Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:The only wasted vote, is a party line vote. (Score 1) 349

LOL see it back fired for me, probably because I'm in a swing state. I'm also independent & voted in the republican primary for the same reason. Now I get flyers, postcards, & door to door petitioners for both parties.

I can't wait till this stupid thing is over & I don't see another MD yes/no on 7 / Attack ad for either of these bone heads

Comment Re:Would this be usefull in reverse? (Score 1) 229

Of course sorry that was silly of me. If the hash is made of arabic character directory names & registry paths your right.

So what identifiable parts could be used? MAC I suppose although as you said that could be spoofed if known. What about the processor clock, are there any uniquely identifiable parts besides the network card?

Comment Would this be usefull in reverse? (Score 1) 229

/Puts on my black crypto-anarchy hat

My understanding is the first thing LEO does when it encounters encryption or drive analysis, is pull the drive & make a copy. Then take the drive and analyzes it on a separate machine or using forensic hardware.

Would something like this be useful in reverse, because without the original computer that contains the correct configurations, the key could be given out but the since the hash needs internal qualifications to match it would not jive because they wouldn't plug the drive back into the old computer.

of course there is always rubber hose crypt, and permanent lockup, NOT obligatory xkcd, blah blah blah yeah I know all that & doesn't add to this conversation. /black Hat

Comment If you had a color get off my yard (Score 1) 231

like so many others I got my first programming chops & computer knowledge from the TRS-80 my dad brought home. Did anyone else try copying the software from the back of the old compute magazines?

I remember soldering a speaker wire up to the unit since there was no computer speakers back in the day. I described that one day to my much younger sister, and realized how silly it sounded 30 years later were a pair of speakers are $10 and actually sound good.
Best was when we got a disk drive instead of the tape which was such a hassle.

My dad has it still in the closet and kids that it is part of my inheritance. Figures in another 10-20 years it will be worth something.

God I feel old, Now get off my yard!!!!

Comment Re:Sounds like fun! (Score 1) 190

Thanks for the link, I did not know that.

The most scary part was intended uses. They figured it could be used for fracking natural gas & wanted to blast the p-canal wider, & a new e-w passage. Can you imagine what panama might have had to say about that?

And of course fracking caused radioactive gas that was worthless, & we still haven't learned that lesson.

Sigh... BTW nice name, Good to see other mush heads around friend.

Submission + - Mobile Magnus Shocks Apple Gaming Community (prweb.com)

warendoff writes: Mobile Magnus has some stunning news for fans of the iPhone/iPad app Leapin’ Leprechaun. The company is pulling the plug on the game to devote its full creative energy to a new game featuring the same lead character that will be a thousand times more addicting.
Microsoft

Submission + - Microsoft Certificate Was Used to Sign "Flame" Malware (securityweek.com) 1

wiredmikey writes: Microsoft disclosed on Sunday that "unauthorized digital certificates derived from a Microsoft Certificate Authority" were used to sign components of the recently discovered "Flame" malware.

“We have discovered through our analysis that some components of the malware have been signed by certificates that allow software to appear as if it was produced by Microsoft,” Microsoft Security Response Center’s Jonathan Ness wrote in a blog post.

Microsoft is also warning that the same techniques could be leveraged by less sophisticated attackers to conduct more widespread attacks.

In response to the discovery, Microsoft released a security advisory detailing steps that organizations should take in order block software signed by the unauthorized certificates, and also released an update to automatically protect customers. Also as part of its response effort, Microsoft said its Terminal Server Licensing Service no longer issues certificates that allow code to be signed.

Facebook

Submission + - Why Facebook's Network Effects are Overrated (mako.cc)

An anonymous reader writes: A lot of people interested in free software, and user autonomy and network services are very worried about Facebook. Folks are worried for the same reason that so many investors are interested: the networks effects brought by hundreds of millions of folks signed up to use the service.

Facebook is vulnerable to the next thing more than many technology firms that have benefited from network effects in the past. If users are given compelling reasons to switch to something else, they can with less trouble and they will.

That compelling reason might be a new social network with better features or an awesome distributed architecture that allows freedom for users and the ability of those users to benefit from new and fantastic things that Facebook's overseers would never let them have and without the things Facebook's users suffer through today. Or it might be a sexier proprietary box to store users' private information. It doesn't mean that I'm not worried about Facebook. I remain deeply worried. It's just not very hard for me to imagine the end.

Slashdot Top Deals

"What man has done, man can aspire to do." -- Jerry Pournelle, about space flight

Working...