Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:I would be very concerned (Score 1) 532

Ever stop and wonder if your mobile phone might interfere with a car's electronics causing the breaks to lock at an inopportune moment? Can you guarantee with absolute certainty that this can't happen?

Yes, yes i can. All of my vehicles were built before the government mandated nanny system explosion, so my brakes are tied directly to driver input, not some resistor and relay switch.

Comment Re:Welcome to 1994... (Score 1) 179

my 'real' enterprise uses LEAP based authentication with a hidden SSID, the leap login is based on your AD username and password, and it ties directly into the local network without VPN. so, clearly, while this is an exceptionally shitty method of doing things, 'real' enterprises do stupid shit, though in one instance we have here at least, there isn't a better way, or, not much of a better way. I'd go WPA, but it's not my call, and not my network, i just fix it when it breaks.

Comment Re:Real enterprises very cautious with WiFi. (Score 1) 179

You think all the switch ports are on? You think they will talk to just any mac address? You think the IDS will not notice your ARP poisoning?

Sure wired networks are a risk and there are ways around what I mentioned, but you are clearly talking about the follys of Windows Operators. Please do not call those folks System administrators.

Windows/AD based networks are just as legitimate as any other, the System administrators are just as legitimate as any other, and as soon as you put aside your arrogance, you'll realize that most businesses run windows on their office machines, and AD to manage logins. That said, my place of employment is an international corporation, so, we qualify as Real Enterprise, and the switches have no down-ports, so the 'walk in, plug in, profit' method would work just fine. i'm not in charge of the network, so it's not my problem, but i still recognize the potential flaws in the system.

Comment Re:How is this any more secure (Score 1) 232

...well that would certainly take away it's price advantage from using an SD / usb sick. Nevertheless, as the posts piled up, the tech does seem a bit more valid if all you want to do is encrypt data before long-term storage. However, in any other circumstance, I'd choose a different solution.

oh absolutely, the 2d scanners we use are about 400 dollars a pop.

Comment Re:How is this any more secure (Score 1) 232

I'd argue a USB version is MORE secure as the attacker would have to know what they are looking for. Any key logger would pickup the output of a bar-code reader; and that sort of output would obvious when reviewing your catch.

you're assuming all barcode scanners use a wedge method and output the data as keystrokes instead of raw data on a com port. protip: usually, and especially in this case, you'd have it as raw data on a com port, thus, not capturable with "any keylogger"

Comment Re:What Happens When ... (Score 1) 232

The pixels of the 2D code are 2mm by 2mm (0.08 inch x 0.08 inch) and there is about two-fold redundancy in the encoding. Reconstructing should be possible even when there are destructive creases.

This. Where i work he have several dozen 2D barcode scanners and even more Zebra Z4 and Z6 type printers. on a ZM400 we had a bad head, and a good deal of the barcode was completely absent from the word go, however operators were still able to correctly scan the mangled codes with 100% accuracy.

Slashdot Top Deals

HELP!!!! I'm being held prisoner in /usr/games/lib!

Working...