Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Or the malware might cover its tracks. (Score 1) 324

If you ask the drive to read out the whole flash.
The maybe the firmware would have to go to the platter to get the real image.

Or the malware could regenerate the un-attacked version.

For instance: If it's a patch that loads into an otherwise cleared-to-known-vallue region it can detect that region while reporting flash content and report the cleared value, instead. Add a couple other tiny regions where it saved (or alread knew) the previous contents where it "sank it's hooks" and you can't tell it's there from its replies to dump requests.

JTAG seems safer.

Yep. JTAG, in principle, could be corrupted. But it would require substantial hardware support that almost certainly isn't there (yet!)

Comment Hashes can be useful. (Score 1) 324

Which is why I always laugh my ass off at all these people who use PGP to sign things and put a hash on the same website you download it from ... look you can verify this file you downloaded from the website hasn't changed because theres no way anyone would be smart enough to update the hash as well!

That's why you SIGN the hash. Then only the public key needs to be published by a different route.

And it doesn't HURT to publish it on the web site as well: Then someone tampering by substituting a different public key sets off alarm bells when that differs from the public key obtained from another site or by another path. Blocking that makes man-in-the-middle more complex: The attacker has to have essentially total control of the path to the victim and be able to recognize and substitute the public key whenever it shows up. One slip-up and somebody may raise the alarm.

Meanwhile: Even if publishing hashes on the same site may not provide additional security against MITM, it DOES let you check the download wasnt corrupted in transit (in ways other than malicious substitution). With modern protocols that's less of a problem these days than it used to be, but a check would be comforting.

Comment &is "teal" blue with greenish tinge or vice-ve (Score 1) 420

... blue and brown. Just now, I opened the Washington Post link on my 24" screen in a sunlit room, and it was clearly white and gold.

Though the sensations are vastly different, brown is really dark yellow. The underlying color of that part of this dress seems to be very near the perceptual boundary (probably just on the yellow side of it). This picture seems to have the dress in a non-obvious shadow, so when it is viewed by someone whose visual system doesn't adequately pick up the shadowing and compensate, it crosses the boundary and appears light brown rather than dark yellow.

Another perceptual oddity is that a very slight bluish tinge to white makes it appear "whiter than white", especially in sunlight or other strong lighting. (I suspect this works by mimicing the differential response of the various color sensors in the eye when exposed to very bright light, though blue may also "cancel out" a bit of the yellowing of aging cloth.) Laundry products up through the 1950s or so included "bluing", a mild blue dye for producing the effect. (It fell out of use when it was replaced by a fluorescent dye that reradated energy from ultraviolet as blue, making the cloth literally "brighter than white" {where "white" is defined as diffuse reflection of 100% of the incoming light}, and which, if mixed with detergent products, would stick to the cloth while the surficant was rinsed away.) I suspect some of the "blueish is brighter" effect is going on here.

When I view the picture straight-on on my LCD display, the light cloth on the upper part of the dress appears about white and the image appears somewhat washed out. Meanwhile the lower half has a bluish tinge. So I suspect the cloth is actually nearly-white with a bit of blue. (Viewed off-axis it's very blue, but the other colors are over-saturated and/or otherwise visibly off-color. So off-axis viewing makes it look more blue and this probably adds to the controversy.)

Another color-perception issue is "teal", a color between blue and green. There are paint formulations of this color that give the sensation of "distinctly blue with a greenish tinge" to some people and "distinctly green with a bluish tinge" to others, even under the same lighting and viewed from the same angle. (I'm in the "slightly-bluish-green" camp.)

The first place I encountered this was on the guitar of the filksinger Clif Flint. (On which he played _Unreality Warp_: "... I'm being followed by maroon shadows ..." B-) ) Apparently his fans occasionally had arguments about whether his guitar was blue or green, so he sometimes headed this off (or started it off on a more friendly levl) by commenting on the effect.

Comment Re:do no evil (Score 2) 185

Perhaps they should be asking for a ".google" gTLD, for that purpose, instead of trying to monopolize a generic identifier.

I was about to suggest the same, but with ".goog", to make it shorter. (Can't think of a less-than-three-letter symbol that points to them as strongly.)

(It's also their stock ticker symbol, so maybe it's not such a good idea - it could cause a land rush and litigation from all the other publicly traded companies.)

Comment Re:It still helps (Score 1) 101

And it would be trivial to keep any "clean" account(s) they have on a separate IP,

Trivial, perhaps... but over time it's easy to slip and use an IP that's more traceable to you, which is why I said to publish all of the IP's that handle has posted from.

I can see some appeal to that, but surely any sane leaker will post using a restaurant's free wifi or similar - meaning their doxing gets associated with any other innocent user who happens to have posted updates from that restaurant, with no apparent link to their own isolated accounts?

Personally, I'd probably use the free wifi at the railway station on my daily commute - indeed, I do use it most days, for innocent purposes - or if I wanted to do something that might be traced, ride an hour or so on one of the lines and use another station on the network, using a randomised MAC address on a laptop. Anyone who was identified as associated with me then is completely uninvolved. Yes, maybe you'd catch a few low-level trolls, but you'd be falsely smearing a whole lot of innocent third parties - making the identification worthless anyway.

User Journal

Journal Journal: Web Dev on the Mac 1

I've been working on a little side project. I would like to have an app where people can read updates that I send out. It seemed like a fun way to learn more about programming mobile apps and it's something I could actually use if I can get it to a decent state.

I'm keeping it simple. I decided the app would just be an rss feed reader. And that meant I need a feed. I want it to be very specific to my app so I decided the way to go would be to just create my own back end for cre

Comment Re:file transfer (Score 2) 466

The new machines lack LPT ports? WTF kind of machine did you buy without an LPT port? A laptop, sure, a desktop? You have to look hard, even today to find a machine that doesn't have a printer port.

Pretty much anything built in the last five or so years won't have serial or parallel ports. If you're lucky, you might have some headers on the motherboard that can be brought to the slot cage with connectors in brackets like what were common before ATX, but I've run across plenty of motherboards that don't even have those. Notebooks are even less likely to have them. This Dell Inspiron E1505 I'm typing on is a bit long in the tooth...main reason I'm keeping it going is its 15" 1680x1050 screen. No serial or parallel ports on it.

When I saw a sufficiently-old notebook come through my office a while back that had a serial port on it, I hung onto it for talking to our switches and routers. I forget what model of HP it is, but it's old enough that it runs on an Athlon XP. It's probably the better part of 10 years old at this point. The last emerge -uND world took a couple of days to run, but it's fast enough to run Minicom and Firefox, and to do traffic captures from the switch: serial connection to the management port to enable SPAN, Ethernet to the SPAN port for capture, and WiFi to talk to the whole thing from my office instead of the server room.

Comment Re:Well someone has to do it (Score 1) 347

Business can't plan or talk to customers or have any strategy whatsoever without at least some estimate...that's just the real world. If devs don't give estimates, managers have to make estimates. If managers don't make estimates, business makes estimates. You want devs to do the estimating.

I just don't want the boss to be disrespectful to me when the estimate is not accurate. Get us some estimation training or something. Don't give me a lecture. I'm too old for lectures.

Comment Fappening? (Score 1) 311

It also comes in the wake of last year's Fappening

Can we get a definition of that for old farts with a UNIX beard like me? I know there was a massive hack and sale of celebrity nude photos for Bitcoin or something. Is that what this refers to? What's a Fappening?

Yeah, I'm gonna Google it, but the editors could add a parenthetical explanation, or a link to Wikipedia, or something. I remember when Slashdot used to use built in links to everything2 - I wish they had transitioned over to Wikipedia so the clueless like me could be more easily informed.

Comment Mostly Republicans trying to legalize. (Score 1) 398

This is only news to those who have had their head in the ground, listening to fox news and government shills.

I've noticed that it seems to be mostly Republicans who are putting up the legalization legislation trial balloons.

(Can't speak about Fox. I don't follow 'em all that much since, during the (especially the last) presidential campaigns, they proved the right-hand side of their claimed "fair and balanced" coverage consisted of flogging the Neocon faction and ignoring or slamming the others - especially the "Liberty" faction and Ron Paul.)

But I haven't checked Thomas.gov to see whether this is accurate, or just an artifact of the media only covering it when a Republican does it, on the "man bites dog IS news" principle.

Comment Re:The Summary Claims Effect is Cause (Score 1) 33

The Aurora Borealis are not "are an electromagnetic phenomena that can adversely affect ..."

(Putting on my grammar policeman cap, and explicitly not addressing Rob's point...)

I DO wish the author of TFA would correctly use the singular and plural
of "Phenomenon".
  - Phenomenon: One (class of ...)
  - Phenomena: More than one (class of ...)

The Aurora Borealis are a set of related phenomena, involving glows from ionization of various atmospheric elements at different altitudes, various of the Van Allen belts being pumped up with new particles and/or pushed down by magnetic field distortion from solar wind variations, upper-atmosphere currents, ground currents, and I don't know what all else. The author's apparently inconsistent use of the singular and plural makes it difficult to understand what he meant.

Slashdot Top Deals

Work is the crab grass in the lawn of life. -- Schulz

Working...