Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Censorship

Submission + - Libya SIGINT jamming satellites, towers (reuters.com) 1

h00manist writes: Libya's Gaddafi apparently loves radio hacking. Confirmed to be using signal jamming to disable Thuraya satellite phones. Also satellite TV network provider Arabsat, affecting vast areas in the Middle East, Gulf, Africa and Europe. Perhaps cellphone and internet transmissions also too, which work intermittently. Soldiers confiscate electronics, too. This has gone on for days, allowing killing carried out largely hidden from the world view, quite different from what happened in Egypt. The locations of the jamming signals is known to company executives, around capital Tripoli, but nobody can do anything. Only POTS available, and monitored. Technically, could this happen everywhere? Alternatives?

Comment Re:NO! (Score 2) 498

If someone wants to steal something, and you are trying to prevent it, short of a body cavity search everyday, you've already lost the game. You can steal a code base and drawings for virtually any product by simply copying it onto a USB flash drive, and walking out. Often your cell phone will suffice.

If you are trying to prevent viruses and stuff, the same techniques apply for company owned laptops versus employee owned. If they can take it home, it can get infected. You might ameliorate things by having a forced virus checker installation, but a voluntary one will generally work just as well.

In the end, the only thing you are can't do is take the machine away, but this is such a rare event that it's almost not worth considering.

Comment Re:Yay process (Score 1) 200

Process isn't a substitute for thinking, process is a substitute for forgetting. A well designed process is simply the thing you'd do if you could keep every *actually* important detail in your head at all times.

You should certainly file bugs against a process (in the same way you would against any work product) if you perceive that a step or steps is useless or wrong.

You *are* following a process, it's just ad hoc, and maybe made up on the spot. Formalizing that process is a way to make it repeatable, and debuggable.

That said, and to reiterate, you must fight against the bad process. Bad process isn't clear. It's a bad program. Debug it.

Comment Re:not dumb (Score 1) 169

So, thinking like a would be cracker, the list of basic places to try first:

Persons front door.
One of their windows.
A bank near their house.
Their car, if visible.

Etc. Given the usual kind of passwords people choose for themselves, I expect this will be similar.

Of course, this assumes the cracker can figure out the person's address, but we know how easy that can be.

I have been teaching people to use a complicated random password, but to go ahead and write it down. Then the basic security problem is getting them to control that piece of paper (keep it in your wallet, please), and makes over-the-net cracking much harder. Most of my users never had a problem with this.

Comment Re:not dumb (Score 1) 169

People are dumb. Millions of people would select something like the entrance for Fort Knox, or Norad, or a local bank. You have a training problem just as large as the one you have now.

Comment Understand the fear, and then address the concern. (Score 3, Insightful) 674

1. Do not belittle or otherwise blow off the customer's fear. In fact, hear it, and agree that it's something to think about.

Them: "I'm worried about this Linux stuff. A guy was telling me that anyone could see the code, and just know how to hack it!"

You: "I can understand how that could be a concern. It is a little like having a map of the valuables in your house taped to your front door."

2. Explain why openness is helpful

Them: "Yeah, so what should we do?"

You: "To be honest, sir, the reason why we like that anyone can see the code is because that means anyone can fix those problems. And lots of people do, for the very same reason you are worried about it. They need something that's secure, and isn't going to surprise them."

3. Mention that serious people have a big stake in making this work.

You: "I should mention that a few companies have bet a lot of money on open source, and wouldn't be happy to see it easily broken. IBM, Novell, and Oracle, to name a few, have very large investments in Linux, and have donated many patches to make sure the code is secure. And for that matter, so has the NSA. They have actually extended the security quite a bit, with their Security Enhanced Linux."

4. Reassure them that people are thinking hard about this.

Them: "Yeah, but if anyone can see it..."

You: "...then you have to be extra careful. See, the strategy that Open Source follows, and everyone should, is to assume that everyone *can* see the code, so you better design it so that the real keys to the kingdom aren't in the code at all. You make sure the keys are completely in the hands of the owners of the system, so it doesn't matter if you can see how the lock works, you still don't have the keys."

5. Point out the obvious.

Them: "But what happens if someone tries to slip something in, and is really good at it?"

You: "Once in a while, someone tries. But when a thousand people might look at the files you are trying to sneak in, someone's going to notice. And then a hundred thousand geeks will make fun of you. In public, all over the internet."

Comment Re:For everything else, there's the patent office (Score 1) 267

There is that, but let's give the waitstaff their due: Trying to do refigure a split check in the middle of a busy dinner is like trying to do your taxes while being pelted with gobbits of cream cheese by taunting girls scouts carrying yappy dogs barking Jingle Bells.

Cut them a break, and let a pocket calculator help.

Comment Re:For everything else, there's the patent office (Score 4, Informative) 267

Making a wry comment based on someone else's poor interpretation of an article: $0.02.

Making a joke in a cliched format you didn't invent: $0.00

Reading the damned source article all the way before you make a fool out of yourself in public: Well, I wouldn't call it priceless, but something like that.

The patent describes a device for accepting credit card payments at the table of the patron, allowing them to pick their amounts paid, and therefore saving the patrons and the waitrons from the hassle of communicating all this back and forth and dealing with the subsequent mistakes.

Comment Is that the right question? (Score 3, Insightful) 564

I think the question to ask is what would bring her the most joy, which might be the thing that challenges her. She should try a little of everything, and find the thing that engages her, makes her feel alive and driven.

I'd suggest looking into Howard Gardeners Multiple Intelligences writing to get an idea of the scope of the situation.

Another Look at 1930's Cyclogyro Plane Design 142

trogador writes to mention that a group of researchers is taking another swing at the idea of a cyclogyro design for a UAV. Even though the cyclogyro design was invented in the 1930's there are no records of a successful flight. "Cyclogyros have the potential to be highly maneuverable flying robots due to their method of operation, making them potentially more suitable for complex tasks than helicopters and other micro air vehicles (MAVs) with less maneuverability. The biggest challenge in designing the cyclogyros is varying the angle of attack of the rotating wings. This ability would enable the plan to change altitude, hover, and fly in reverse. To achieve this quick angle variation, the researchers introduced an eccentric (rotational) point in addition to a rotational point connected to a motor."
Power

Submission + - Daylight Savings Time Increased Energy Consumption

An anonymous reader writes: An article in the Toronto Globe and Mail (here) reports that the change to extend Daylight Savings Time in an effort to save energy backfired. It seems that electrical usage (as reported here earlier) didn't significantly change, but what is new is that fuel usage for cars and trucks increased more than seasonally adjusted figures would allow.
Novell

Submission + - Microsoft and Samsung sign Linux patent deal

AceJohnny writes: Microsoft continues with its patent FUD tactic it used with Novell, now striking a deal with Korean giant Samsung. Since the Novell affair, Microsoft had also inked a deal with Fuji-Xerox. Microsoft still hasn't explicited which patents Linux is violating.
Linux Business

Submission + - Linux sponsered Indy 500 car campaign

fedaykin42 writes: The Tux500 program was created with a simple goal: "to collect community donations to enter a Linux sponsored car in the 2007 Indianapolis 500." For those that don't know, the Indy 500 is one of the world's most viewed sporting events. With approximately 350,000 spectators at the Speedway, over 5.5 million in the U.S., and an estimated 344 million international viewers, this is a great opportunity to get the Linux name out there. The team is actively working to raise enough money to have "Primary Sponsership", which means not only a large logo on the side of the car but also "Team Linux" in the race team name. Donations can only be accepted through May 21, 2007, so fire up your paypall accounts and let's see a very big Tux going 200mph!

Slashdot Top Deals

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...