Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:New thing same as the old thing (Score 1) 80

3D scanning is really important. Whenever we figure out how to do it faster/cheaper/easier, that's important. 3D scanning is useful for all kinds of future activities, from the maker movement (3D printer + 3D scanner = 3D copier), to gaming (eg. Kinect), to driving (eg. DARPA Grand Challenge), to mobile devices (eg. Google Glasses).

Comment Re:of course... (Score 5, Insightful) 280

whose idea was it to use metal detectors as gun detectors? Time & technology change... and detection methods must change with them.

If non-metallic guns were truly viable, they would have been used 20 years ago to sneak past metal detectors and kill judges and politicians and airplane pilots. Plastic manufacturing has been around for a long time, the only thing 3D printers do is reduce the cost. There are well-funded spy agencies and a few individuals who would have paid hundreds of thousands of dollars for a single gun. And yet none has materialized: [1] [2] [3]

Comment Re:liability (Score 1) 68

I can only speak to how my local hackerspace handles it, I don't know how others do.

At this one, most power tools are owned by individual members. If someone gets hurt and wants to sue someone, the only person they can sue is the individual owner. On one hand, this sucks because it puts all the burden on individuals' shoulders. On the other hand, it decreases the chance that someone tries to pay legal fees from prospective damage awards, because damages are likely to be very small, so it reduces the chance someone will lawyer up.

Our hackerspace hasn't had any incidents yet, so I don't know how well this plays out in practice.

Comment RTFM (Score 4, Interesting) 79

The goal is to "engineer software-based radios that transmit data faster than a competitor using identical hardware".

The goal isn't to develop fancy new hardware, or to use an overwhelming amount of power. The goal is to develop fancy new software.

With frequency-hopping and time-hopping techniques, if you can intelligently adapt to the local interference, and transmit in the time and frequency gaps where the interference doesn't occur, then you can transmit more data for the same amount of power. That's the goal.

Comment extracting keys from RAM (Score 4, Informative) 268

This tool extracts the keys from RAM dumps. There are free tools that do this too, of course.

But isn't it difficult to get a RAM dump, you say? Not really:

  • Hibernating a computer writes this data to disk. Starting in Windows 8, "shutdown" actually writes some hibernate data by default.
  • VMs also have their own suspend functionality that does a RAM dump, as well as non-SAN VM migration.
  • Firewire ports actually allow devices to scan RAM of the machine they're connected to.
  • Obviously, if you have access to a live machine, you can get the keys directly from RAM.

Comment Re:Location is the least of your problems (Score 3, Informative) 77

Wrong, wrong. A default password means you ARE vulnerable. It's such a problem that ISPs are willing to do questionable things to fix it.

(it's a slight variant of your #2, though "compromising" in this case doesn't mean a full compromise, it means mildly abusing the DNS spec to work around XSS restrictions)

Slashdot Top Deals

A morsel of genuine history is a thing so rare as to be always valuable. -- Thomas Jefferson

Working...