Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Marketing to cover weakness (Score 1) 153

The story prompted me to look at bing maps. Very first direction request produced a poor route. When dragging the route to change it gives less time and distance, you know it's not the source to use! There is no way to reset a drag! etc. etc. I'll stick with google.

But one wonders how this government agency was co-opted.

Comment Security Questions deemed dangerous (Score 1) 87

It has been pointed out many times that the security question system is dangerous if the user does what he's told. It is in general easier to find out what someone's high school mascot was than to guess his password! My approach it to provide nonsense answers I can retrieve for all such question. No one's going to guess that my mother's maiden name was bottleofbitsofstuff for example. You can use the same answer for all questions if they let you, or use obvious variants otherwise.

Submission + - What do WiFi signal looks like? (openculture.com)

MarcAuslander writes: Have you ever wondered what the WiFi signal looks like around your office, school, or local café? In this video, Timo Arnall, Jørn Knutsen, and Einar Sneve Martinussen show you the invisible. And they pulled this off by building a WiFi measuring rod, measuring four meters in length, that can visualize WiFi signals around Oslo, Norway with the help of long exposure photography.

Comment Assigning new values to constants can be useful! (Score 2) 305

I was amused by the comment "If that incr(0) were allowed either some temporary that nobody ever saw would be incremented or - far worse - the value of 0 would become 1. The latter sounds silly, but there was actually a bug like that in early Fortran compilers that set aside a memory location to hold the value 0. "

Back then, I wrote Fortran subroutines which took computed dimension arrays by declaring the arrays with crazy bounds, numbers I hoped would never be used as constants, and then "assigning" the real bounds to the "constants".

Those were the good old days.

Submission + - Why Phishing stays alive and well.

MarcAuslander writes: I just got an email from paypal. Yes, it's really from paypal. And it tells me to click on an embedded link and log in! The link is legitimate. What are they trying to teach me?

"PayPal recently posted a new Policy Update. You can view this Policy Update by logging in to your PayPal account. To log in to your account, go to https://www.paypal.com/ and enter your member log in information. Once you are logged in, look at the Notifications section on the top right side of the page for the latest Policy Updates."

Comment Chase Letter a perfect phishing template! (Score 1) 180

Got my Chase letter. It warns about not sending information by email. Nothing about not clicking on links. In fact, it contains the lines:

The security of your information is a critical priority to us and we strive to handle it carefully at all times. Please visit our Security Center at chase.com and click on "Fraud Information" under the "How to Report Fraud." It provides additional information on exercising caution when reading e-mails that appear to be sent by us.

chase.com is a link!

All a phisher needs to do is send this exact email, pointing to a dummy Chase page, and encourage the victim to log in when he reaches it.

Clearly they are either very stupid or really just don't care. I'll go for the latter.

Image

Salad Spinner Made Into Life-Saving Centrifuge 87

lucidkoan writes "Two Rice University students have transformed a simple salad spinner into an electricity-free centrifuge that can be used to diagnose diseases on the cheap. Created by Lauren Theis and Lila Kerr, the ingenious DIY centrifuge is cobbled together using a salad spinner, some plastic lids, combs, yogurt containers, and a hot glue gun. The simple and easily-replicated design could be an invaluable tool for clinics in the developing world, enabling them to separate blood to detect diseases like anemia without electricity."
Encryption

Second 3G GSM Cipher Cracked 57

Trailrunner7 writes "A group of cryptographers has developed a new attack that has broken Kasumi, the encryption algorithm used to secure traffic on 3G GSM wireless networks. The technique enables them to recover a full key by using a tactic known as a related-key attack, but experts say it is not the end of the world for Kasumi. Kasumi, also known as A5/3, is the standard cipher used to encrypt communications on 3G GSM networks, and it's a modified version of an older algorithm called Misty. In the abstract of their paper, the cryptographers say the attack can be implemented easily on one standard PC. 'In this paper we describe a new type of attack called a sandwich attack, and use it to construct a simple distinguisher for 7 of the 8 rounds of KASUMI with an amazingly high probability of 214. By using this distinguisher and analyzing the single remaining round, we can derive the complete 128 bit key of the full KASUMI by using only 4 related keys, 226 data, 230 bytes of memory, and 232 time. These complexities are so small that we have actually simulated the attack in less than two hours on a single PC, and experimentally verified its correctness and complexity.'"
Programming

Haskell 2010 Announced 173

paltemalte writes "Simon Marlow has posted an announcement of Haskell 2010, a new revision of the Haskell purely functional programming language. Good news for everyone interested in SMP and concurrency programming."

Slashdot Top Deals

UNIX was not designed to stop you from doing stupid things, because that would also stop you from doing clever things. -- Doug Gwyn

Working...