Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:just do strength training (Score 1, Funny) 115

Use multi-joint barbell exercises like squats and deadlifts. They build bone density and stave off the effects of osteoporosis.

Seriously? You are suggesting weight training to Slashdotters? Well, I suppose they could order the weights on-line and have them delivered to the basement, but could mom carry them down the stairs?

Comment Re:I was suspicious from the moment they denied it (Score 4, Insightful) 282

I was suspicious of the U.S. allegations that the North Korean government was behind it when the North Koreans denied it was them.

Yes, because the North Koreans are forthright and honest chaps, their statements are always unbiased and true...

If you're going to hack somebody to make a political statement, it makes no sense to later deny that you were involved.

The North Koreans do not operate on the same logical reasoning that most of the rest of the world does. Trying to apply what most of the world defines as "making sense" to what North Korea says and does in not as straight forward as you might think. They have often denied involvement in thing later proven.

Comment Re:Using Non-ECC Ram is Unacceptable (Score 1) 138

How foolish and for what specific workload? I have a gaming rig where I sometimes edit photos and do 3d design and some light coding. In the past 10 years I've never seen any visible data corruption and not had an inexplicable crash.

So tell me again why I should spend the money? Your once a week problem sound note theoretical than practical.

Comment Re:uh - by design? (Score 1) 163

Thunderbolt is more like USB to the user - it's a thing you use to connect untrusted devices to your system.

No. USB is not safe either. Don't plug untrusted devices into your system's I/O ports, period.

USB, Firewire, eSATA, SAS, and Thunderbolt do not have a security model.

Thunderbolt just happens to have more capabilities since there is direct access to the PCI bus, and this is also where the greater performance comes in.

With greater capabilities and access comes greater possibilities of abuse from untrusted components. Including the possibility of malicious option ROMs and malicious access to other hardware devices attached to the bus.

Comment Re:It looks like a friggin video game. (Score 1) 351

The problem, and this is often lost on geeks, is that technically superior does not mean aesthetically superior.

Aesthetics always come after the technology has matured. Think back to the days of colour. The movies first shot on new colour processes would go out of their way to use those colours. Think the release of Technicolor which resulted in the hyper saturated colours you see in the likes of the Wizard of Oz. It was a long time before Technicolor process was mastered and made its way into regular movies. 3D is the same. We went through an endless period of directors wanking in the faces of movie goers with unnecessary camera angles that only exist to make sure some 3D pointy bit is directed at the audience. That is slowing down a bit now and the most recent 3D productions I have seen have avoided the gratuitous displays of 3D-ness.

HFR is no different. Motion blur and lower frame rates were relied on for features of some movies. Directors need to adapt to the new medium to make it look more natural. But in every possible way technically superior should equate to aesthetically superior when done properly. There is nothing aesthetically pleasing about a blurry jerky movie scene and right now I prefer the soap opera look.

Comment Re:Voicemail won't die (Score 1) 237

Only if you make the person leaving the message listen to a machine-reading of the transcribed message and then use T3 notation to edit the message win order to have it accepted will it ever work...

I am starting to contemplate requiring unknown callers to validate their name, company, and direct phone number...

Comment Re:youmail (Score 2) 237

Sorry, but I have to disagree. Our Asterisk system gives me caller, length of call, and time in an email immediately after. We had transcriptions enabled before, but they were terrible so I shut it off.

I appreciate that the telephone can be more efficient for a 2-way dialogue, but it's modality kills me. I can't change trains of thought on a dime and still get things done. To me, the courteous action is to send an email, and follow with a text if it is actually urgent.

Maybe if I got visual voicemail working for the office I could use it again, or if I could play the .wav or .gsm attachments on my iPhone i would feel differently, but right now it is a pain in the ass.

Comment Of course (Score 5, Insightful) 88

Of course while they like to point out that their service areas don't overlap so "competition" won't be impacted, they fail to note that because their service areas don't overlap, there has never been any real "competition" to keep prices down.

Comment Re:In other news... (Score 4, Interesting) 163

While this is true, the attacker does not need physical access for this. All they need is access to an innocent user who can be convinced to plug something in.

The FBI and secret service demonstrated this type of attack back in the early 2000s. They dropped usb drives near banks night drop boxes and front doors that pinged a server with the local ip and machine name and wrote a file locally when plugged in with the autorun on. Something like 70% or so pinged. People where plugging them in to try to figure out who's they were to return them.

Its pretty easy to convince someone to plug something in.

Open Source

Docker Image Insecurity 73

An anonymous reader writes Developer Jonathan Rudenberg has discovered and pointed out a glaring security hole in Docker's system. He says, "Recently while downloading an 'official' container image with Docker I saw this line: ubuntu:14.04: The image you are pulling has been verified

I assumed this referenced Docker's heavily promoted image signing system and didn't investigate further at the time. Later, while researching the cryptographic digest system that Docker tries to secure images with, I had the opportunity to explore further. What I found was a total systemic failure of all logic related to image security.

Docker's report that a downloaded image is 'verified' is based solely on the presence of a signed manifest, and Docker never verifies the image checksum from the manifest. An attacker could provide any image alongside a signed manifest. This opens the door to a number of serious vulnerabilities."
Docker's lead security engineer has responded here.

Comment Re:They realized how badly they screwed up (Score 1) 176

Sony is not who bowed down to pressure. The 5 largest movie theater chains refused to show the movie out of fear, not Sony.

Nice excuse, but not valid.

You are trying to tell me that Sony has no sway over theatre chains that rely on Sony to provide them with product to sell to the public at excessive prices? Really?

Sony has a ***LOT*** of power, but chose not to use it because they have no spine.

Slashdot Top Deals

Byte your tongue.

Working...