Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Probably not useful (Score 4, Insightful) 92

Those blades also have exotic coatings and actually operate at a temperature above the melting point of the metal in them. A couple of weeks ago I heard the BBC Elements program on nickel and they were bringing up its use in jet engines. Jet turbines use the vast majority of the very limited supply (about 70% of 40 tons) of rhenium produced each year and it is one of the most expensive metals so I doubt the cost is an issue.

Comment Re:Response from the White House (Score 1) 608

I think the only ones that weren't were ones that were cheer-leading for the current administration or outright silly. The best example of the "Fuck off" mentality is this petition response. I forget what the issue was in the initial petition but the response of basically go read our long standing stance on the issue and piss off prompted the second one. At that point I basically gave up on the petitions and most people did.

Comment Re:FUD removal. (Score 1) 365

Actually Linux is my primary OS. But how does that help the rest of the world? A solution that improves security for the technocrati is great, but not really worth deploying to the masses. And until it's worth deploying to the masses, it's just not going to be generally available to the few.

And even on Linux the security isn't impenetrable.

Also, no, you don't need root to install new software on Linux, unless you want that software to be accessible to all users. That's not the way most repository interfaces are configured to operate, but you can always install software directly as well, just download and run the install script. Even back in University I had a library of personal software installed on my locked-down university account.

Submission + - Dice announces plans to sell Slashdot Media (arstechnica.com)

cjm571 writes: DHI Group—formerly known as Dice Holdings Incorporated prior to this April—announced plans this morning to sell the combination of Slashdot and SourceForge. The announcement was made as part of DHI’s 2Q15 financial results.

Submission + - California Exports Gasoline to Mexico Despite 'Shortage'

HughPickens.com writes: Thomas Elias writes in the Los Angeles Daily News that just one week before many California motorists began paying upwards of $4.30 per gallon for gasoline, oil tanker Teesta Spirit left Los Angeles headed for ports on the west coast of Mexico carrying more 300,000 barrels of gasoline refined in California. At a time when oil companies were raising prices by as much as $1 per gallon in some regions, oil companies like Chevron and Phillips 66 shipped about 100 million gallons of gasoline out of California. “Oil refiners have kept the state running on empty and now they are sending fuel refined in California abroad just as the specter of low inventories drives huge price increases," says Jamie Court, president of the Consumer Watchdog advocacy group.

According to Elias as the oil companies were shipping out that fuel, they reaped unprecedented profits reportedly approaching $1.50 for every gallon of gasoline they sold at the higher prices. "Gasoline prices are determined by market forces, and individuals who understand how commodity markets work have recently testified that those markets are working as they should," responded Catherine Reheis-Boyd, President of the Western States Petroleum Association, to charges of price gouging. "All of the many government investigations into gasoline markets in recent years have concluded that supply and demand are the primary reason gas prices go up and down." Kathleen Foote, who heads up the antitrust division at the California attorney general’s office, agreed that the industry operates like an oligopoly in the state. But proving price fixing is difficult in a field where only a few players exist. "This system is made to break because oil refineries keep it running on empty," concludes Court. "They have every incentive to create a price spike like this."

Submission + - Slashdot for Sale (again) 4

Defenestrar writes: DHI Group (formerly known as Dice Holdings) will auction off Slashdot and Sourceforge. The stated reason for the sale is that DHI has not successfully leveraged the Slashdot user base.

The future is uncertain, but at least it doesn't have Beta

Submission + - Discovery of a 200 000 year old metropolis in South Africa (viewzone.com)

BuFf0k_SPQA writes: South African amateur pilots and farmers have been aware of the stone circles for years, always attributing them to some unknown earlier culture but never examining them. Only when South African pilot; Johan Heine teamed up with researcher and author Michael Tellinger did they discover the scope of these designs, buildings, mines and roads covering 10 000 square miles of inland South Africa.

Submission + - FCC rules to prevent installing alternate firmware on your router (cnx-software.com)

An anonymous reader writes: CNXSoft Embedded System News reports on an upcoming talk at "Wireless battle of the mesh" in Slovenia:

The new FCC rules are in effect in the United States from June 2nd 2015 for WiFi devices such as Access Points. They require to have the firmware locked down so End-Users can’t operate with non-compliant parameters (channels/frequencies, transmit power, DFS, ). In response, WiFi access point vendors start to lock down firmwares to prevent custom firmwares (such as OpenWRT) to be installed, using code signing, etc.

Read more: http://www.cnx-software.com/20...

Comment Re:Scripts that interact with passwords fields aws (Score 1) 365

Key- and screen-loggers? Pretty standard stuff I believe. All that's required is the wrong virus or trojan sneaking on to your machine somehow.

The main point is only that only one thing is needed to compromise security - knowledge - and thus is a stretch to cal two-factor under the traditional definition (at least so far as I understand it. I'm a programmer, but no expert on security)

I certainly don't contest the challenge that it's probably significantly more difficult to bypass. At first glance it would seem to have great potential, IF done well. But I don't even know enough details to judge the theory, and as always implementation details will likely expose far more vulnerabilties to hackers. The question is, would it continue to be fundamentally more secure if it became the primary means of security, or is it's primary benefit that of being a small small enough target that it's not worth the effort?

Comment Re:Or let us keep our hard-earned money (Score 1) 574

No, that is why we have regulation by an ideally democratic government - to impose those rules upon the entire marketplace that cannot realistically be instated any other way. Because just like most other Tragedy of the Commons situations, if everyone behaves with rational self-interest, then everybody loses. It's only by having rules imposed by a collectively empowered authority that we can align rational self-interest and our own best interests.

Comment Re:Scripts that interact with passwords fields aws (Score 1) 365

>because it's actually more than two-factor authentication
Kind of, maybe, but you really have to stretch the definition. Two factor authentication is typically a combination two of:
- something you know
- something you have (physical object)
- something that's an inherent characteristic (biometric data)
specifically so that it's extremely unlikely that an unauthorized user can get access to more than one of them.

Meanwhile yours (from what I can guess from your under-specified description) involves:
-Picture (keyfile?) that's stored online where anyone can get it (and how do you access it? a password?)
-passphrase
-password

And yes, that's considerably more challenging to hack than a simple password alone, but it still sounds like it only involves "something you know", and thus offers none of the more concrete protections offered by more traditional two-factor authentication. All it takes is someone filming your keyboard and screen while you log in and your security is completely bypassed. Not appreciably more difficult to hack than a completely random 30-character password that can be conveniently stored in an encrypted password manager on a USB flash drive accessible via passphrase, which provides quasi-twofactor authentication on the front end. You can watch me enter my passphrase, but without also having the file on my USB drive it won't help you log into any of my accounts

Granted, that's not as convenient on phones/tablets/etc, but given how common spyware of various types is on such devices I'd be *extremely* hesitant to access anything actually important from those unless you completely refused to install any software that has the potential to monitor your activities - a call that's becoming increasingly difficult to make even for the competent.

Slashdot Top Deals

I'm always looking for a new idea that will be more productive than its cost. -- David Rockefeller

Working...