Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Enhanced Pool Table (Score 1) 57

I've always wanted something like this projector + camera shining down on a pool table.

It could record all of the shots, and easily show you a prior table position so you could "un-do" a shot as well as re-play slow motion video of a "break" or other action. Based on varying games, it could count and keep score (cutthroat, multiple iterations of "4 ball run", etc etc) by just displaying the scores somewhere on the table.

For interactivity, it could "visualize" the line of an intended ball strike by viewing your cue stick and anticipating the output (it wouldn't be perfect with only a top-view camera, but good enough). Once you find your desired "line" a voice or other gesture control could "freeze" the drawn lines, allowing you to more easily aim.

Fun stuff, and I didn't even watch the video (:

Comment Re:APK's happy as is, w/ this... apk (Score 1) 370

Do you have an API to fetch the hosts file directly without using the windows software? I don't run any windows...

I'm thinking about taking your hosts file and running it through a script to create a dnsmasq or bind config so then I can run it as a local resolver for my home network (consisting of non-changeable devices like a Wii).

Comment Re:Java is not written like other languages (Score 1) 411

IntelliJ IDEA is even better. I don't even look at import statements anymore or even think about what libraries I'm using.

If you copy/paste some code from another class, all the dependencies are added automatically to the new class.

Even adding a new library to a Maven project is trivial in IntelliJ. You just start typing the name in the pom and a list of libraries and versions pop up, defaulting to the most recent stable release.

Getter/Setter/Constructor/toString/equals/hashcode -- they're all auto-generated for you as needed.

It is annoying that all this "fluff" exists in the language, but a good IDE hides it; getters/setters are collapsed to a single line; import statements hidden by default, endless customization in how your code looks so you can ignore the fluff and focus on the important stuff.

Comment Block using DNS at your router; no custom firmware (Score 1) 370

Try FoolDNS or others on this page:

http://alternativeto.net/softw...

If only APK would spend his time developing a DNS service we could all use for free instead of client software. (Push the hosts file to the DNS resolver that ALL devices use.)

If the "smart TV" uses it's own DNS, simply block all outbound port 53 traffic other than your router itself.

Security

Georgia Institute of Technology Researchers Bridge the Airgap 86

An anonymous reader writes Hacked has a piece about Georgia Institute of Technology researchers keylogging from a distance using the electromagnetic radiation of CPUs. They can reportedly do this from up to 6 meters away. In this video, using two Ubuntu laptops, they demonstrate that keystrokes are easily interpreted with the software they have developed. In their white paper they talk about the need for more research in this area so that hardware and software manufacturers will be able to develop more secure devices. For now, Faraday cages don't seem as crazy as they used to, or do they?
Cellphones

Modular Smartphones Could Be Reused As Computer Clusters 82

itwbennett writes The promise of modular smartphones like Google's Project Ara is that buyers will be able to upgrade components at will — and now Finnish company Circular Devices has come up with a use for discarded computing modules, which they're calling Puzzlecluster. Drawings of the Puzzlecluster architecture show a chassis with slots for the reused modules, which can then be interconnected with others to create the cluster. Just one unit could also be used as a desktop computer."
Security

U.S. Gas Stations Vulnerable To Internet Attacks 100

itwbennett writes: Automated tank gauges (ATGs), which are used by gas stations in the U.S. to monitor their fuel tank levels can be manipulated over the Internet by malicious attackers, according to security firm Rapid7. "An attacker with access to the serial port interface of an ATG may be able to shut down the station by spoofing the reported fuel level, generating false alarms, and locking the monitoring service out of the system," said HD Moore, the chief research officer at Rapid7.

Slashdot Top Deals

I have hardly ever known a mathematician who was capable of reasoning. -- Plato

Working...