Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:TFA doesn't answer the relevant question (Score 1) 99

There's a reason the article doesn't answer that question; because the answer is really, really dull.

At least that is what I'm assuming. The truth of the matter is that two weeks prior to the company's servers being hacked (March 30th) Sony Online Entertainment was forced to lay off a large amount of staff (I believe the number I read was 1/3) due to financial reasons. This layoff included programmers, designers, artists, administrative staff, and yes, people involved in the network security division.

I for one seriously doubt that there is really a causal relationship between the reduced network security staff and the breach. Two weeks just isn't long enough for things like that to fall apart. Just because people left the security they set up doesn't immediately shut down.

And for anyone who suspects that the employees who were let go caused the breach themselves, technically all those employees were still employed (there's a legal requirement that employees affected by large scale layoffs like this be given 60 days warning before being laid off, however because of reasons of security once people were given their warning they were sent home and paid for the next 60 days even though they didn't do anything). That would mean those employees would have been endangering six weeks of 'free' pay, their severance, and being paid for unused PTO.

While that doesn't absolutely rule out the possibility it does make it much less likely in my mind.

Earth

Designing Wireless Sensors To Be Dropped Into Volcanoes 126

Thorfinn.au writes with this quote from El Reg: "Topflight engineers based in Newcastle have hit upon a radical plan for warning of volcanic eruptions. They intend to build a heatproof sensor unit which can be dropped into a volcano's caldera and wirelessly transmit data to monitoring stations despite being possibly immersed in molten rock. 'At the moment we have no way of accurately monitoring the situation inside a volcano and in fact most data collection actually goes on post-eruption. With an estimated 500 million people living in the shadow of a volcano this is clearly not ideal,' explains Dr. Alton Horsfall of Newcastle Uni's Centre for Extreme Environment Technology. 'We still have some way to go but using silicon carbide technology we hope to develop a wireless communication system that could accurately collect and transmit chemical data from the very depths of a volcano.'"

Comment Re:Anyone else see the problem with this? (Score 1) 563

Yes, but in most of those cases the hacker could already reasonably assume that the password is in existence. As an example use the password "123456". On rockyou.com over 290,000 accounts used that password. That meant that out of 32 million accounts the odds that any given account used the password "123456" was about .9%. Even without feedback informing a hacker that "123456" is overused it is going to be one of the first passwords that they try on any system that will accept a 6 character password composed entirely of digits.

Compare this to a system in which the hacker receives confirmation that "123456" has reached its limit and he knows that 100 accounts are using it. In the first system he doesn't receive any feedback but he can very safely assume that well over 100 accounts are using that password. In the second system even though he receives the feedback the system is more secure against that particular form off attack because there are far fewer accounts using that particular password.

Comment Re:Seems to Be Some Confusion (Score 1) 563

...The final piece of the puzzle is building in protection so that attackers cannot "query" the Oracle to find out what are popular passwords in your system that have reached their max...

Actually that isn't a problem. If a hacker finds out that "passw@rd" has been used 10 times and reached the limits of use they still have to figure out which of the 1,000,000+ accounts use it. Randomly trying accounts means that they have less than a 1 in 100,000 chance of hitting one that accepts it.

This is as opposed to the hacker simply trying "123456" on a system of 1,000,000+ accounts without limits where there will probably be over 9,000 accounts using that particular password (based on the analysis of rockyou.com's passwords back in January).

The problem with this approach is that it fails if the password file itself becomes compromised. If that occurs the hacker can simply hash "passw@rd" and then look for any accounts using that hash. If strong passwords are enforced the hacker would have to launch a brute-force attack to find out that accounts have the hash of passwords such as "i1492,Cstob".

Earth

Dinosaur Feather Color Discovered 219

anzha writes "Do you remember being a kid and told we'd never know what colors the dinosaurs were? For at least some, that's no longer true. Scientists working in the UK and China have closely examined the fossils of multiple theropods and actually found the colors and patterns that were present in the fossilized proto-feathers. So far, the answer is orange, black and white in banded and other patterns. The work also thoroughly thrashes the idea that fossils might not be feathers, but collagen fibers instead. If this holds up, Birds Are Dinosaurs. Period. And colorful!"

Comment Re:Rule of the long tail. (Score 1) 309

Considering that it is used in over 20 of their products (N.B.: I have no idea how many products BusyBox is used in. These 20 products are just the ones produced by a certain set of companies that are non-compliant. I would speculate that BusyBox is used in far more products where they are compliant) I think we can probably throw out the idea that it is crap.

Considering that it is very easy to comply with GPL as many other posters have pointed out we can throw out the idea that it is a legal mine field. The SFLC didn't even come after them demanding compensation for the previously shipped units. They simply asked them to come into compliance and it was only when they refused that the SFLC filed suit.

Comment Re:I'm so glad I bought a Droid (Score 1) 233

At a guess there are issues with a phone being required to stand up to a lot more abuse than a netbook. Just being in someone's pocket while they are walking subjects the phone to an awful lot of repetitive shocks. None of them may be very large but there's a lot of them to knock things loose. A good phone also has to be able to withstand slipping out of someone's hand on occasion and have a reasonable chance of surviving while most people would anticipate a dropped netbook breaking under similar situations. Then squish everything down to an even smaller size than the netbook.

So why is the Chinese iPhone so much cheaper? Again, at a guess there are two factors. The first is that all that work to improve survivability of the phone costs money. If a Chinese company reverse engineers a phone designed by someone else they can save themselves a lot of R&D expense. They can certainly save themselves the research on the form factor since they are copying the look of another phone. The second is that they can probably cut corners in the manufacturing. If an iPhone breaks under conditions most people would view as normal wear and tear the consumer is going to bring it back to AT&T who is going to then send it to Apple. Since the phone is being sent to Apple from AT&T they are more likely to accept it and replace it than if it came from an individual so it ends up costing Apple money to replace phones that shouldn't have broken. Plus they have to deal with bad PR. In the case of the Chinese phone if it breaks you can't take it to the carrier. You have to take it directly to them and they can bog you down with paperwork and/or just refuse to give you a new one.

Comment You know... (Score 2, Insightful) 314

I don't want to have a video card, hard drive, or CPU that I can't easily upgrade and replace. Why would I want something that would require surgery to do that?

Oh. You're using a Creative Labs Brainblaster XL? Their new Brainblaster OMG has twice the bandwidth and three times the signal resolution.

Yeah, maybe you do get a better signal through hardwiring but lets see what happens in 5 years when I can buy the latest equipment and you are either stuck with the older tech or have to get your head sawn open

again.

Comment Re:That's great, but... (Score 1) 464

Most aircraft mounted guns also weigh significantly more than 5 kg. I know, my first thought was why are they mentioning 9 mm when they are talking about aircraft mounted weaponry? Turns out that they are discussing scaled down versions in that section to the article.

Comment Re:Is a comparison to bullets apt? (Score 3, Informative) 464

Yes and no. The amount of energy isn't a terrible base line of comparison if you are doing "apples to apples". There are really 3 factors involved; the energy, how rapidly and efficiently the energy is transferred to the target and over how much area. Sunlight is a pretty good way of illustrating this. In full sunlight you can assume that 1 square foot (30cm x 30cm) receives about 100 watts of energy. Since 1 Joule is 1 watt per second that means that in about 7.5 seconds an area roughly the size of your chest would receive about as much energy as a 9mm bullet.

Obviously this has practically no effect on you. However take a magnifying glass a bit over 1 foot across (32 cm) and focus all of the energy into a spot a little under 1/3 of an inch (9 mm) across and all of a sudden you're causing some serious skin trauma. Likewise if the sun were suddenly 7.5 times brighter you would start to peel and blister in a hurry. Combine all the light of 7.5 seconds into a circle 1/3 of an inch across and apply it all in 1/100th of a second and you'll inflict some real damage.

Unfortunately the laser in their example delivers all its energy about 100 times slower than that. There's also a question of how big the target spot is and of course the fact that just the color of the target can cause a substantial amount of the energy to be reflected (substantial in this case being perhaps a few hundred Joules). So while the total amount of energy isn't a terrible way to compare them that does assume that the beam is focused relatively tightly (probably a safe assumption) and delivers the energy as a sudden single shot (which it clearly doesn't). As it is the comparison is less "apples to apples" and more "apples to orangutans".

Comment That's great, but... (Score 1) 464

From TFA:

If it scales down far enough, this would seem to put handheld HELL-guns within an order of magnitude of the striking power offered by conventional small-arms. A 9mm pistol bullet has about 750 joules muzzle energy: a 5kg portable HELL-ray weapon would put out this much energy in a blast less than a second long.

Since 9mm guns tend to be pistols they weigh a lot less than 5kg (11 lbs.). Most semi-automatic pistols are also capable of accurately firing 3-4 rounds per second and as has already been mentioned keeping a 750 joules laser on a target for an entire second would be close to impossible unless the target was completely incapable of movement, so that energy is going to be diffused across the target reducing it's effectiveness pretty severely.

I guess the last thing I feel obligated to point out is that a handheld HELL-gun that is within an order of magnitude of the striking power offered by conventional small arms would have about 75 joules of muzzle energy and would be about as dangerous as a BB gun (You could put your eye out with it). An order of magnitude is a factor of 10.

Comment Re:God damnit (Score 1) 265

Sure, if you want to go all high tech with string and everything. What's wrong with carving data into rocks? Not only is the data better protected but you have far better range when transmitting the data through the air as long as you keep your packets small.

Comment Re:How much of the image is real? (Score 2, Informative) 152

Actually it does create a 3D model. The summary is a bit misleading. I went straight to the website, hoping to get in before the slashdot, and examined some of the results. After the photos are processed a 3D model is built and the bump map is generated off of that. You can also download the model separately as a .ply file.

Slashdot Top Deals

"I've seen it. It's rubbish." -- Marvin the Paranoid Android

Working...