Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Don't buy the cheapest cable (Score 1) 391

It's worth paying a bit more for solidly-built cables that meet spec (and especially for Ethernet cables, for some guard on the cable that keeps the clip from snagging or breaking off it you need to pull it through a tangle).

You mentioned everything needed but one, the wire needs to be Copper and not Aluminum

 

Anything beyond that is a bit silly.

http://www.costco.com/WireLogi... see the arrows? Signal is best if the arrow points to the input :)

Comment Re:If I had 8 and couldn't go back to 7... (Score 1) 485

If I was running 8 or 8.1 and could not conveniently or inexpensively go back to 7, then I'd upgrade the machine to 10. Or put Linux on it, maybe, depending on what I was using it for.

I have that spare 8.1 on a laptop sitting around, it's an Acer Aspire_V5-571-6499 (a total POS), the wireless system was made to consume very little power, so little it won't work. 8.1 ain't that hot either, it's lose lose situation and how I came about the laptop.

I've transferred all of my movies/music to it, and now replaces (as much as it can) my PS3 that quit.

I've little want or need for Windows 10.

-On the bright side after many many years I was finally able to use the cross over cable (null modem) I wired into a cat 5 cable.

Comment Update in question, Do you wish to upgrade -Win10 (Score 1) 485

This icon leads to MS' colorful spiel for why you want to install the free Win10 upgrade.

First things first. It's obvious from my email today that this icon and MS pitch alone are confusing many users. They've never seen anything like this appear before and many think it's a virus or that their system has been otherwise compromised.

In fact, this notification is triggered by a Windows Update that MS slipped into their update stream some time ago, which the vast majority of users probably accepted without realizing what it was.

I'd go as far as saying it was KB3035583. I did the alerts and all the expected actions, just at some point I began referring to it as CWX; and wondering why it wasn't taken seriously.

C:\Windows\System32\GWX was added by KB3035583. April 4th for 24 hours it recorded your cache and actions preformed (you can view my installation of new video drivers), my HOSTS file kept the file from being sent out so I'm able to view what was collected. Everybody else in the world sent it out to a third party after it had collected what it was after.

The file in control and file sent were named the same config.xml, there were two other config.xml files which I saw as future events (I have long since removed the GWX directory), this must be one of it's actions.

It's in my journal, just always referred to as CWX instead of GWX, I have since had my cataracts removed.

Submission + - Hackers Trick Email Systems Into Wiring Them Large Sums (wsj.com) 1

schwit1 writes: Cybercriminals are exploiting publicly available information and weaknesses in corporate email systems to trick small businesses into transferring large sums of money into fraudulent bank accounts, in schemes known as "corporate account takeover" or "business email fraud."

Companies across the globe lost more than $1 billion from October 2013 through June 2015 as a result of such schemes, according to the Federal Bureau of Investigation. The estimates include complaints from businesses in 64 countries, though most come from U.S. firms. Both "organized crime groups from overseas and domestic-based actors" are typical perpetrators, said Patrick Fallon, a section chief in the FBI's Criminal Investigative Division.

Submission + - Wired and wireless LANs in Cuba

lpress writes: Cuba has developed a hacker/maker culture out of necessity and neighborhood local area networks are one manifestation of that culture. The networks are used for file sharing, game playing, and discussion of sports, culture, technology, etc., but not politics. We all stand to benefit from Cuban innovation.

Comment Re:Don't try to piggyback on TrueCrypts popularity (Score 1) 114

Don't handicap yourself. Promote your software on its own merits, don't try to piggyback on TrueCrypts popularity, such a strategy will likely backfire.

Fer sure. They are just showing those that don't know that there is a widely used and proven encryption program already out, by bringing it up.

Being a Linux only program and specific versions at that do limit it's usage and spread significantly, to the point of slow obscurity.

Comment Re:Why replace it? (Score 1) 114

We know the last build of TrueCrypt is secure. Why replace it?

This article is the first I'd heard of the demise of TrueCrypt. Then article goes on to talk of simplicity.

Not using Linux (games) simplicity to me is to continue using TrueCrypt, even Linux users will need to convert.

I wish them luck in this endeavor though.

Submission + - Researchers Claim to Have Developed Faster, More Secure Tor

An anonymous reader writes: Researchers from the Swiss Federal Institute of Technology and University College London published a paper this week describing a faster and more secure version of Tor called HORNET. On one hand, the new onion routing network can purportedly achieve speeds of up to 93 gigabits per second and "be scaled to support large numbers of users with minimal overhead". On the other hand, researchers cannot claim to be immune to "confirmation attacks" known to be implemented on Tor, but they point out that, given how HORNET works, perpetrators of such attacks would have to control significantly more ISPs across multiple geopolitical boundaries and probably sacrifice the secrecy of their operations in order to successfully deploy such attacks on HORNET.

Comment Re:Why? (Score 1) 484

Humans - and you in particular, it seems - lack the capacity for analyzing catastrophic events that occur with very low probabilities.

There is a 100% probability that the nuclear waste at Hanford is going to cost untold billions to clean up, if ever.

I take it your familiar with Hanford, taken out of context "the 2014 estimated cost of the remaining Hanford clean up is $113.6 billion" https://en.wikipedia.org/wiki/..., this is after billions have already been spent.

There is a 100% probability that the Columbia river will be heavily contaminated with nuclear waste within a few years.

When the fight was on to restart N-reactor, the Oregonian (Oregon Newspaper) did a study of the radiation in the area. Where the Columbia river turns just after the reactors, high radiation levels were found on the shore of the far side of the turn. Three cities are located just down river of the reactors (older and the first reactors released primary water directly into the Columbia river (after the water was held to cool down first)). I can't say there's medical problems caused by this, nor say there aren't.

There is a 100% probability that the US taxpayer will end up paying over and over and over again to dispose of nuclear waste.

Taxpayers are already footing the bill for Whoops, this for reactors that were never finished, (three at Hanford alone, their foundations can be seen using Google Earth). "Due to over-commitment to nuclear power in the 1970s which brought about financial collapse and the second largest municipal bond default in U.S. history. https://en.wikipedia.org/wiki/...

The monies footed for Gable mountain (Hanford) for waste disposal, then abandoned for the Yucca Mountain waste disposal site in Nevada which itself was recently abandoned I can imagine only imagine as being vast.

And that's just the beginning as a federal law called "The Nuclear Waste Policy Act of 1982" states "a waste disposal site must be in place" yet the time table has been passed long ago https://en.wikipedia.org/wiki/...

You are correct in all statements.

Comment I ran it (Score 1) 62

I have this faith in whatever is posted to /. good or bad, but if it's questionable (How to build weapons, JSTOR) I follow the safety in numbers rule which /. provides.

Two sites were called and I don't think it was RookMilano, while in hex, Microsoft was prevalent through out
onesettings-cy2.metron.live.com.nsatc.net ; vortex-cy2.metron.live.com.nsatc.net both are certificate sites.

It's fairly CPU intensive, something you'd run at night or downtime; yet the same thing as as malware detection, if you don't have any, you don't know what it's suppose to do when it finds it.

For windows it's a command window so a redirect to a text file is easy to do; as the only thing reported was "file fine" after each and every file.

Comment Re:I downloaded it and then uploaded to virustotal (Score 1) 62

2/54, could be false positives I've at least heard of Rook Security although I forget in what context ;)

It contains the the hashes for what it's looking for, and what virus programs look for, it would show positives. The same thing will happen with a safe key generator, or some debuggers.

Slashdot Top Deals

So you think that money is the root of all evil. Have you ever asked what is the root of money? -- Ayn Rand

Working...