Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Transportation

Heroic Engineer Crashes Own Vehicle To Save a Life 486

scottbomb sends in this feel-good story of an engineer-hero, calling it "one of the coolest stories I've read in a long time." "A manager of Boeing's F22 fighter-jet program, Innes dodged the truck, then looked back to see that the driver was slumped over the wheel. He knew a busy intersection was just ahead, and he had to act fast. Without consulting the passengers in his minivan — 'there was no time to take a vote' — Innes kicked into engineer mode. 'Basic physics: If I could get in front of him and let him hit me, the delta difference in speed would just be a few miles an hour, and we could slow down together,' Innes explained."
Idle

Physicists Discover Universal "Wet-Dog Shake" Rule 97

Dog owners can sleep easy tonight because physicists have discovered how rapidly a wet dog should oscillate its body to dry its fur. Presumably, dogs already know. From the article: "Today we have an answer thanks to the pioneering work of Andrew Dickerson at the Georgia Institute of Technology in Atlanta and a few buddies. But more than that, their work generates an interesting new conundrum about the nature of shaken fur dynamics. Dickerson and co filmed a number of dogs shaking their fur and used the images to measure the period of oscillation of the dogs' skin. For a labrador retriever, this turns out to be 4.3 Hz."

Comment Re:This article speaks the truth (Score 1) 238

Maybe Microsoft can help with a simple change to all their browsers: before an add-on is engaged, have an "are you sure" window. Or add an always off management option for snap-ins with related management utilities. Even better, like drivers, maintain awareness of major add-ins and what is ok, then go to always off on any version with a known exploit. More impressive would be to simply be aware of the exploit. Simple: look for Java, or any other add-in, downloading something that either has an executable magic byte or a magic byte mismatch to file extension or a broken magic byte.
Idle

2012 Mayan Calendar 'Doomsday' Date Might Be Wrong 144

astroengine writes "A UC Santa Barbara associate professor is disputing the accuracy of the mesoamerican 'Long Count' calendar after highlighting several astronomical flaws in a correlation factor used to synchronize the ancient Mayan calendar with our modern Gregorian calendar. If proven to be correct, Gerardo Aldana may have nudged the infamous December 21, 2012 'End of the World' date out by at least 60 days. Unfortunately, even if the apocalypse is rescheduled, doomsday theorists will unlikely take note."
Cellphones

Cell Phone Interception At Def Con 95

ChrisPaget writes "I'm planning a pretty significant demonstration of GSM insecurity at Defcon next week, where I'll intercept and record cellular calls made by my attendees, live on-stage, no user-input required. As you can imagine, intercepting cellphones is a Very Big Deal in the eyes of the law; this blog post is an attempt to reassure everyone that their privacy is being taken seriously despite the nature of the demo. I'm not just making it up either — the EFF have helped significantly with the details."

Comment USB != 100% of Removable Media (Score 2, Informative) 233

The government forgot iSCSI, Firewire, and eSATA? Really? And, unless they have locked down new hardware discovery, you could add these in with a PC Card or Express Card slot on any laptop. iSCSI only requires a source system and rights to set up the drive. Even easier: map a network share on an unmanaged asset that you brought along to take advantage of DHCP.

And you don't need any magic or special software to trap a drive connection event, just use WMI. It works for any drive type: just listen for a drive connection event... like ten lines of code, max. You could set up an agent or script to watch for these on any Windows computer with almost zero effort... you could even do it remotely with the proper rights.

Plenty of vendors have software to help, too. Off the top of my head, McAfee, Symantec, and Cisco all have something. The catalog of features they offer attempt to manage the DLP idea a little more completely any one USB drive solution... although I admit none of the vendors have it absolutely right yet.

I will ask a question I always ask about something like this: What's the goal? If it is Data Loss Prevention (DLP) then I believe they have failed. If it is to prevent virus installations then could start with disabling autorun.inf and supplementing that effort with a little drive connection detection using WMI.

Slashdot Top Deals

The hardest part of climbing the ladder of success is getting through the crowd at the bottom.

Working...