Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment SKINIT (Score 1) 993

I put a bad ass skin on my laptop that I designed in Photoshop and I got it at skinit.com. I constantly get comments on how sweet it is and I have since added one to my work laptop as well. It protects it from scratches and will also give you that 'manly' look that you so crave! They are like 30 bucks...a steal if you ask me. I used to carry around a scratched up pos.

Comment Is Engadget distributing child porn as well? (Score 1) 430

So is this site (which links to the list of sites which include child porn) also distributing child porn under that same logic? If we go to Wikileaks are we then also breaking the law? How do we verify the sites on the list are legitimate to be censored without looking at the list? It seems to me that by making the list the government itself is also 'storing' child porn. It is a catch 22. Also, if the German government knew about the list and had seen it or possessed it then aren't they also storing child porn too? I don't see how anyone can get around this obvious contradiction.

Comment US Systems also hacked (Score 5, Interesting) 178

During the last election there were numerous researchers who showed 280 different ways that the current machines can be hacked within about 6 minutes. The paper trail does nothing as it can also be fooled into passing the tests and still rigging the election. There are no sanity checks or anything in the FlashROM bootloader and anyone can hack it with a JTAG that can be built for about three bucks at RatShack. The Diebold DRE firmware was even online during the election so one could disassemble it and write all the code at home without even gaining access before the hack. I even found detailed high-res pictures of the JTAG port, motherboard, screw locations, and EVERYTHING online. I also know that in my town the machines are loaded into U-Hauls each night and then moved to an insecure warehouse near where I work. This is incomprehensible.

In Utah, Emery County clerk Bruce Funk had independent tests done which found multiple ways in which these machines could be exploited and Diebold fought to silence him and attempted to charge the state $40,000 to 're-certify' them. Then he was forced to resign for having them tested. It is obvious that Diebold knows about the issues and is acting to suppress the information. Now reports are coming in that choosing 'straight party' for Democrat sometimes gives votes to Republicans or does not count them at all straight from the Diebold factory. I voted straight party during the last election. Do you know how that makes me feel? It seems like some of them may be rigged right from the factory and there are no checks and balances in place to ensure that they aren't.

The argument that a 'hacker' could not have time during voting to modify these is just common sense and just does not stand up. It is not a 'hacker' during voting time that I am worried about. Anyone with ulterior motives and access to these machines for even five minutes can sway the election. This is such a simple process that it sickens me.

It doesn't even need to actually happen, the idea that it IS POSSIBLE is enough to disenfranchise voters. I feel helpless to stop it. It is bad enough that here in Utah my democratic vote is almost good for nothing, and then I have to fight the uphill battle on a easily hackable machine. I have worked with electronics my whole life and these machines are less secure than my Xbox360 and iPhone.

Will you please help fight to ban electronic voting? Write your senators, congressmen, and president. Please, someone has to stand up for the rights of the voters. We cannot depend on companies like Diebold and others to elect our officials. This is not paranoia, we can not trust these machines. Once it becomes possible to 'buy' an election we will never get this country back from those who stole it. I fear it may already be too late.
Security

Submission + - WiFi malware could take over 55% of APs in 2 weeks (bbc.co.uk)

Innovative1 writes: A new type of Malware that exploits wireless Access Points could take over 55% of all APs in a given area within two weeks! Secure your routers people (and not with WEP). Also, make sure that you change the default login and keep your firmware current. I work for a large WISP and NOBODY secures their router or changes their passwords unless I do it for them.....come on!

Slashdot Top Deals

"I've seen it. It's rubbish." -- Marvin the Paranoid Android

Working...