Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Current.... melt (Score 1) 227

It's 2Ah, so 240A.

Now, it could be that their battery runs at a higher voltage (and thus not really 2Ah, but they're using that figure as a 3.7V li-ion equivalent capabity), or that there is a power converter built into the battery pack (unlikely for a prototype, though). Still, even for a 37V battery (vs. 3.7V for a normal Li-Ion cell), we're talking 24A. That cord didn't look like 24A cord, and I highly doubt they were using a voltage higher than 37V to charge (especially not with exposed banana jacks like that).

I call the demo highly dubious if not an outright fake/mock.

Comment Re:Hey (Score 5, Interesting) 80

Sorry for the threadjack, but this is yet another case of horrible security reporting.

From watching the video, what it seems happened here was that eBay chose phpBB for their community forum, but did not integrate its authentication system directly with eBay's on the server side. Instead, the site was set-up as a standalone system, and whoever implemented the integration had the bright idea of hardcoding the forum password for everyone as username+123456, and then just having the eBay login page issue a hidden POST request behind the scenes to authenticate users to the community forum section.

Thus, this allows anyone to trivially impersonate anyone else on the forum. It shouldn't have anything to do with the rest of the site, though. Nor does this have anything to do with initial passwords, salts, or any of the other terms that have been thrown around.

A case of absolutely retarded login integration for the community site, but not something that would allow people to take over others' main eBay account. What this says about the people running eBay is another matter entirely...

Comment Re:Dumb (Score 1) 358

Did you actually read that article? It clearly describes exactly what I said: they use resistors on the data pins to signal the available current. There is no bidirectional negotiation going on. There are no extra pins or wires. The charger just has 4 resistors to create two voltage dividers for the D- and D+ pins.

Comment Re:Dumb (Score 3, Informative) 358

This is incorrect. There is no bidirectional negotiation between chargers and devices, nor are there any magic extra pins (at least for pretty much all Android and Apple products - dunno about Zune).

What there is is one USB charging standard, that basically says one thing and one thing only (that matters): if the data pins are shorted together (but otherwise not connected to anything), then the port is a Dedicated Charging Port. A DCP must meet certain voltage/current curve ranges and may be engineered to supply anywhere from 500mA to 1.5A (or more), with the voltage dropping as the device exceeds the charger's maximum. Devices are simply supposed to regulate current draw upwards until the voltage drops below a threshold, indicating the charger's capability. No digital negotiation takes place. Devices are limited to 1.5A charging current, which is quite typical for modern devices (and significantly better than the 500mA of a non-charging port).

There is a newer USB Power Delivery specification that is much more recent, supports higher powers, probably uses more complex negotiation (I haven't read it), and nothing implements it yet.

Then there's what Apple does - they have an incompatible implementation that uses resistors on the data pins in the charger to signal its current capability. Different resulting voltages mean different current levels. This is completely incompatible with the USB charging standard. Recent Apple devices (since the iPhone 3G or so) do support DCP chargers (to some extent - some charge more slowly, and I don't know about larger iPads?), but non-Apple devices will only charge at 500mA or worse from Apple chargers.

Comment Re:Faster is not necessarily better: Quality matte (Score 5, Informative) 101

This is false. Decoding for modern video formats is strictly defined, and all decoders must produce bit-perfect output. You can add as many filters as you want after that, but that's a postprocessing step in the video player and has nothing to do with the decoder. Things like in-loop filters are strictly defined as part of the decoding process and must be there for the decoder to be considered correct.

Android

Drive-by Android Malware Exploits Unpatchable Vulnerability 120

An anonymous reader writes "Attackers have crafted the E-Z-2-Use malware code that exploits a 14-month-old vulnerability in Android devices. The vulnerability exists in the WebView interface a malicious website can utilize it to gain a remote shell into the system with the permissions of the hijacked application. Vulnerable devices are any device that is running a version earlier than 4.2 (in which the vulnerability was patched) which is a staggeringly large amount of the market. The vulnerability is in Android itself rather than the proprietary GMS application platform that sits atop the base operating system so it is not easily patched by Google."
Medicine

Egg-free Flu Vaccines Provide Faster Pandemic Response 64

eggboard writes "Jen A. Miller has an egg allergy of a variety that her doctor has told her could produce a severe reaction if she were vaccinated for the flu, as flu vaccines are grown from viral strains incubated in chicken eggs. But, she explains, two new approaches have been approved by the FDA and are in production that don't use eggs at all; they're on the market in small amounts already, but will be available in much larger quantities soon. It's not just about egg allergies: the new vaccine types (one relying in insect proteins and the other on animal proteins) provide a much faster turnaround time in response to flu pandemics — as little as two to three months from isolation of a strain to mass production instead of at least six months with eggs."

Comment Re:Why does Wikimedia hate batteries? (Score 1) 235

Nope, they just crash, lag, or play it with severe artifacts (the latter happens with some hardware codecs and 10bit files).

Basically no modern video codecs are designed to gracefully degrade given limited decoder features, because they rely on bit-perfect output to be used as a reference for future frames. Any error accumulates in the decoding loop and becomes significant artifacting until the next I frame.

Japan

Japan's Alleged Death Threat-Making, Cat-Hacking Programmer Says He's Innocent 69

Daniel_Stuckey writes "Inside the memory card in the cat's collar, authorities found a resentful message criticizing the police along with versions of the virus (iesys.exe) used to carry out the threat messages, which were made remotely, through other people's computers. If you hadn't heard about the story in the news, you'd be forgiven for confusing it with the plot of a Haruki Murakami novel. In Tokyo District Court Wednesday, the former employee of a Japanese IT company wore a black suit, a wide smile, and pleaded not guilty to 10 charges brought against him. The Japan Times explained the string of threats were directed at 'schools and kindergartens attended by the Emperor Akihito's grandchildren,' as well as a Japan Airlines jet headed for New York. The plane had to stop mid-flight, costing the airline ¥9.75 million (about $93,000)."
Image

Sinkhole Swallows 8 Vehicles Inside Bowling Green KY Corvette Museum 97

OakDragon writes "A sinkhole about 40 feet wide — and 30 feet deep — opened up inside the Corvette Museum in Bowling Green, KY early Thursday morning, swallowing eight vehicles that were sitting inside. At least one of these cars is one of a kind, and due to its location the fire department allowed its removal. The sinkhole is remarkable in that it has left the surrounding ground which supports the circular structure intact, although that assessment may change up on investigation. Security footage from inside the museum shows the collapse as it happened."
Security

NBC News Confuses the World About Cyber-Security 144

Nerval's Lobster writes "In a video report posted Feb. 4, NBC News reporter Richard Engel, with the help of a security analyst, two fresh laptops, a new cell phone, and a fake identity, pretended to go online with the technical naiveté of a Neanderthal housepet. (Engel's video blog is here.) Almost as soon as he turned on the phone in the Sochi airport, Engel reported hackers snooping around, testing the security of the machines. Engel's story didn't explain whether 'snooping around' meant someone was port-scanning his device in particular with the intention of cracking its security and prying out its secrets, no matter how much effort it took, or if the 'snooping' was other WiFi devices looking for access points and trying automatically to connect with those that were unprotected. Judging from the rest of his story, it was more likely the latter. Engel also reported hackers snooping around a honeypot set up by his security consultant which, as Gartner analyst Paul Proctor also pointed out in a blog posting, is like leaving the honey open and complaining when it attracts flies. When you try to communicate with anything, it also tries to communicate with you; that's how networked computers work: They communicate with each other. None of the 'hacks' or intrusions Engel created or sought out for himself have anything to do with Russia or Sochi, however; those 'hacks' he experienced could have happened in any Starbucks in the country, and does almost every day, Proctor wrote. That's why there is antivirus software for phones and laptops. It's why every expert, document, video, audio clip or even game that has anything at all to do with cybersecurity makes sure to mention you should never open attachments from spam email, or in email from people you don't know, and you should set up your browser to keep random web sites from downloading and installing anything they want on your computer. But keep up the fear-mongering."

Slashdot Top Deals

Always draw your curves, then plot your reading.

Working...