defective, holding it responsible for a crash in which a passenger was killed and the driver injured. What's significant about this is that this is the first time a jury heard about software defects uncovered by plaintiff's expert witnesses. An interesting summary of the defects discussed at trial is interesting reading, as well the transcript of court testimony. Wonder what the impact will be on self-driving cars?

Comment Re:Drug Culture. (Score 1) 7

Yep thanks, I read them in reverse order :P

The part that really has me laughing is the 'I didn't go to college' bit in explaining how he somehow doesn't get it (but he does). But his experience as 'Captain' I'm sure has more than prepared him for this trip. I'm also curious about the incident that drew the CEO's attention - how it happened. We know that the robots pretty much do the work now, maybe going into why robots instead of people (besides the economics of it) running the ship can be explored?

Submission + - Big Box? Nissan Note The First-Ever Car You Can 'Buy' On Amazon (thecarconnection.com)

cartechboy writes: You knew the day was coming when they started selling diapers. Amazon is now dipping its toe into car sales by selling a single car: the 2014 Nissan Versa Note. Amazon users hit a real live Versa Note product page, but instead of "Add to cart" you provide your ZIP code so Amazon can connect you with a nearby Nissan dealer. The first 100 Versa Note customers whose car purchases are initiated through Amazon receive $1,000 Amazon gift cards. Best part: Customers who end up actually buying the Note *will* receive them via boxed home delivery. Now, that's a big box.

Comment Re:Drug Culture. (Score 1) 7

I just read and caught up with all the posts, very interested to see what happens once the boat reaches Mars. Will everyone have made it? Keeping going, can't wait to see it finished!

Comment Root devices (Score 1) 121

Have them root their devices. It's not necessarily an easy thing to do, and in some cases requires CLI. It will show them a high level view of the different thing a person needs to even be able to root a device (vulnerability, code, communicating with the device etc). Talk about the ethics involved in rooting the device (yours vs theirs mentality). Flash a custom "ROM."

Success can be measured by those who successfully flash a ROM without bricking the device. This will give valuable real world experience that can at the least, teach them the perils of bricking a device. Better yet, could help them save big bucks by not bricking one of their own devices. Might even get some of them interested in computer security, vulnerability discovery/patching, and some may even start a business to root devices for customers!

But don't underestimate the ability to assemble and understand a PC down to its memory and CPU. Maybe you can have different teams cooperate to be part of a work place environment. PC building, network building, and "support" getting devices imaged and/or up and running on said network.

Submission + - BREACH Compression Attack Steals SSL Secrets (threatpost.com)

msm1267 writes: A serious attack against ciphertext secrets buried inside HTTPS responses has prompted an advisory from Homeland Security. The BREACH attack is an offshoot of CRIME, which was thought dead and buried after it was disclosed in September. Released at last week’s Black Hat USA 2013, BREACH enables an attacker to read encrypted messages over the Web by injecting plaintext into an HTTPS request and measuring compression changes.
Researchers Angelo Prado, Neal Harris and Yoel Gluck demonstrated the attack against Outlook Web Access (OWA) at Black Hat. Once the Web application was opened and the Breach attack was launched, within 30 seconds the attackers had extracted the secret.
“We are currently unaware of a practical solution to this problem,” said the CERT advisory, released one day after the Black Hat presentation.

Slashdot Top Deals

Anyone can make an omelet with eggs. The trick is to make one with none.

Working...