Comment Re:Not likely (Score 1) 162
Well, that call is in response to yours. I think jamesl meant a "just thinking about you" type of call.
That's because the underlying core of western medicine is a reactive one rather than a proactive one.
Well, that call is in response to yours. I think jamesl meant a "just thinking about you" type of call.
That's because the underlying core of western medicine is a reactive one rather than a proactive one.
You're wrong, you shouldn't trust your doctor AT ALL. Your life/health and privacy are far too important to do so.
Your doctor is no better of a person than anyone at the insurance company.
You need to understand that every single person at a hospital is also a person, not some mythical creature who actually cares about you.
99.9% of the doctors created today are just as scummy as anyone else. The age where doctors cared has not existed during my life time, if it ever did. The hippocratic oath is a joke at best, nothing more than lip service.
I don't trust my doctor with my personal information because of some vague oath any more than I do any politician to support and defend the constitution. I trust my doctor with my personal information because he has a legal obligation to not disclose that information to other parties without my consent.
I have a IMO a propounding question. Why is this stuff just done with no voter imput? Wither its a government project or a private one, I thing we should demand public input and maybe even voter approval or disapproval.........And has any privacy agencies tried this method? Just seem to me they shouldn't be using government equipment "poles" "Right of ways".or government property.
No, the proper way to do it is wait until they have spent all the money to buy the equipment and deploy it, then pass a referendum that makes them illegal.
Diversity is good, especially if they wind up diverging and actually being diverse. Not all implementations wind up being vulnerable to the same attacks, except when there are weaknesses inherent to the protocol.
Just be sure that as a developer you write an abstraction layer between the application and the library so that when the interfaces diverge too much you have a single class to rewrite. Diversity in implementations is a good thing. Diversity in the interfaces can be a pain in the butt.
Apparently you are unfamiliar with the Doppler effect [wikipedia.org]. Even on a Harley making a huge obnoxious racket it is easy to get dangerously close to someone before they hear you
Perhaps you should have read the article you cited. Doppler shift affects the observed frequency of the sounds but does not affect the speed at which that sound travels in a given medium. In addition it is the difference between the speeds of the observer and the source. If both are traveling at the same relative speed, there will not be a shift in the frequency for that observer.
Holy shit, maybe I should create some fairly non descript website that some hipsters use and then sell it for a whole frigging lot more than it will probabily ever bring in in revenue.
You definitely should. Stop back by when you're done and let us know how it works out.
"Researchers from Dickweed University's Network Security Lab discovered a flaw affecting nearly every TV on the planet. The flaw allows a radio-frequency attacker with a low budget to take control over tens of thousands of TVs in a single attack, forcing the TVs to turn on or off, or switch channels. The attack works by equipping a drone with a powerful universal remote, sending commands to all TVs in a broad range." It's even scarier like this!
That is not how this attack actually works. The attack has nothing to do with the remote and references to it and the "red button" have derailed things. This is an attack on the broadcast television signal. As you recall, broadcast TV was switched from an analog signal to digital. In Europe the protocol for this signal is DVB and in the US it is ATSC. Within these digital broadcasts is a protocol called the HbbTV standard which allows additional interactive data, features, etc. to be embedded to provide a hybrid viewing experience. For example during a baseball game they might embed an HTML page with the stats for the current batter. The exploit is that this embedded data is not protected in any way so anyone can inject a malicious payload into the signal. This could allow such attacks as session hijacking, etc. In the demonstration the researchers are attacking smartTVs in the neighborhood by rebroadcasting a local channel with the extra packets added to the stream. That approach is limited of course to the extend to which you can override the regular broadcast signal. A much broader impact would be if you could inject the packets at the broadcast source, for example on the network between the broadcast station and the actual transmitter station. In that case your attack would reach entire greater metropolitan areas.
What I am interested in is how much, if any, of this HbbTV information gets through when local channels are carried on other transmission media such as satellite or cable.
So the idea is that the attacker overrides the RF signal with his own one, which contains the malicious data.
No. They are actually overriding the DVB broadcast signal from the broadcaster and inserting malicious packets into the stream.
Abstract: In the attempt to bring modern broadband Internet features to traditional broadcast television, the Digital Video Broadcasting (DVB) consortium introduced a specification called Hybrid Broadcast-Broadband Television (HbbTV), which allows broadcast streams to include embedded HTML content which is rendered by the television. This system is already in very wide deployment in Europe, and has recently been adopted as part of the American digital television standard.
All of the references to the "red button" on the remote are a distraction that can be confusing. The red button on your remote is simply a way that you can invoke or interact with the hybrid content in the broadcast stream. It has nothing to do with the actual attack and the embedded content doesn't need to be actual interactive content.
Software development is done by humans and humans commit mistakes
I see what you did there. Nothing like a little bit of source code repository humor. Well played sir, well played.
but in practice the subset of "all people" who actually do code reviews appears to be very, very small -- possibly smaller than the set of people who review closed source code.
I'm going to disagree here. For a given company that has a closed source implementation, there may be small group of people qualified to look at the code and understand it, but that in no way means that they are or have done so. Corporate politics, capitalizable time, access restrictions, etc. all play a part in whether any one at all actually looks at the closed source code for vulnerabilities.
All IT workers swear. If they don't, they're probably a sociopath and serial killer.
But just because they do swear does not mean they aren't a sociopath and serial killer. In fact, I'm pretty sure that where I work all three are required to move into management.
Once again you have posted an "Ask Slashdot" article in a different section than where it belongs. Some of us regulate what articles we see by section and would appreciate it if you would at least try to get it right.
Thanks.
Fnord666
"Don't try to outweird me, three-eyes. I get stranger things than you free with my breakfast cereal." - Zaphod Beeblebrox in "Hithiker's Guide to the Galaxy"