Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Drug dogs (Score 1) 409

Because people think the dog is what is doing the detection, when it is not. Like a placebo drug, there may be a beneficial effect, and it may involve the placebo, but it is not due to any characteristic inherent to that placebo. Rather, it is the knowledge that the placebo is present that is useful.

To spell it out more clearly, cops may have very good hunches that someone has drugs, but they cant legally stop that person. The dog acts as a placebo: he "signals" that there are drugs, and everyone believes the dog has detected drugs, but its not the dog doing the detection, its his handler who triggered him.

Im sure some dogs DO detect drugs, but the above scenario has been reported a number of times.

Comment Re:Drug dogs (Score 2) 409

He actually does know what placebo means, because I've seen articles suggesting what he's saying.

That is, however good a dog's scent of smell is, the real successes come from cops with hunches whose attitude towards the suspect triggers the dog into a "response". Apparently a drug dog response constitutes probable cause, and its well known that dogs are quite attuned to the behavior / stance of their handlers /owners and can be triggered into an aggressive response by the handler.

Comment Re:Can we all agree (Score 1) 134

Siri does not work with all applications like a keyboard does. I cannot open an arbitrary app's arbitrary text field and dictate into it; this means the only reason I can dicatate youtube searches is because the Youtube app specifically implemented it.

Try SwiftKey for android and you will see what I mean. Dictation is a part of the keyboard, and does not rely on the "personal assistant" app knowing where to stick text.

Comment Re:ISTR hearing something about that... (Score 1) 162

Interesting, I hadnt seen the 840/50 pro reviews. Theyre somewhat exceptional in that regard, though, Im not aware of general consumer SSDs being able to hold that level of performance.

In any case I was responding to someone discussing the 840 EVO, which is an entirely different animal than the 840 pro, and certainly cannot hold 30k IOPS.

Comment Re:Words without actions are meaningless (Score 3, Insightful) 107

The "security" you attribute to NAT does not come from NAT, it comes from using "private" addresses.

Im pretty sure thats what I said, and no one is arguing that point. You're just insisting on being pedantic and condescending.

Your original statement was that NAT is not security. This post of yours agrees that it is security in some shape. If we're agreeing there, then I dont think theres any reason to keep arguing. If youre disagreeing with that, Id ask you to take it up with the links I provided and with stackexchange. I dont have the time to try to make Cisco and SANS' cases on their behalf, if you are unwilling to take their word on it.\

. Besides, why do you trust your ISP not to snoop around on your network?

Because it is an unusual attack scenario, and it would be illegal. It does happen, sure, and defending against a malicious ISP is far beyond the scope of most home security. Luckily for us every consumer OS made in the last 10 years has a stateful firewall, and every consumer router built in the last 10 years has a firewall, so its not an issue.

I mean good grief, 99% of home users are using the ISP provided DNS, and you're worried about probing through NAT in violation of the RFCs? DNS snooping is something that actually happens, and is actually legal. Risk assessment 101: focus on the probable threats.

Without mentioning the need to filter incoming packets, that tutorial concludes: "A computer located in the internet is not able to establish a connection to a local computer, all he can do is address (a port of) the router and hope the best."
Wrong, and leaves anyone who follows the tutorial vulnerable.

As mentioned already, it is impossible in the absence of a published route to your network for someone to reliably send packets directly into a dynamically natted network. The fact that someone could splice onto your cable network is irrelevant, because at that level of effort they could probably climb in through your window and just steal all of your equipment. You're talking about extremely esoteric attacks.

You're really doing people a disservice by perpetuating the myth that NAT adds security.

Im perpetuating the stance of major infrastructure vendors. Argue with them. I imagine you could contact support@cisco.com and explain why their statement that NAT fulfills a security role is incorrect.

In the meantime I would suggest you cut the condescending attitude.

Comment Re:ISTR hearing something about that... (Score 1) 162

If you're asking "what is my proof", check out any anandtech review's "consistency" test on SSDs.

If you're asking what the cause is, I would assume theres a buffer thats getting saturated, or else a cache that is exhausted, or perhaps the SSD controller's CPU gets pegged. Whatever the cause, most SSDs will sustain very high IOPs for a short period of time before falling into a "steady state pattern". For some SSDs it is a wildly swinging pattern, others (higher quality) hold a pretty steady rate around 5-6 IOPS.

Comment Re:It all depends on the workload... (Score 1) 162

You'll note that to produce this crappy summary they skipped over the IOmeter pages which show the Intel 750 bursting @ 180k IOPS and sustaining 20k, while 90% of consumer SSDs cant sustain more than 8k and the x-25m theyre touting struggles to break 2k.

Load up a slew of VMs on a virtualization lab on that x-25M and compare it to the 750-- THEN tell me that its no faster.

Slashdot Top Deals

Getting the job done is no excuse for not following the rules. Corollary: Following the rules will not get the job done.

Working...