Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Boil it down to cost (Score 2) 104

You have essentially lead them into making the decision that you want them to make.

I agree with everything except your conclusion. It's not a contest, with a winner and loser. Everyone at the table needs to be trying to serve the users and business interests. Once the goals and requirements come out, it may turn out his initial decision was not the best. It's about cooperating to deliver the best fit solution that meets everyone's requirements to the maximum extent practical.

To that degree, it often helps not to look at it as a process of compromise; it's better to think that you're all agreeing to deliver the most important stuff.

Comment Re:Let's start by closing the front door (Score 3, Informative) 384

I was just arguing that this is pointless. When I traveled to Israel, I requested that my visa be stamped on a removable sheet of paper to be stapled into my passport. I did this because I didn't want evidence of a trip to Israel when one of my next stops was Malaysia. If someone is trying to get from Liberia to the US, they will do so with no evidence of recently having been in Liberia.

It's not as if there are huge numbers of flights to and from Liberia.

Comment Re:Incomplete analysis (Score 1) 384

On the face of it, sending un-trained US miltary personnel into the hot zone makes zero sense. So why might they have been sent?
The 101st and National Guard aren't being sent to mitigate the situation in Liberia et al. in any meaningful way. They're been sent for training.
Worst case scenario, if the virus causes serious disruption in the US, troops with Liberian experience will be used to train up stateside forces to back up health workers and quell unrest. As a bonus some of the surviving infected troops will have immunity to the virus.

OTOH, Maybe I'm giving Obola credit for a level of cynicism that isn't there. Maybe the administration really is the most incompetent in US history.

Or maybe, just maybe, the US military (or any functional military for that matter) has the only organization structure, money and manpower to deal with these sorts of major threats.

Don't you watch any televison?

Comment Re:I never ever commented on the SCO issue in any (Score 1) 187

We knew what was going on when you ran your anti-IBM campaign, sometimes even positioning yourself as arguing on behalf of our community. It was a way to lend credence to IBM and MS arguments during the SCO issue. To state otherwise is deceptive, perhaps even self-deceptive.

Florian, you would not be devoting all of this text to explaining yourself if you didn't feel the need to paint your actions in a positive light. That comes from guilt, whether you admit it to yourself or not.

Go write your app, and if you actually get to make any money with it you can give thanks, because it will happen despite what you worked for previously. Keep a low profile otherwise because your credibility is well and truly blown and you can only make things worse. And maybe someday you can really move past this part of your life. But I am not holding out much hope.

Comment Re:Um... okay...? (Score 1) 44

i kan(t) read:

You know very well that Tim hits various events and videotapes whomever or whatever he considers interesting. If we were paid for running "video ads," each one would be clearly marked "ad" or "sponsored content."

Should we interview you? Know someone else we should interview? Email me with contact info. Maybe we will.

Comment Re:How does it secure against spoofing? (Score 1) 121

No, there is no guarantee that the user will not use a mobile phone to access his online banking (and the idiocy of some banks pushing out mobile apps for online banking doesn't actually improve security in that area either).

You can't make the user secure. You can only offer it to him and hope that he's intelligent enough to accept it.

Comment 80s movies? Really? (Score 3, Interesting) 786

So it's also the 80s movies to blame that women are not interested in careers like soldier, spy, pilot, policeman (apology, -woman), archaeologist, exorcist, karate fighter,...

Has anyone ever looked closer at the 80s? The 80s were not a geek decade. The only movie I can remember where geeks were not just the comic foil (ok, even in that one they were) was "Revenge of the nerds". The whole "engineering geeks" were no role model in 80s movies, and even less so in TV series. Whenever they were in some prominent role, they were the little sidekick of the actual hero. Be it Automan's creator Walter, who was mostly a comic sidekick (ok, the show wasn't that memorable, but the special effects were great for its time) or Street Hawk's Norman who was some timid, beancounter-ish scaredy-cat. The geek roles were at best meant to make the hero shine some more.

Actually, the only engineer role I can remember that was allowed to be superior in areas to the hero and be more than a nuisance to him was that of Bonnie in Knight Rider.

A woman.

Build

Video The Bogus Batoid Submarine is Wooden, not Yellow (Video) 44

This is a "wet" submarine. It doesn't try to keep water out. You wear SCUBA gear while pedaling it. And yes, it is powered by a person pushing pedals. That motion, through a drive train, makes manta-style wings flap. This explains the name, since rays are Batoids, and this sub is a fake Batoid, not a real one. It's a beautiful piece of work, and Martin Plazyk is obviously proud to show it off. He and his father, Bruce, operate as Faux Fish Technologies. Follow that link and you'll see many photos, along with a nice selection of videos showing their creations not just in static above-water displays, but in their natural (underwater) element. Meanwhile, here on Slashdot, Martin tells how Faux Fish subs are made. (Alternate Video Link)

Comment Re:How does it secure against spoofing? (Score 1) 121

The second channel will not secure a compromised channel, but it will make it easier to detect it.

There are various defenses against replay attacks, most of them relying on keys being tied to the current time and only being valid NOW but neither before nor after. But that is only good against a replay, it is quite useless when the attacker is manipulating your own communication. That has been the staple of attacks against banking software since the advent of the OTPs, and the only sensible defense against that is actually a two channel communication. Out of band one way transmission (i.e. sending a OTP to the customer to use in the transaction) doesn't help here.

There is very little you can do to combat malware infections unless you are willing to use a second channel. At some point in the communication the data is vulnerable to modifiction, no matter how well you try to shield it. It resides in memory, unencrypted, at some point in time. And if nothing else, this is where it will be manipulated.

And it's heaps easier to do if the interface used is a browser. You can literally pick and choose just where you want to mess with the data.

Comment Re:How does it secure against spoofing? (Score 1) 121

The system you describe has been implemented often. Most often I've seen it with online games and the like where the main threat is the use of credentials by a malicious third party (i.e. some account hijacker stealing username and password, logging into your account and doing nefarious things with it). For that, you don't need a dongle. You need two synchronized devices that output the same (usually numeric) key at the same time. Basically you get the same if you take a timestamp, sign it using PKI and have the other side verify it. If you have two synchronized clocks, transmitting the signature (or its hash) suffices. That doesn't really require plugging anything anywhere, although it probably gets a lot easier and faster to use if you don't have to type in some numbers and instead have a USB key transmit it at the push of a button.

But that's no silver bullet. All it does is verify that whoever sits in front of the computer is supposedly who they claim to be and entitled to do what they're doing. It does NOT verify what is being sent, or that the content being sent is actually what this user wanted to send.

If anything, it protects Google rather than the user. Because all that system does is making whatever is done by the user of the account non repudiable. Because whatever is done, it MUST have been you. Nobody else could have done it, nobody else has your dongle.

Slashdot Top Deals

Force needed to accelerate 2.2lbs of cookies = 1 Fig-newton to 1 meter per second

Working...