Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Try "SearchMyFiles" (Score 1) 440

Recently had this situation.

Nirsoft's free "SearchMyFiles" http://www.nirsoft.net/utils/search_my_files.html has a straightforward Find Duplicates mode which helped a lot. It is easy (the most "complex" is designating the base locations for searches as e.g. K:\;L:\;P:\;Q:\), fast, never crashed on me, and had only cosmetic issues ("del" key not working). I recommend running it with administrative privileges so that it does not miss files.

Comment The abstract of the article is here (Score 5, Informative) 80

http://dl.acm.org/citation.cfm?id=2046756

"..we describe a practical attack on XML Encryption, which allows to decrypt a ciphertext by sending related ciphertexts to a Web Service and evaluating the server response. We show that an adversary can decrypt a ciphertext by performing only 14 requests per plaintext byte on average."

Impressive!

Graphics

Submission + - Inkscape 0.48.1 released! 2

ScislaC writes: This version of the SVG-based vector graphics editor contains over 80 bug fixes as well as improves stability and performance on all platforms. Check out the release notes for a brief summary about what has changed, view the milestone page for a comprehensive list of fixed bugs, or just jump right to downloading your copy for Windows, OSX Leopard & Snow Leopard, or Others.
Education

3rd-Grader Busted For Jolly Rancher Possession Screenshot-sm 804

theodp writes "A third-grader in a small Texas school district received a week's detention for merely possessing a Jolly Rancher. Leighann Adair, 10, was eating lunch Monday when a teacher confiscated the candy. Her parents said she was in tears when she arrived home later that afternoon and handed them the detention notice. But school officials are defending the sentence, saying the school was abiding by a state guideline that banned 'minimal nutrition' foods. 'Whether or not I agree with the guidelines, we have to follow the rules,' said school superintendent Jack Ellis."

Comment Re:Slipstream the drivers + update the .iso (Score 1) 349

It's easy enough to slipstream (lots of) extra drivers and periodically update a master install .iso using tools such as nlite.

Any pointer to (or hint) for some "Slipstream for novices?" Explaining in particular how do you deal with
- disparate versions of serial-number protected things (MSO and Windows XP Pro/Home, or worse vendor-customized Vistas/7)
- machines where XP needs extra drivers to boot a SATA device
- drivers that seem to only come as an interractive installer (ATI)
- patch tuesday routine

Comment Re:Honestly (Score 1) 157

> What options do you have to protect your self from Van eck phreaking?

One option to consider seriously is: paper ballot inserted, in a voting booth protected by opaque curtain, into an opaque paper envelope, which is then publicly dropped into a transparent urn, which is left under public view during the voting, and publicly shaked before the counting process.

That's how 90% of the votes are cast in France for decades [the "transparent" bit was added some 45 years ago]. Not only is it secure against Van Eck phreaking before its invention, it has great resilience against many kinds of fraud, and most voters are able to understand and check the process.

You still have to guard against quite a few things, including
* unsuitably opaque envelopes;
* bulletins printed on paper of different color/size/material [even if the envelope is opaque, it is usually not sealed, and sometime some portion of the bulletin (hopefully the back side, if the bulletin is folded) may be glanced at thru the opening; also the weight/stiffness of the bulletin may be revealing]
* hidden cameras in the voting booth; including those built into cellphones held by the voter [because the voter could be trying to prove what (s)he voted [in order to sell her/his vote or avoid retaliation if s/he did not vote as instructed].

Actually, in some locations much closer to you than half the circumference of planet earth, it may happen that voters are threatened to be beaten/killed is they do not vote as instructed; and maybe, on election day, a few of those who voted could be beaten publicly (often: regardless of what they actually voted, or based on their perceived opinion), in order to make the threat credible to those who did not vote yet. In these circumstances, the voters must be able to really trust the secrecy of their vote.

François Grieu

Comment Result is NOT statistically significant (Score 2, Insightful) 317

According to numerous online sources, raw numbers are:
51 out of 8187 found infected in the vaccinated group;
74 out of 8198 found infected in the control group.

The most basic course of statistics tells how to proceed from here: test if the null hypothesis (vaccine has no effect) remains plausible despite this evidence. Conditions are ideal for the chi-squared test.
We get Observed values 51, 74, 8147, 8123; Expected values 62.504, 62.496, 8135.5, 8134.5; then sum((O-E)^2/E) = 4.267, with two degrees of freedom.
Conclusion: the null hypohesis is rejected with only 88% confidence level.

This is not enough to confortably say that the vaccine has any benefit. Odds of the contrary are about 1/17.

This is much less reason to trust that the vaccine reduce infection rate by 31.1%, as reported in some press articles. Odds are 1/2 that it is less efficient than this.

    Francois Grieu

Supercomputing

Submission + - The largest (distributed) supercomputer ...

RockDoctor writes: Peter Gutmann at Auckland, New Zealand has made some estimates about what is probably the world's largest (distributed) supercomputer. Details are somewhat shady, not because of the secrecy habits of the spooks, or a government's desire to surveil it's citizens. No, the people who've built this (distributed) supercomputer are shadowy because they're simply criminals. The continuing Storm Worm botnet now seems to contain between 1 and 10 million computers, and with a broad-brush estimate of the likely machines involved he comes up with a description of a system that dwarfs all the largest publicly-described supercomputers of the world. I have my suspicions that the estimated "average" computer specification considered is somewhat over-the-top (I'd have to weld together at least two of the machines in my flat to even approach this specification, and I'd have to weld together at least 4 of the best video card in the house), but with an 8-fold difference in processor count between StormWorm and BlueGene/L , there's a lot of room for Gutmann to be both correct and on the low side in his estimates.
With a system like this, is it credible that they (the criminals running this system) are planning for example, to try breaking SSL-encrypted communications in real time?

Slashdot Top Deals

Get hold of portable property. -- Charles Dickens, "Great Expectations"

Working...