Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:did you checked the video? (Score 1) 688

But part of me wonders if I'm missing the point, if they're so intent on breaking it then might I as well just move browsers now? If I'm having to rely on addons to make a browser work then am I not just sat precariously one step away from Mozilla deciding that addon is unacceptable and cancelling it anyway?

It appears the FF devs have forgotten that their main advantage over Chrome is addons. I have so many addons, with icons to control them in the status bar (addons bar) that the new FF gave me about an inch of locationbar to see URLs. Thanks guys. I reverted this by using the dev version of Status-4-Evar. The GP's mention of Classic Theme Restorer is interesting, but I worry about its compatibility with Tab Mix Plus and other addons, as well as to your point of perhaps trying the new look & feel.

Submission + - OpenSSH no longer has to depend on OpenSSL (gmane.org)

ConstantineM writes: What has been planned for a long time now, prior to the infamous heartbleed fiasco of OpenSSL (which does not affect SSH at all), is now officially a reality — with the help of some recently adopted crypto from DJ Bernstein, OpenSSH now finally has a compile-time option to no longer depend on OpenSSL — `make OPENSSL=no` has now been introduced for a reduced configuration OpenSSH to be built without OpenSSL, which would leave you with no legacy SSH-1 baggage at all, and on the SSH-2 front with only AES-CTR and chacha20+poly1305 ciphers, ECDH/curve25519 key exchange and Ed25519 public keys.

Submission + - Algorithm Reveals Objects Hidden Behind Other Things In Camera Phone Images (medium.com)

KentuckyFC writes: Imaging is undergoing a quiet revolution at the moment thanks to various new techniques for extracting data from images. Now physicists have worked out how to create an image of an object hidden behind a translucent material using little more than an ordinary smartphone and some clever data processing. The team placed objects behind materials that scatter light such as onion skin, frosted glass and chicken breast tissue. They photographed them using a Nokia Lumina 1020 smartphone, with a 41 megapixel sensor. To the naked eye, the resulting images look like random speckle. But by treating the data from each pixel separately and looking for correlations between pixels, the team was able to produce images of the hidden objects. They even photographed light scattered off a white wall and recovered an image of the reflected scene--a technique that effectively looks round corners. The new technique has applications in areas such as surveillance and medical imaging.
Education

Ask Slashdot: Online, Free Equivalent To a CompSci BS? 197

An anonymous reader writes "I am a middle school math teacher and I also run a programming club. I recent completed my M.Ed in math education and was inspired to try to do the new GT online MS in Computer Science in a couple of years. I have some background in programming: two intro to comp sci courses, Java, C++, Python, the main scripting languages, and a bunch of math background. I also read through this great article on getting these pre-requisites completed through Coursera but unfortunately you need to wait for courses to enroll. I would like to just learn these on my own time, no credit necessary. Suggestions?"
Media

TrustyCon Session Videos Now Online 6

The RSA conference counter-conference TrustyCon livestreamed its videos and made the seven hour video available. Al Billings wasn't happy with that, and split the videos into segments for easy viewing. Quoting: "I don't know about you but I like my viewing in smaller chunks. I also tend to listen to talks and presentations, especially when there is no strong visual component, by saving the audio portion of it to my huffduffer account and listening to the resulting feed as a podcast. I took it on myself to do a quick and dirty slice and dice on the seven plus hour video. It isn't perfect (I'm a program manager, not a video editor!) but it works. ... Additionally, I extracted the audio from each of these files and put an audio collection up on the Internet Archive, for people like me who just want to listen to them." The videos are collected into a Youtube playlist.
Encryption

HTTPS More Vulnerable To Traffic Analysis Attacks Than Suspected 17

msm1267 writes "Researchers have built new attack techniques against HTTPS traffic that have been effective in learning details on users' surfing habits, leaking sensitive data that could impact privacy. They tested against 600 leading healthcare, finance, legal services and streaming video sites, including Netflix. Their attack, they said in a research paper, reduced errors from previous methodologies more than 3 ½ times. They also demonstrate a defense against this attack that reduces the accuracy of attacks by 27 percent by increasing the effectiveness of packet level defenses in HTTPS, the paper said. 'We design our attack to distinguish minor variations in HTTPS traffic from significant variations which indicate distinct traffic contents,' the paper said. 'Minor traffic variations may be caused by caching, dynamically generated content, or user-specific content including cookies. Our attack applies clustering techniques to identify patterns in traffic.'"

Comment Bring back undomesticated food (Score 0) 168

The core tenant behind the increasingly popular paleo diet is that food has been over-domesticated, favoring things like size, portability, and crop yield rather than health. Taste is often also low on the priority list (though higher than health). Wild plants like dandelion greens and ramps are significantly healthier than our domesticated cabbages for example.

The same goes for meat. Wild game meat is far healthier than meat from a factory farm. It's often tastier as well, though the farmed stuff tends to be fattier (and fat equals flavor). I'd love to try the meat of an ancestor of the cow that pre-dates its domestication. (It should also be eating and excersizing similar to the way it would in the wild rather than eating corn and living in tight quarters.)

Input Devices

Gesture Recognition Without Batteries 22

An anonymous reader sends this news from the University of Washington: "[C]omputer scientists have built a low-cost gesture recognition system that runs without batteries and lets users control their electronic devices hidden from sight with simple hand movements. The prototype, called 'AllSee,' uses existing TV signals as both a power source and the means for detecting a user's gesture command (PDF). 'This is the first gesture recognition system that can be implemented for less than a dollar and doesn't require a battery,' said Shyam Gollakota, a UW assistant professor of computer science and engineering. 'You can leverage TV signals both as a source of power and as a source of gesture recognition.' The researchers built a small sensor that can be placed on an electronic device such as a smartphone. The sensor uses an ultra-low-power receiver to extract and classify gesture information from wireless transmissions around us. When a person gestures with the hand, it changes the amplitude of the wireless signals in the air. The AllSee sensors then recognize unique amplitude changes created by specific gestures."

Comment Re:I don't think so (Score 1) 124

Times have changed - when I did my computer science degree, most of the students were at the geeky end of the spectrum and were there because that's what they were really into. Compare to the present-day cross section of computer science students: most of them are there because computers are seen as a good career. The extra-curricular interest is giving way to people who just want a job.

I disagree. People like you and me merely congregated together and ignored the others. (Also, you went to school in Wales. Different world.) My above statement was about "my most IT-savvy freshman colleagues," which is to say under a dozen total (and I was friends with all of them). I'd say about 75% of my freshman peers in CS declared the major for its salaries and/or a passion for video games. I imagine today's breakdown is roughly the same, more due to the fact that most freshmen are blank slates than any measure of incoming freshman tech savviness (which brings us back on topic...).

I even chose CS over History and other things I was roughly equally interested in because it better mapped to a better career. (Also because my grades were stronger in CS and advanced math, but that had more to do with my odds of acceptance.) I had lots of classmates who were horrible at math but had chosen the program for the money it represented. Most of them failed out and migrated to the business program (which was less academically rigid at that school at that time; these days, they'd fail there too).

Comment Re:I don't think so (Score 2) 124

When I went off to college, many of my most IT-savvy freshman colleagues were versed in networks and system administration because they had run the computer labs of their high schools. Some of them had been caught cracking or otherwise mucking about in ways that the school staff lacked the ability to revert and been forced to clean up after themselves, others saw messes and volunteered to help out. They got paid and had responsibilities. From this new perspective, they learned the "damage" students could deal and then had the hands-on task of cleaning it up. I wish I had had that opportunity.

In this sort of environment, especially given the ubiquity of virtual machines and virtual networks, a well-facilitated capture the flag (CTF) event should be easy enough to facilitate. Even without virtualization (or even any lab at all), any school could reach out to a local hacker group and ask them to host a CTF event. The cost of scrounging up a bunch of computers and networking equipment for a one-shot event should be decently low given the spare parts in your typical hacker group or Linux users group. Maybe the school or city could even provide a budget for the event.

Submission + - Camlanta: Police instaling 12,000 Camera's in Georgia's Capital City (ajc.com)

McGruber writes: The Atlanta-Journal Constitution reports (http://www.ajc.com/news/news/12k-cameras-to-give-atlanta-police-broader-window-/nd2Sh/) that Atlanta Police plan to have as many as 12,000 cameras installed in the city.

“Atlanta is really on the leading edge of work in this area,” said William Flynn, Department of Homeland Security (DHS) deputy assistant secretary of infrastructure protection. “We spend a lot of our attention on preparedness, protection, prevention. This kind of technology is the best use of those efforts and the best use of our resources.

“We’ve even been able to capture a murder on film,” said Atlanta Police Lt. LeAnne Browning, a supervisor at the video integration center where footage from more than 2,700 cameras is monitored.

I'm sure that was of great comfort to the murder victim and his/her loved ones.

Comment Re:Cuba-specific Tor + long range wifi (802.22?) (Score 1) 119

"The island is 1,250 km (780 mi) long and 191 km (119 mi) across its widest points and 31 km (19 mi) across its narrowest points.[1] The largest island outside the main island is the Isla de la Juventud (Isle of Youth) in the southwest, with an area of 2,200 km2 (850 sq mi)." http://en.wikipedia.org/wiki/Geography_of_Cuba

Sorry, Slashdot killed my squared symbol and I missed it in the content preview. Wikipedia says Cuba is 110 km^2 in area.

If 802.22 can cover a 100km radius (200km diameter), width isn't an issue. The 1,250km length would need only seven full-powered 802.22 antennae to provide a "backbone" across the main island (1250/200 = 6.25). Maybe each of those can have either a satellite uplink or a wired connection. Surely, another few hundred cheaper and/or lower-powered antennae (perhaps 802.11y or 802.11af?) would be able to saturate valleys and high density areas.

Comment Cuba-specific Tor + long range wifi (802.22?) (Score 2) 119

If Cuba built its own onion routing network (perhaps using Tor software though not connected to the Tor network), then each satellite dish or other internet connection would automatically be able to facilitate connectivity for the rest of the network. No need to wire anything (except some of the exit nodes), this can all happen over wifi.

Don't forget that 802.11af, 802.11y, and 802.22 have ranges measured in miles (802.22 can cover 100km). Blanketing an island of 110km would still take a good number of antennae (especially given the dead zones created by dense buildings in cities), but at a governmental budget scale, it seems quite feasible.

Submission + - Why P-values cannot tell you if a hypothesis is correct (nature.com)

ananyo writes: P values, the 'gold standard' of statistical validity, are not as reliable as many scientists assume. Critically, they cannot tell you the odds that a hypothesis is correct. A feature in Nature looks at why, if a result looks too good to be true, it probably is, despite an impressive-seeming P value.

Slashdot Top Deals

I've noticed several design suggestions in your code.

Working...