Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Submission + - Court OKs Barring High IQs for Cops (go.com) 3

An anonymous reader writes: "A man whose bid to become a police officer was rejected after he scored too high on an intelligence test has lost an appeal in his federal lawsuit against the city.

The 2nd U.S. Circuit Court of Appeals in New York upheld a lower court’s decision that the city did not discriminate against Robert Jordan because the same standards were applied to everyone who took the test.

“This kind of puts an official face on discrimination in America against people of a certain class,” Jordan said today from his Waterford home. “I maintain you have no more control over your basic intelligence than your eye color or your gender or anything else.” "

Submission + - Honeybees beheaded by parasitic fly larvae (scientificamerican.com)

turtledawn writes: Slashdot has been reporting on honeybee colony collapse disorder for a while now, and a potential new culprit has been discovered by John Hafernik, a biology professor at San Francisco State University. Larvae of a parasitic fly of the genus Apocephalus — the beheader — has been documented emerging from the bodies of expelled worker bees.
Google

Submission + - Nginx overtakes Microsoft as No. 2 Web server (infoworld.com)

tsamsoniw writes: "With financial backing from the likes of Michael Dell and other venture capitalists, open source upstart Nginx has edged out Microsoft IIS (Internet Information Server) to hold the title of second-most widely used Web server among all active websites. What's more, according to Netcraft's January 2012 Web Server Survey, Nginx over the past month has gained market share among all websites, whereas competitors Apache, Microsoft, and Google each lost share."
Privacy

Submission + - Avoiding Facial Recognition of the Future (itproportal.com)

hypnosec writes: A New York-based designer has created a camouflage technique that makes it much harder for computer based facial recognition. Along with the growth of closed circuit television (CCTV) , this has become quite a concern for many around the world, especially in the UK where being on camera is simply a part of city life. Being recognized automatically by computer is something that hearkens back to 1984 or A Scanner Darkly. As we move further into the 21st century, this futuristic techno-horror fiction is seeming more and more accurate. Never fear though people, CV Dazzle has some styling and makeup ideas that will make you invisible to facial recognition cameras. Why the 'fabulous' name? It comes from World War I warship paint that used stark geometric patterning to help break up the obvious outline of the vessel. Apparently it all began as a thesis at the Interactive Telecommunications Program at New York University. It addressed the problems with traditional techniques of hiding the face, like masks and sunglasses and looked into more socially and legally acceptable ways of styling that could prevent a computer from recognizing your face. Fans of Assassin's Creed might feel a bit at home with this, as it's all about hiding in plain sight.

Submission + - IT managers are aloof, insular, says psychologist (computerworld.com) 1

dcblogs writes: IT managers see themselves as "reigning supreme," in an organization, and are seen by non-IT workers as difficult to get along with, says organizational psychologist Billie Blair. If IT managers changed their ways, they could have a major impact in an organization. “So much of their life is hidden under a bushel because they don't discuss things, they don't divulge what they know, and the innovation that comes from that process doesn't happen, therefore, in the organization,” says Blair.

Comment Re:Standard Practice (Score 4, Informative) 128

This is an incorrect assertion, an assertion my previous post debunked, but I suppose I'll re-explain:

You could have a drive full of PDFs, you could have it full of PNGs, whatever file format you'd like. You could mount the drive as noexec, however when it comes down to it, a trusted program (NOT ON THAT DRIVE) can interact with those files and since file formats can be complex AND since the programs opening them are also complex, there's a chance that the program will be vulnerable to a crafted file that tricks the program to do something that a "regular movie" or whatever wouldn't do and may not have been tested for.

If you've written a file parser of any kind, you'll see how complicated it gets in having your program code check the file for abnormalities before interacting with it. This complexity is a steep curve and all it takes is not checking an array boundary for your program to mistakenly leak data memory into its executable memory space.

The old addage plays correct here: Never trust user inputs.

Comment Re:Standard Practice (Score 5, Informative) 128

The parent couldn't be more correct.

People discount regular data files as being malicious simply because they're not labelled executables. What they don't think is that those files are opened by executables. These executables are often trusted programs which makes this an even bigger threat to a system as the malicious code can run hidden under the legitimate process and do its work. There's anything from buffer overruns to file parsing mistakes in the programs that can open them up to become a conduit for abuse.

An example of this is Adobe Reader's countless exploits with the PDF file format.

Comment Re:Trying to do too much (Score 1) 753

I disagree. Applications should be optimised but many developers aren't doing that anymore as it means more development time.

Over the years, if you compared in ratio how much resources applications used in 2000-2005 compared to what they use now, you'll see that applications use an unjustified amount of resources. A large problem is this "If your computer can't run X, upgrade your computer" movement instead of pressing developers into reviewing how they can optimise.

Nearly no modern practical use (read: browsers, office productivity, etc) program can run on a modern average computer anymore without paging to disk, and that is a disturbing trend.

Comment Re:SSL is heavy (Score 4, Informative) 94

This is correct, SSL induces significant overhead both bandwidth and CPU-wise. While most CPUs can handle an SSL website connection that is because the SSL handshake is done every so often (at the beginning of each resource download). However implementing it in a "fast acting" protocol like DNS is guaranteed to slow the protocol down, ergo clients will have to wait non-trivial time before they even connect to the resource in question.

This doesn't even account for the DNS resolver's resource usage, given an average resolver's query load, the additional stress needed to do SSL for each query would be operationally unacceptable and having persistant connections hanging open for an ISP-load of users would not be an option either as the servers' open file descriptors would get exhausted.

Comment Re:Easy work-around (Score 4, Informative) 161

There is a large difference between "user" and "customer", the problem is you may think that you are a "customer" (or at least potential customer) of every site you visit, but this is incorrect.

"Customer" implies that there is a business relationship in play, however if it is a forum or other free resource, you will never be a customer as there is nothing to purchase. Not every website on the internet is a business.

It is often seen as abuse when a user downloads or needlessly accesses a resource (files) multiple times and website administrators often have no qualms blocking abuse, it means less load on their site's server and more resources free (bandwidth, connection slots on the webserver daemon) for other users and on top of that: potentially lowering their bill.

Coming from experience, I've seen people use download managers and misconfigure them purposefully so they open 20-100+ connections to a file feeling that the website somehow owes them that file, doing so on a webpage with a browser is no different.

Transportation

Submission + - Boarding a moving train: The way to speed up rail (cnn.com)

PolygamousRanchKid writes: Determined to take rail transport into the 21st century, Paul Priestman, director of British design group Priestmangoode, is the man behind the "Moving Platforms" concept, which he believes could potentially revolutionize the rail industry. The idea is to have a city-wide network of trams that travel in a loop and connect with a high-speed rail service. But instead of passengers having to get off the tram at a rail station and wait for the next HSR service to arrive, the moving tram would "dock" with a moving train, allowing passengers to cross between tram and train without either vehicle ever stopping. "The trams speed up and the high-speed train slows down and they join, so they dock at high speed," explains Priestman. "They stay docked for the same amount of time that it would stop at a station," he adds.

While Priestman admits that it will be some time before his vision could be implemented, he says the time has come to rethink how we travel. "This idea is a far-future thought but wouldn't it be brilliant to just re-evaluate and just re-think the whole process?" he says.

Comment Re:Not so smart (Score 4, Insightful) 375

The problem is that spectrum is up for sale, aside from governmental implementations, there really isn't "open spectrum" for specific classes of devices unless a manufacturer has a monopoly on that area of spectrum AND type of devices. Spectrum is either assigned to organizations based off of money (auctions), or it is put up as a "free-for-all", which results in either underutilized or overcrowded communications.

I bet if the FCC started allocating specific spectrum to specific industries (not organizations) the interference could drop quite quickly.

Slashdot Top Deals

Math is like love -- a simple idea but it can get complicated. -- R. Drabek

Working...