Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment GPS receiving (Score 1) 253

Live traffic updates are also one-way. Your GPS system has additional functions which depend either on GSM (as used by GPS-based tracking systems) or simple radio receivers tuned to RBDS services or a Traffic Message Channel (TMC) on FM or DAB.

Functionally, the GPS technology never transmits -- but a device including GPS functionality might also include other technologies to transmit information.

Comment Maths is fun! (Score 1) 570

Just a small note to all those clever people who are calculating the time taken to perform an exhaustive keyspace search on the potential passwords.

We should distinguish between the MAXIMUM time taken to exhaust the symbol space, versus the AVERAGE time.

Assuming uniform distribution of passwords through the space, and a sufficiently large sample of challenges, we would naturally expect the time taken to find the correct password to converge on n/2 -- i.e., half of the maximum time.

Thus, if a symbol space can be exhaustively searched in one year, on average, finding passwords with a similar difficulty level will take an average of 6 months, with a typical normal distribution.

Comment Not the first CyberWar attack --- won't be last. (Score 1) 462

This certainly isn't the first Cyber War attack. I've written about some of these attacks in my blog, http://security-risk.blogspot.com/. Here's an extract:

        * In 2004, Thomas C. Reed, an Air Force secretary in the Reagan administration, wrote that the United States had successfully inserted a software Trojan horse into computing equipment that the Soviet Union had bought from Canadian suppliers. Used to control a Trans-Siberian gas pipeline, the doctored software failed, leading to a spectacular explosion in 1982.

        * Crypto AG, a Swiss maker of cryptographic equipment, was the subject of intense international speculation during the 1980s when, after the Reagan administration took diplomatic actions in Iran and Libya, it was widely reported in the European press that the National Security Agency had access to a hardware back door in the company’s encryption machines that made it possible to read electronic messages transmitted by many governments.

        * According to a former federal prosecutor, who declined to be identified because of his involvement in the operation, during the early ’80s the Justice Department, with the assistance of an American intelligence agency, also modified the hardware of a Digital Equipment Corporation computer to ensure that the machine — being shipped through Canada to Russia — would work erratically and could be disabled remotely.

Slashdot Top Deals

"May your future be limited only by your dreams." -- Christa McAuliffe

Working...