Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Scam site is google-ranked higher than google's. (Score 1) 291

Well... It appears that the first google hit for 'chrome add-ons' links to mychromeaddons.com
This site is made to look like google's, but is LITTERED WITH ADS. The whois information reveals it's a third-party site.
The OFFICIAL chrome add-on site also does list an AdBlock extension, but something is fishy about it. When trying to install it, Chrome warns that "this extension is trying to access your data on api.flickr.com." What the hell?

We'll see if and how Google will try to combat these issues...

Comment Silver lining, or nuke it from orbit? (Score 1) 439

Would apple seriously ever consider USING such a thing? It would be most terrible. But of course, apple is so obsessed with its image that I doubt they would ever employ this technology.
Of course, having a patent on this atrocious god-awful piece of work will effectively prevent other, less image-conscious vendors from doing similar things, which might mean (could it be?) less intrusive advertising on other platforms.

Comment Learn Eagle (Score 1) 262

Get Eagle. It's free and there are a lot of part libraries out there. It's quite backward, but you will soon learn that most electronics CAD tools are. I guess there isn't all THAT much overlap between ECE and HCI people... Have Eagle produce a Gerber file and then send it off to your favorite board house. Happy routing :)
The Military

US Pentagon Plans For a Spy Blimp 374

nloop writes "The Pentagon is intending to develop a new spy ship — a dirigible. At 65,000 feet it would provide a 10 year, solar power based, unblinkingly intricate and continuous view of the surface via radar surveillance. Because of its altitude it would be safe from surface-to-air missiles and most aircraft. A 1/3-scale prototype, now being designed, is 'known as ISIS, for Integrated Sensor Is the Structure, because the radar system will be built into the structure of the ship. ... 'If successful, the dirigible... could pave the way for a fleet of spy airships, military officials said.'"

Comment Re:I can has Multiprotocol Label Switching? (Score 1) 690

In a connection-oriented system, it is easier to provide QoS (guaranteed bandwidth, delay, etc) because the routers know which packet belongs to which flow. Thus, the routers can maintain per-flow bookkeeping, and drop any packets from a connection that is exceeding its allocated bandwidth. At the same time, the network is told the amount of requested bandwidth per connection ahead of time. Since each router knows its available bandwidth (and the bandwidth reserved so far), each router can definitely answer whether or not it can support X amount of extra bandwidth. This way, a proper path can be negotiated through the network, at connection time, such that every node along the way can handle the requested bandwidth, delay, jitter, etc.

As for security, knowing your path to someone else isn't the issue. The issue is being able to manipulate that path (and others) at will. There are a number of hijacking, redirection, man-in-the-middle, etc attacks that rely on issues within the way IP packets are routed. In a circuit-switched system, like MPLS, the control plane basically lives in its own separate world and is essentially decoupled from the data plane (like with the phone network). That is, forwarding decisions are made based on an extra attribute connected to every packet (the so-called label ID) and not on some user-accessible field within the data itself. The only time that the user has access to this attribute is when specifying the "connection ID" associated with each outgoing packet, but that is strictly an agreement between the user and his serving router and has little relation to the upstream label tables.

Comment Re:I can has Multiprotocol Label Switching? (Score 1) 690

Well, of course we need to specify the destination address. In the MPLS case, we would signal the router serving us that we wish to talk to a certain address, and the router would send back a label ID that corresponds to that connection. (While the destination addresses are global, the label IDs can be reused per pair of devices, but that is besides the point). At this point, the path is set up and cannot really be "messed with" and you reference it by the label ID.
The security benefit is that the routing mechanism is invisible to the end user. He needs to specify the destination and the rest of the connection is up to the network.
Of course, the other benefits are efficiency and traffic engineering. With the network being aware of the actual connections (unlike with TCP, where packets are essentially disjoint from a router's point of view), it is relatively easy to provide features like bandwidth reservation, QoS guarantees, etc. And the actual switching process for circuit switching is a lot more efficient. It is far easier for a router to perform a label lookup and then push/pop/swap labels than it is to carry out the longest prefix match lookup. In fact, such technology is already used internally by some ISPs, but it is not available globally or end-to-end.

Comment Re:I can has Multiprotocol Label Switching? (Score 1) 690

How is that vague and meaningless? One of the issues is that users are able to exercise direct control over the network through the same "port" which is used to send data. Sure, you would have to send some messages to set up a connection to your destination, but that control action should be done by the network, as it sees fit, instead of letting the user set the source and destination addresses on every packet. The user should be able to ask the network to set up a connection and then send data, and the network handles all the internal operations. Going back to the phone analogy, are you able to pick up the phone and make a call to someone while faking your own phone number? No. Are you able to place a call to and directly manipulate telephone switching equipment? Not since decades ago. Are you able to hijack someone's conversation, or force a specific path for your phone call? I don't think so.
The original design of the internet did not anticipate the need for isolated control, management, and data planes. There was just no reason to do it back then. But with 30 years of development and growth, things have changed...

Comment I can has Multiprotocol Label Switching? (Score 1) 690

There has been some talk about separating the control plane from the data plane (ie, packet header from data). The phone network had its share of unsecurities when they were using in-band signalling, but since the two planes were separated, phones became far more secure. The same technique can be applied to the data network. If we separate the control information from the actual user data, we may achieve better security, as it would thwart any attempts to mess with the packet header, redirection attacks, prefix hijacks, or any of that other garbage. And the technology already exists. Look at MPLS- your computer can signal the upstream equipment to set up a connection to a specific address, and all you have to do is send forward data with the given label ID. The technology is already being used to route traffic within ISPs, but the security benefits of it won't really materialize until it's pushed out to the user level. Of course, good luck getting everyone switched over.
Music

iTunes DRM-Free Files Contain Personal Info 693

r2k writes "Apple's iTunes Plus files are DRM-free, but sharing the files on P2P networks may be an extremely bad idea. A report published by CNet highlights the fact that the account information and email address of the iTunes account holder is hidden inside each and every DRM-free download. I checked, and I found I couldn't access the information using an ID3 tag editor, but using Notepad I found my email address stored inside the audio file itself."
Privacy

UK Police To Step Up Hacking of Home PCs 595

toomanyairmiles writes "The Times of London reports that the United Kingdom's Home Office has quietly adopted a new plan to allow police across Britain to routinely hack into people's personal computers without a warrant. The move, which follows a decision by the European Union's council of ministers in Brussels, has angered civil liberties groups and opposition MPs. They described it as a sinister extension of the surveillance state that drives 'a coach and horses' through privacy laws."

Comment Re:GPS uses signal strength? (Score 2, Informative) 220

That doesn't quite constitute using (overall) signal strength, and neither is it the primary location method. Yes, it is possible to use the carrier phase information as well as the L2 carrier phase (and L1/L2 discrepancy) to get a more accurate fix, but this information is only used to adjust the TDOAs of the PRN signals and compensate for varying ionospheric delays. Signal strength of each satellite is much more affected by random low clouds and even the receiver's immediate environment, than by distance from the satellite. In fact, if your receiver provides an SNR readout for each satellite, you can get an idea about just how dramatically these values are affected by, say, a tree that partially obscures a portion of the sky.
Television

TiVo PC Could Be a Game-Changer 191

An anonymous reader sends in an article by Andrew Keen (author of "The Cult of the Amateur") about TiVo's new TiVo PC, which he believes could seal the fate of advertising on online videos. Just as TiVo let viewers zap commercials on broadcast TV, TiVo PC — a TV tuner that can be plugged into a PC — will let Net viewers of the likes of Hulu.com and ABC.com skip commercials in the nascent medium of online video. Keen believes that TiVo's business model involves (besides selling lots of $199 boxes) mining and selling the far richer stream of user behavioral data that TiVo PC will enable.
Operating Systems

How the LSB Keeps Linux One Big Happy Family 171

blackbearnh writes "The Linux Standard Base is the grand attempt to create a binary-level interface that application developers can use to create software which will run on any distribution of Linux. Theodore Tso, who helps maintain the LSB, talked recently with O'Reilly News about what the LSB does behind the scenes, how it benefits ISVs and end users, and what the greatest challenges left on the plate are. 'One of the most vexing problems has been on the desktop where the Open Source community has been developing new desktop libraries faster than we can standardize them. And also ISVs want to use those latest desktop libraries even though they may not be stable yet and in some ways that's sort of us being a victim of our own success. The LSB desktop has been getting better and better and despite all the jokes that for every year since I don't know probably five years ago, every year has been promoted as the year of the Linux desktop. The fact of the matter is the Linux desktop has been making gains very, very quickly but sometimes as a result of that some of the bleeding edge interfaces for the Linux desktop haven't been as stable as say the C library. And so it's been challenging for ISVs because they want to actually ship products that will work across a wide range of Linux distributions and this is one of the places where the Linux upstream sources haven't stabilized themselves.'"
Toys

Flying Humans 330

mlimber sends us to the NYTimes for a story about flying people who jump from planes or other high locations wearing a wing suit akin to a flying squirrel's. Their efforts have potential military and Xtreme sports applications. The story profiles, with video, one guy who wants to be the first to jump from a plane and land without a parachute (and live). Here's a YouTube video of another of these fliers skimming six feet above skiers in the Swiss Alps. Quoting: "Modern suit design features tightly woven nylon sewn between the legs and between the arms and torso, creating wings that fill with air and create lift, allowing for forward motion and aerial maneuvers while slowing descent. As the suits, which cost about $1,000, have become more sophisticated, so have the pilots. The best fliers, and there are not many, can trace the horizontal contours of cliffs, ridges and mountainsides."

Slashdot Top Deals

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...