Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Shade (Score 1) 259

Wouldn't that only add to the heat present in the system? Unless you solve the problem of moving the waste heat somewhere away from the place, you'll just introduce more heat produced by thermodynamic inefficiencies of the process involving transport of heat using Peltier elements - the laws of thermodynamics, especially the first one, are ruthless.

True, the air heated by radiators attached to Peltier elements might get hot enough to raise upwards and travel away from the camp, but you'd need to perform real world tests to really know whether the effect that you achieve would be that of cooling, or warming.

Comment Re:Shade (Score 2) 259

Wouldn't that add to the heat? The waste heat transported by Peltier elements needs to be moved somewhere else, otherwise you'll just get more heat stemming from the thermodynamic inefficiency of the process.

Sure, the hot air might rise upwards and the tents might gain some cooling from such a setup, but I think this needs testing in real life in order to determine whether the real effect will be that of cooling, or warming.

Comment Re:Problem (Score 1) 297

The trust has to do not with sexual activity, but with people generally being possessive with regards to each other in a relationship (especially women towards men but this may be a cultural bias, not necessary evolutional/biological).

This is a universal trait of humans and it's not dependent on religion. It has more to do with inherent egoism and self interest.

Take a look at any ancient epics like Greek myths or Norse sagas.

Comment Re:Good luck with that (Score 1) 249

If the codes were generated by an algorithm, it would be possible to discover the algorithm and generate valid codes.

You know the algorithm. You don't know the private key.

Not even necessarily that. They may securely, randomly generate codes and store them in their database for validation. No key, no derivation, the code is a completely random value.

In such a case, the only possible attack would be against their database.

Comment Re:Good luck with that (Score 1) 249

"take a while to crack"? How do you exactly imagine performing cracking in this context? Cracking a code in the way you imply (brute force?) involves lots of attempts.

When faced with interactive network login, this is feasible - the attempts are cheap, you can automatically perform millions of login attempts at practically no cost.

In this context, you'd have to send millions of identical physical letters until one gets through. How do you imagine going that? Getting a truck of blank letters, using an army of printers and robots to fill them in and pack and throw into mail boxes? You'd have to distribute your attack among thousands of geographically distributed post offices, otherwise you'd overwhelm the one, the mailbox would immediately overflow.

We're talking of physical reality. Brute force cracking attacks are mostly tied to the domain of virtual stuff unless you're talking about really short codes (like 2 digit code, or, in the case of e.g. suitcase locks, 3/4 digits). I doubt they make the codes so short here.

About getting one digit wrong - you can always make the code somewhat redundant, making use of error correction codes.

Comment Re:Are MD and SHA easily reversible? (Score 1) 409

I don't get it - surely it shouldn't matter if someone gains access to the password verification routine, the salt and the encrypted passwords... unless the password hashing/encryption is easily reversible?

They've still got to try and brute force match the encrypted data with a dictionary attack - sure, having the salt makes it easier - but if you've got the salt and the encrypted passwords it doesn't matter what encryption algorithm is used, you've still got to use a brute force dictionary attack. Most encryption algorithms aren't easily reversible - and that's the whole point.

Did you RTFA?

The point is that typically used hash algorithms are designed for speed, which makes brute forcing much easier. For this task, a deliberately slow hash algorithm, like bcrypt, should be used, making the brute force attack much less (like 5 orders of magnitude) feasible.

Comment Stanislaw Lem predicted all this in 1986 (Score 1) 119

The polish SF writer Stanislaw Lem has predicted the evolution of warfare we're observing today as far back as 1986:

The really interesting essay of the three, and the one with the greatest connection to the rest of Lem's work, is the middle one, "The Upside-Down Evolution." Lem announces that, by unspecified means, he's gotten hold of "a military history of the twenty-first century," and proceeds to describe the advent and evolution of warfare by micro- and nano-robots.

It's been some time since I read it, but I recall him having envisioned evolution of war machinery as it became more and more miniaturized and swarm-like, until it was completely impossible to know if and who was attacking who. A country was able to e.g. form giant undetectable light-focusing lens overlaid in the upper layers of the atmosphere to influence agricultural yield of another country and affect its economy without needing to resort to direct contact and observable violence.

Very interesting to see the actual 21st century technology follow the exact path predicted by Stanislaw Lem. And we're only at its beginning.

All in all, a recommended read (like many other works by Lem).

Comment Re:Did anyone ever actively use it? (Score 1) 327

Where's that edit history you're referring to?

I were looking for it in a number of places (and their own help has 0 articles for that keyword) all around the Wave UI, I just wanted to revert some deletions I've made to a document.

I couldn't find it and it was the major reason I've stopped playing with it - too easy to lose content.

The other reasons being lack of integration with Google Docs and GMail...

Slashdot Top Deals

"Religion is something left over from the infancy of our intelligence, it will fade away as we adopt reason and science as our guidelines." -- Bertrand Russell

Working...