Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment 175 Million? (Score 1) 314

I have not RTFA, but of the iPods, was it a specific make/model? Is the failure reproducible? Was it meant as a "hand-warmer" feature for colder climates?

I doubt that Apple has sold 175 million of the same iPod, making all of the comments about "15 out of 175 million" a complete misrepresentation.

I hate iPods and Zunes, but what of Zunes starting on fire, or any other MP3/video player?

Networking

Directory Service Implementation From Scratch? 149

An anonymous reader writes "I work at a small but growing startup company. Currently, our directory and authentication information is scattered across many systems and wikis, and is becoming increasingly difficult to manage. We are looking at centralizing this information in a directory service to minimize administrative overhead as we continue to grow. The service must support basic directory searches, as well as user authentication for Linux and Windows hosts. Although we are primarily a Linux shop, there are a handful of Windows systems that will be on a Windows Active Directory domain. Most directory servers seem to support integration with other directory servers, however it seems like it may be easiest to just use Active Directory for everything. Are there any pitfalls with this approach? If you had the chance to redesign your enterprise directory service without regard for legacy services, how would you do it?"

Comment FCC Compliance Sticker (Score 1) 589

If I am not mistaken, in the U.S. there are these little stickers on almost every device that says FCC compliant, so they have already "inspected" the device and have no legal bearing for re-inspection without a warrant. Now in cases presented in the article it makes sense because chances are the rig is either non-certified or set-up improperly. Any individual that has ever operated a radio should understand the importance.
Security

Researchers Crack WPA Wi-Fi Encryption 311

narramissic writes "Researchers Erik Tews and Martin Beck 'have just opened the box on a whole new hacker playground, says Dragos Ruiu, organizer of the PacSec conference. At the conference, Tews will show how he was able to partially crack WPA encryption in order to read data being sent from a router to a laptop. To do this, Tews and Beck found a way to break the Temporal Key Integrity Protocol (TKIP) key, used by WPA, in a relatively short amount of time: 12 to 15 minutes. They have not, however, managed to crack the encryption keys used to secure data that goes from the PC to the router in this particular attack. 'Its just the starting point,' said Ruiu."

Slashdot Top Deals

Congratulations! You are the one-millionth user to log into our system. If there's anything special we can do for you, anything at all, don't hesitate to ask!

Working...