Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Submission + - A Router-Based Dev Board That Isn't A Router (hackaday.com)

An anonymous reader writes: The DPT Board is something that may be of interest to anyone looking to hack up a router for their own connected project or IoT implementation: hardware based on a fairly standard router, loaded up with OpenWRT, with a ton of I/O to connect to anything.

It’s called the DPT Board, and it’s basically an hugely improved version of the off-the-shelf routers you can pick up through the usual channels. On board are 20 GPIOs, USB host, 16MB Flash, 64MB RAM, two Ethernet ports, on-board 802.11n and a USB host port. This small system on board is pre-installed with OpenWRT, making it relatively easy to connect this small router-like device to LED strips, sensors, or whatever other project you have in mind.

The board was designed by [Daan Pape], and he’s also working on something he calls breakoutserver There’s a uHTTP server written specifically for the board that allows any Internet connected device to control everything on the board. There’s also an HTML5 app they’re developing which could be pretty interesting.

All in all, it’s a pretty cool little device that fits nicely in between the relatively simplistic ‘Arduino with an Ethernet shield’ and a Raspi or BeagleBone.

Submission + - What would you do with half a rack of server space?

Christian Gainsbrugh writes: I work at a company that is currently transitioning all our servers into the cloud. In the interim we have half a rack of server space in a great datacenter that will soon be sitting completely idle for the next few months until our lease runs out.

Right now the space is occupied by around 8 HP g series servers, a watchguard xtm firewall, cisco switch and some various other equipment. All in all there are probably around 20 or so physical XEON processors, and probably close to 10 tb of storage among all the machines. We have a dedicated 10 mbs connection that is burstable to 100mbs.

I'm curious what slashdot readers would do if they were in a similar situation. Is there anything productive that could be done with these resources? Obviously something revenue generating is great, but even if there is something novel that could be done with these servers we would be interested in putting them to good use.

Christian Gainsbrugh
Lead Developer
LearningCart
www.LearningCart.com

Submission + - Dear museums: uploading your content to Wikimedia Commons just got easier (wikipedia.org)

The ed17 writes: Galleries, libraries, archives, and museums (GLAMs) are now facing fewer barriers to uploading their content to Wikimedia Commons—the website that stores most of Wikipedia's images and videos. Previously, these institutions had to build customized scripts or be lucky enough to find a Wikimedia volunteer to do the work for them. According to the toolset's coordinator Liam Wyatt, "this is a giant leap forward in giving GLAMs the agency to share with Commons on their own terms."

Submission + - Ask Slashdot: After TrueCrypt (slashdot.org)

TechForensics writes: (Resubmitted because was not identified as "Ask Slashdot"

We all know the TrueCrypt story-- a fine, effective encryption program beginning to achieve wide use. When you see how the national security agency modified this tool so they could easily overcome it, you'll probably understand why they don't complain about PGP anymore. The slip that showed what was happening was the information that NSA "were really ticked about TrueCrypt" either because they couldn't circumvent it or found it too difficult. From the standpoint of privacy advocates, NSA's dislike for TrueCrypt was evidence it was effective.

Next, NSA directly wrapped up the makers of TrueCrypt in legal webs that made them insert an NSA backdoor and forbade them from revealing it was there. It's only because of the cleverness of the TrueCrypt makers the world was able to determine for itself that TrueCrypt was now compromised. (Among other things, though formerly staunch privacy advocates, the makers discontinued development of TrueCrypt and recommended something like Microsoft Bitlocker, which no one with any sense believes could be NSA – hostile. It then became logically defensible, since NSA was not complaining about PGP or other encryption programs, to posit they had already been compromised.

This is the situation we have: all of the main are important encryption programs are compromised at least in use against the federal government. Whether NSA tools are made available to local law enforcement is not known. This all begs the question:

Does the public now have *any* encryption that works? Even if we can see the source code of the encryption algorithm the source code of the program employing that algorithm must be considered false. (TrueCrypt was the only program NSA complained about.) In the case of other software, it becomes believable the NSA has allowed to be published only source code that hides their changes, and the only way around that may be to check and compile the published code yourself. Half the public probably doesn't bother.

Okay, Slashdot, what do you think? Where do we stand? And what ought we to do about it?We all know the TrueCrypt story-- a fine, effective encryption program beginning to achieve wide use. When you see how the national security agency modified this tool so they could easily overcome it, you'll probably understand why they don't complain about PGP anymore. The slip that showed what was happening was the information that NSA "were really ticked about TrueCrypt" either because they couldn't circumvent it or found it too difficult. From the standpoint of privacy advocates, NSA's dislike for TrueCrypt was evidence it was effective.

Next, NSA directly wrapped up the makers of TrueCrypt in legal webs that made them insert an NSA backdoor and forbade them from revealing it was there. It's only because of the cleverness of the TrueCrypt makers the world was able to determine for itself that TrueCrypt was now compromised. (Among other things, though formerly staunch privacy advocates, the makers discontinued development of TrueCrypt and recommended something like Microsoft Bitlocker, which no one with any sense believes could be NSA–hostile. It then became logically defensible, since NSA was not complaining about PGP or other encryption programs, to posit they had already been vitiated.

This is the situation we have: all of the main or important encryption programs are compromised at least in use against the federal government. Whether NSA tools are made available to local law enforcement is not known. This all begs the question:

Does the public now have *any* encryption that works? Even if we can see the source code of the encryption algorithm the source code of the program employing that algorithm must be considered tainted. (TrueCrypt was the only program NSA complained about.) In the case of other software, it becomes believable the NSA has allowed to be published only source code that hides their changes, and the only way around that may be to check and compile the published code yourself. Half the public probably doesn't bother. (Would it not be possible for the NSA to create a second TrueCrypt that has the same hash value as the original?)

Okay, Slashdot, what do you think? Where do we stand? And what ought we to do about it?

User Journal

Journal Journal: Mars, Ho! Chapter Thirty Five

Smiles
Destiny woke me up about seven thirty; I'd been the one up early the day before because of that engine. "Wake up, sleepyhead, or you won't have time for breakfast." She'd already made coffee had the robots make chicken cheese omelets. God but I love that woman, meeting her was the best thing that ever happened to me in my life. Of course, were it not for the monsters I'd never have met her. You take the wonderful with the insanely horrible, I gues

Comment Re:Why? (Score 1) 92

To be slightly more accurate and less cynical, because their customers asked for one, and because there were no particular rules or guidelines laying out what to do with such requests thus no reason to refuse. Sure, any given CA could refuse on principle, in which case that customer would go to a competitor. That's why the CA system is regulated by browser/OS makers - to keep standards high in the presence of competitive market forces that would otherwise optimise for convenience.

Comment Alternative explanation (Score 5, Insightful) 398

Routing traffic via the VPN changes the path the traffic flows over, possibly avoiding routes that are saturated and (who knows) pending upgrade.

It's tempting to imagine the internet as a giant blob of fungible bandwidth, but in reality it's just a big mess of cables some of which are higher capacity than others. Assuming malice is fun, but there isn't enough data here to say one way or another.

Comment Re:Customer service? (Score 1) 928

yeah, we're robots with no brains. we follow orders. don't question stupid rules and never use human judgement. we are humans, but we should be thought of as cattle.

Hold on...What you're saying suggests to me you may not understand how the process works. Whether or not the father of this family knew it, he was trying to game the system. Sure, he had frequent flyer privileges, but his kids did not. He could have paid extra for them to be up there with him, but he didn't. That's the deal with Southwest. If he doesn't like it, he can fly another airline. Maybe he didn't understand the policy, but the gate agent explained it to him. Here's the thing - he's a frequent flyer. He probably should have known better. Maybe other gate agents have made an exception for him, but they weren't required to. He wasn't entitled to that exception. On other airlines, it would be akin to you buying a first class ticket and two coach tickets and demanding that your coach companions get first class seats...probably bumping two other passengers who paid for those first class seats.

Who should the burden of thinking be shifted to, the airline employees or the traveler? What if you and your companion didn't get to sit together or had to check your bags because this guy's kids cut in line without paying for the privilege (even though you may have)?

I'm not saying that the gate agent acted correctly throughout the course of this (and I don't know if she didn't). In this situation, however, I'm inclined to give her more of the benefit of the doubt than this passenger, given the details of the story.

Submission + - Earth in the midst of sixth mass extinction - the "anthropocene defaunation" (sciencemag.org)

mspohr writes: A special issue of Science magazine devoted to Vanishing Fauna publishes a series of articles about the man-caused extinction of species and the implications for ecosystems and the climate.
"During the Pleistocene epoch, only tens of thousands of years ago, our planet supported large, spectacular animals. Mammoths, terror birds, giant tortoises, and saber-toothed cats, as well as many less familiar species such as giant ground sloths (some of which reached 7 meters in height) and glyptodonts (which resembled car-sized armadillos), roamed freely. Since then, however, the number and diversity of animal species on Earth have consistently and steadily declined. Today we are left with a relatively depauperate fauna, and we continue to lose animal species to extinction rapidly. Although some debate persists, most of the evidence suggests that humans were responsible for extinction of this Pleistocene fauna, and we continue to drive animal extinctions today through the destruction of wild lands, consumption of animals as a resource or a luxury, and persecution of species we see as threats or competitors. "
Unfortunately, most of the detail is behind a paywall but the summary should be enough for Slashdot readers.

Submission + - ScummVM 1.7.0 Released

jones_supa writes: It's been a while since a new ScummVM release, but version 1.7.0 is now here with many exciting features. New games supported are The Neverhood, Mortville Manor, Voyeur, Return to Ringworld and Chivalry is Not Dead. The Roland MT-32 emulator has been updated, there is an OpenGL backend, the GUI has seen improvements, AGOS engine is enhanced, tons of SCI bug fixes have been applied, and various other improvements can be found. This version also introduces support for the OUYA gaming console and brings improvements to some other more exotic platforms. Please read the release notes for an accurate description of the new version.

Comment Re: Eh? (Score 1) 137

Did YOU look at the graph? The bars are comparing all of 2013 against the first half of 2014 (obviously, as the second half is in the future). So the fact that IE already matched last year's record is where the 100% figure comes from - it's another way to say "doubled". Unless the second half of 2014 has a lower exploit rate then the conclusion will be correct.

Slashdot Top Deals

Never trust a computer you can't repair yourself.

Working...