Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Like texting? (Score 1) 422

The first thing I think of when someone uses their phone for directions is them squinting at the screen while holding it in their hand; that's been my experience watching others (iPhone & G1). It feels like it's right between taking a phone call w/o a hands-free set and texting (but closer to texting since it diverts your eyes).

There's only so much that "voice guidance" can do, and it never seems to be enough to remove the need to see, or mess with, the map.

Medicine

Stretching Before Exercising Weakens Muscles 339

Khemisty writes "Back in grade school you were probably taught the importance of warm-up exercises, and it's likely you've continued with pretty much the same routine ever since. Science, however, has moved on. Researchers now believe that some of the more entrenched elements of many athletes' warm-up regimens are not only a waste of time but are actually bad for you. The old presumption that holding a stretch for 20 to 30 seconds — known as static stretching — primes muscles for a workout is dead wrong. It actually weakens them. In a recent study conducted at the University of Nevada, athletes generated less force from their leg muscles after static stretching than they did after not stretching at all. Other studies have found that this stretching decreases muscle strength by as much as 30 percent. Also, stretching one leg's muscles can reduce strength in the other leg as well, probably because the central nervous system rebels against the movements."
Security

The Real Story On WPA's Flaw 67

Glenn Fleishman writes "The reports earlier today on WPA's TKIP key type being cracked were incorrect. I spoke at length with Erik Tews, the joint author of the paper that discloses a checksum weakness in TKIP that allows individual short packets to be decrypted without revealing the TKIP key. I wrote this up for Ars Technica with quite a bit of background on WEP and WPA. Tews's paper, co-written with Martin Beck, whom he credits as discovering and implementing a working crack (in aircrack-ng as a module), describes a way to use a backwards-compatible part of TKIP to exploit a weakness that remains from WEP. ARP packets and similarly short packets can be decoded. Longer packets are likely still safe, and TKIP hasn't been cracked. Don't believe the hype, but the exploit is still notable."

Slashdot Top Deals

The hardest part of climbing the ladder of success is getting through the crowd at the bottom.

Working...