Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Dear Customers... (Score 1) 219

With RSA doing the keyfill at point of manufacture, the customer just needs to load the seed file for the entire batch onto their authentication server and then hand out the token

Don't forget that the tokens also expire every couple of years. If it customers were able to load a new seed themselves, then they wouldn't need to purchase new ones as often.

Ubuntu

Submission + - 2011: The Year of the Linux Tablet? (vsipad.com)

An anonymous reader writes: For what seems like forever, we’ve been hearing Linux fans proclaiming that the coming year will be the “Year of the Linux Desktop.” I don’t know if we’ll ever see the year of the Linux Desktop or not, but it looks like 2011 is going to be the year of the Linux Tablet. With new tablets being announced almost daily, 2011 should be an exciting year for Linux fans!
Security

Submission + - Facebook: Tunisian Govt. tried country-wide hack (threatpost.com)

chicksdaddy writes: Facebook's security team has been saying for months that account integrity is a top priority, and that so-called "social authentication"- using your knowledge of your own network to help authenticate yourself — was their preferred method to secure account access. Now an exclusive report in The Atlantic says that the company employed social authentication earlier this month to secure the accounts of Tunisian protesters calling for the ouster of that country's ruthless dictator, Zine El Abidine Ben Ali. According to the report, Facebook security engineers detected large scale efforts by Tunisian ISPs to intercept user logins to Facebook and to remove protest pages set up on the social network. They responded by forcing Tunisian users to connect through a secure HTTP server and required Tunisian users to complete social authentication challenges before accessing their accounts. The company's efforts seem to have worked — the protests succeeded in driving Zine El Abidine Ben Ali from the country on January 15. Vive la Facebook!

Comment Bug Free Code (Score 1) 314

Interesting article, especially this little snippet:

re: surprise at lack of QA or automated unit tests — “most engineers are capable of writing bug-free code. it’s just that they don’t have an incentive to do so at most companies. when there’s a QA department, it’s easy to just throw it over to them to find the errors.” [EDIT: please note that this was subjective opinion, I chose to include it in this post because of the stark contrast that this draws with standard development practice at other companies]

This guy's obviously fresh out of college. It would be interesting to hear from someone with a little more real-world experience.

Microsoft

Submission + - Microsoft Contests Apple App Store Patent (itnews.com.au)

aesoteric writes: Microsoft has launched a legal challenge against Apple's trademark claim over the term 'App Store.' The Redmond giant said in a filing with the US Trademark Trial and Appeal Board that the words 'app' and 'store' were simply too generic for Apple to have a trademark on the phrase. The move has raised suspicions that Microsoft is looking for a way to rebrand its Windows Phone 7 Marketplace.
Cellphones

Why Android Is the New Windows 424

An anonymous reader writes "Windows' dominance of the PC market has been good in many ways: reduced hardware costs, increased IT literacy and a standard development platform to name a few. Perhaps Android will bring similar benefits. But unless Google are very careful, it is likely to bring some of the same problems, too."
Classic Games (Games)

Pac-Man's Ghost Behavior Algorithms 194

An anonymous reader writes "This article has a very interesting description of the algorithms behind the ghosts in Pac-Man. I had no idea about most of this information, but that's probably because it's difficult to study the ghosts when I die every 30 seconds. Quoting: 'The ghosts are always in one of three possible modes: Chase, Scatter, or Frightened. The "normal" mode with the ghosts pursuing Pac-Man is Chase, and this is the one that they spend most of their time in. While in Chase mode, all of the ghosts use Pac-Man's position as a factor in selecting their target tile, though it is more significant to some ghosts than others. In Scatter mode, each ghost has a fixed target tile, each of which is located just outside a different corner of the maze. This causes the four ghosts to disperse to the corners whenever they are in this mode. Frightened mode is unique because the ghosts do not have a specific target tile while in this mode. Instead, they pseudorandomly decide which turns to make at every intersection.'"

Comment Re:Security (Score 1) 338

If it were, say, a private company producing this product, wouldn't they have subjected it to the normal quality control processes in software companies...

But what exactly is that process? The QA process can vary widely from company to company and product to product.

There are several factors that can influence the quality of QA:

How important is the product to the team/company/manager and middle-managers involved?

Is the QA team responsible for more than one product? If so, which product is given the most priority?

Is the QA team staffed to adequately test each product assigned to them?

What is the individual skill and experience level of each team member? Does anyone on the team have experience finding and testing for security vulnerabilities?

Does the company actually have a qualified "in house security specialist"? How involved is he/she in the product design and QA process? Such a specialist should review and approve both the initial product design and the test plan.

How much testing goes into each release? IE: Does the team perform a full regression (re-executing the entire test plan, which can take weeks or months), or do they focus their efforts only around the new features that were added, potentially missing bugs that may arise due to an unanticipated affects that new features might have on other components in the system?

Commercial software companies often ship products with serious security flaws, in spite of the reasons you listed. Some products receive through testing and others don't. It doesn't matter much whether or not the product is a commercial offering.

Games

Pirates as a Marketplace 214

John Riccitiello, the CEO of Electronic Arts, made some revealing comments in an interview with Kotaku about how the company's attitudes are shifting with regard to software piracy. Quoting: "Some of the people buying this DLC are not people who bought the game in a new shrink-wrapped box. That could be seen as a dark cloud, a mass of gamers who play a game without contributing a penny to EA. But around that cloud Riccitiello identified a silver lining: 'There's a sizable pirate market and a sizable second sale market and we want to try to generate revenue in that marketplace,' he said, pointing to DLC as a way to do it. The EA boss would prefer people bought their games, of course. 'I don't think anybody should pirate anything,' he said. 'I believe in the artistry of the people who build [the games industry.] I profoundly believe that. And when you steal from us, you steal from them. Having said that, there's a lot of people who do.' So encourage those pirates to pay for something, he figures. Riccitiello explained that EA's download services aren't perfect at distinguishing between used copies of games and pirated copies. As a result, he suggested, EA sells DLC to both communities of gamers. And that's how a pirate can turn into a paying customer."
It's funny.  Laugh.

What If They Turned Off the Internet? 511

theodp writes "It's the not-too-distant future. They've turned off the Internet. After the riots have settled down and the withdrawal symptoms have faded, how would you cope? Cracked.com asked readers to Photoshop what life would be like in an Internet-addicted society learning to cope without it. Better hope it never happens, or be prepared for dry-erase message boards, carrier pigeon-powered Twitter, block-long lines to get into adult video shops, door-to-door Rickrolling, Lolcats on Broadway, and $199.99 CDs."
Censorship

Submission + - Researchers Find Gaps in Iranian Filtering (securityfocus.com)

I Don't Believe in Imaginary Property writes: "With all the turmoil and internet censorship in Iran making it difficult to get an accurate picture of what's going, security researchers have found a way to analyze gaps in Iran's filtering by analyzing traffic exiting Iran. The short version is that SSH, torrents and Flash are high priorities for blocking, while game protocols like WoW and X-Box traffic are being ignored, even though they also allow communication. Hopefully, this data will help people think of new ways to bypass filtering and speak freely, even though average Iranians have worse things to worry about than internet censorship, now that the reformists have been declared anti-Islamic by the Supreme Leader. Given the circumstances, that declaration has been called 'basically a death sentence' for those who continue protesting."
Toys

Submission + - Kurzweil's aura failing?

smallfries writes: Ray Kurzweil has a reputation as a futurist that has remained intact for the past two decades. As we catch up with the first year for which he made concrete predictions it seems that cracks are starting to appear. Kurzweil's predictions of the future have revolved around technology providing exponential returns on investment. But the latest evidence suggests that these returns may fail in the semiconductor business as economics catches up with technology.

"The usable limit for semiconductor process technology will be reached when chip process geometries shrink to be smaller than 20 nanometers (nm), to 18nm nodes," explains Len Jelinek, director and chief analyst for semiconductor manufacturing at iSuppli in a new report. "At those nodes, the industry will start getting to the point where semiconductor manufacturing tools are too expensive to depreciate with volume production, i.e., their costs will be so high, that the value of their lifetime productivity can never justify it," he adds.

Which area will maintain such a high rate of improvement as microprocessors succumb to economic reality?

Social Networks

Submission + - Where does a geek find a social life? 10

JustShootMe writes: "So I have a question for my fellow slashdotters, and yes, I realize I am throwing myself into the lion's den covered with tasty meat flavored sauce. I have never been a very social person, preferring to throw myself into technology, therefore I've been spectacularly unsuccessful in developing any meaningful interpersonal relationships. Lately I have begun to feel that this situation is not tenable, and I would like to fix it. But I really don't know how and haven't the faintest idea where to start. I know that I am in the minority and there are many different kinds of slashdot readers, most of whom have vastly more experience in this realm than I do. So, fellow slashdotters, please tell me. How, and more importantly, where, do you meet fellow geeks, preferably including some of the opposite gender, in meatspace?"
Math

Submission + - Analyzing Iran's Election Numbers

CaroKann writes: The Washington Post has an article in the Opinion section analyzing Iran's election numbers.

The authors base their analysis on the assumption that humans are very bad at creating random numbers. They examined the last two digits of the official vote count from each province, looking for evidence of two human foibles concerning how people pick random numbers.

First, when picking random numbers, people tend to pick some digits more than others. For example, humans tend to pick the number 5 less often than the number 7. In the election results, the last digit is a 5 only 4% of the time, and 7 17% of the time. With completely random numbers, each 5 and 7 would appear as the last digit about 10% of the time.

Second, people have difficulty creating random numbers with non-consecutive digits. This pattern also shows up in the results.

They authors conclude that the chances of the election numbers being completely clean are 1 in 200.
Censorship

Submission + - Google Suggest Disabled in China Due to Porn (nytimes.com)

I Don't Believe in Imaginary Property writes: "The Chinese government has asked Google to disable Google Suggest because it has been suggesting that people search for pornography based on its analysis of the most popular search terms in China. This comes on the heels of a fake CCTV interview being used to support the government requirement that all new computers ship with the 'Green Damn' internet censoring program, which is still in force, despite reports to the contrary. Understandably, average Chinese citizens are not very happy about any of this."

Slashdot Top Deals

What is research but a blind date with knowledge? -- Will Harvey

Working...