Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Sooo .. (Score 1) 127

http://goo.gl/z8ti3D

From a root command line, you can do:

vdc cryptfs changepw newpass

(where newpass is your new password for the dm-crypt volume... which is your /data partition.)

There is also apps that do this as well, but you need root.

Of course, when you change your screen lock PIN, it will change the boot password, but that is a given.

Comment Re:Sooo .. (Score 1) 127

Those are some good suggestions. I might add a few myself:

1: If your device is rooted, you can separate the password that unlocks the /data partition from the PIN that unlocks the screen. This way, you have 4-5 digits that are quickly typed in... but if a thief decides to reboot the phone or power it off, they are facing the 20-30+ character passphrase... and most newer Android ROMs only allow 30 guesses before they do an erase.

2: Enable encryption of the /data partition. This is worth mentioning.

3: There is an app that will detect if the power button is pressed six times quickly, and send out a duress code. Forgot the name, but might be worth having.

4: Some ROMs will do some form of encryption on the SD card. If not, you can get an EncFS app, or BoxCryptor (which is a commercial/subscription version that uses EncFS as its base.)

5: Consider a backup program like Titanium Backup which uses a very reliable encryption mechanism (it uses a passphrase for a private key, and uses a public key for backups), and can save the encrypted backups to a cloud provider.

6: Consider a utility that requires a PIN to access some apps. For example, the app for a terminal and other rooted apps on my Android phone is PIN protected, FB and other apps are under another PIN, etc... so if a bad guy gets the phone while its unlocked, they might have access to the Web browser, but not the other parts. If they reboot the phone, they are faced with a very long /data encryption password as stated in #1.

Comment Re:Golden Rice (Score 2) 573

I can't tell if you're trolling or not but enough people do believe that keeping people impoverished and hungry is somehow good for them, and that it is somehow ethical to sit idly by and watch and do nothing while people starve just for being born in the wrong part of the planet. It's completely idiotic of course. Everywhere we see a reduction in poverty and increases in the standard of living we see lower birthrates. Do you really think we are going to bring about a greater human development index without first addressing the issues of starvation and malnutrition? Unlikely. Normal Borlaug once correctly remarked that the first essential component of social justice is adequate food for all mankind. You want to fight poverty, start by ensuring that no one goes to bed hungry. It's pretty hard to work your way to economic prosperity when you're dying of vitamin A deficiency.

Comment Golden Rice (Score 5, Insightful) 573

Moore breaks with what might be expected of a Greenpeace founder as well in that he is currently chair of Allow Golden Rice.

Well, while he is wrong about climate change, his stance on Golden Rice is pretty well on. We know it works, we know it is safe, Greenpeace still opposes it because they know damned well that their cries of genetic engineering being a dangerous horrible thing that you should totally give them loads of cash to fight are going to look a bit silly when it is saving the lives of thousands of children. It's despicable that they are willing to allow unnecessary death and human suffering in developing countries just to further their careers as professional activists. They're no different than anti-vaxxers who bring back vaccine preventable disease, not in my book. I don't agree with Moore's stance on climate change, but at least he's doing good on this front to bring attention to the harm Greenpeace and other anti-science groups are doing.

Comment Vote for Mickey Mouse? (Score 1) 1089

I have read about mandatory voting in other countries... what can happen is that in elections that people really don't care about, they wind up voting for Mickey Mouse, the FSM, or some other character just for kicks.

However, the perfect is the enemy of the good, and maybe it might be a wise idea to at least get people to the polls somehow, even if they just play Tetris with the checkboxes on the voting machines, just to get rid of voter apathy.

Comment Re:Battery tech on 2500 and 3500 pickups? (Score 1) 229

The hybrid didn't have that much towing capacity, I think it was 3500 to 5000 pounds.

The 1/2, 3/4, and 1 ton truck designations tend to be there for name only, and to deal with some municipal codes (where a 3/4 ton and heavier is a "commercial vehicle", and a 1/2 ton can be a POV.)

However, with most of the truck lines, the 1/2 ton is a different model, and the 3/4 and 1 ton are very similar. For example, the difference between a F-250 and a F-350 from Ford is a leaf spring in the rear and a different GVWR/GCVWR.

The reason for the separation is that 1/2 ton trucks are popular sellers in the US, so for automakers to keep up with CAFE standards, they are made to save weight and MPG, as well as make an attempt at general hauling/pulling.

3/4 and one ton pickups get less MPG... but because they are generally built for commercial/farm use, they tend to be better at constant towing, carrying loads, or both. For example, if one wants to have a truck camper, there are almost zero models (other than tent-tops) available for half-ton models, while a 3/4 to one ton has a fairly wide range of choices, from a basic model to one with three sides, movie chair seating, and a dry bath.

Comment Re:Why is bitcoin popular again? (Score 1) 254

I think part of it is a Robin Hood type of mystique. Someone anonymous having something that bypasses the establishment, similar to being able to sneak on the King's grounds and hunt deer without being drawn and quartered as a poacher... but Robin Hood is most often a myth, and most often, it could be someone like O'Brian from "1984" looking to see who dissents... or a mercenary who would then turn right around and hand the people with the deer to the Sheriff for a reward.

BitCoin does have its place. Right now, it is still in its "cool" stage so it gets used for everything... similar to how radioactive substances were put in bath water and soaps until people realized they got cancer and other unpleasant things by doing so.

Comment Battery tech on 2500 and 3500 pickups? (Score 3, Interesting) 229

GM has tried a decent hybrid system on their 1500 Silverados.

Where a hybrid system would be very usable, would be on the heavier duty pickups like the 3/4 and one ton models:

First, electric motors provide their best torque at near 0 RPM, which is quite useful.

Second, on a rural jobsite, if a PSW inverter is available, this would allow the truck to completely replace a generator in the field. Just plug the welder, saw, or other tools into that and use the onboard battery for that, perhaps running the IC engine to keep everything topped off.

Third, for farms, it might be economical to have the trucks charge and run on batteries, as it saves on fuel.

My question: Would we see this technology being used on the heavier duty series of pickups?

Comment Re:Free is still too expensive (Score 1) 322

I've found 8.1 not that bad. BitLocker can be used to protect the startup drive without a TPM needed, chkdsk can be run on a drive without needing to be dismounted, Storage Spaces, ReFS, and deduplication are quite nice features. Even running BitLocker on drives without needing a key protector is useful, since a format command zeroes out the master volume keys, making data virtually impossible to retrieve. Plus, Hyper-V is a decent hypervisor (tier 1 hypervisors are relatively rare... especially ones which let you use the computer's main console for daily work.)

Only complaint I have is that 8.1 needs the same backup utility that Windows Server 2012R2 has. Technically both are wbadmin utilities, but the server version is extremely useful.

Comment Re:so, the key to amnesty... (Score 1) 322

The ironic thing is that MS has nothing to lose. If they get pirates paying yuan for licenses, MS has a net gain.

MS will always make their numbers. If they fail in every other venture, they just do a price hike for their enterprise software, and they have more than made up for the losses. Most big businesses have made the move in the past five years from SPARC/POWER/PA-RISC equipment to commodity x86 machines, then from hardware to virtualization and VM farms... so it is highly unlikely there would be a move away from MS even if they double their prices for all customers.

Comment Re:Not credit... so your account stays drained (Score 4, Interesting) 95

A friend of mine tried that idea with another service. When he got nailed while on vacation, instead of the bank saying, "sorry, no funds" and stopping transactions, the bank still allowed it and added a hefty NSF charge onto each transaction. Even more of a kicker was the fact that he was out on vacation and didn't realize the negative quad-digit balance until he got back... and by that time, he got stuck in Chex Systems's database, which means you are pretty much fscked credit-wise (or even trying to get a savings account) for seven years.

Comment Not credit... so your account stays drained (Score 5, Informative) 95

Great, another ACH debit mechanism, which means that when a fraudster empties a bank account, it stays emptied because there is nowhere the protection present that a credit card has in place.

I would place this on the heap of "run, don't walk away from", also-ran payment standards like CurrenC... avoid at all costs.

Now, if they had used the Visa/MC credit mechanism, things would be different. Fraud wouldn't completely destroy an end user's bank account.

Comment Re:Its really all about the numbers (Score 1) 93

It would be nice to see some improvements in OS X security though just to keep ahead of the bad guys:

1: A TPM chip that can be used with FileVault 2 for additional protection (so a Mac can be set to ask for a boot password which can be a log longer than the user password.) The TPM chip would also combat brute force attacks. Since all Windows 8.1 certified machines have to have a TPM 2.0 chip, and Apple uses x86 hardware, might as well use this functionality, as it is pretty much built into all new PCs.

2: Apple should look into SED (OPAL SSC 2) functionality for their SSDs.

3: If Apple can't put in a Kensington lock slot, then why not they design something for basic physical security?

The goal isn't to keep away the guy with the blowtorch or plasma cutter, but so that one can be sitting at a table at a library, tie the laptop to the table, go use the restroom and come back, and the laptop would still be there. Yes, one can buy a PacSafe laptop bag that can be chained to an object... but shouldn't a multi-thousand dollar piece of gear at least have a little bit of design for anti-theft, even if it is a small piece of metal that flips out for a lock slot? Thin is in, yes... but Dells, HPs, and other laptop brands have similar dimensions of machines, but they can put a Kensington lock slot on their models.

Comment Re:Paranoia intensifies (Score 1) 93

Yubikey looks interesting, but I've used eTokens in the past (generated a key on a computer with FDE, imported the key into three tokens, then physically destroyed the HDD that had the key on it since it was giving SMART errors anyway), as a way to have physical security of keys (if I have the three tokens, I know the key isn't going anywhere.)

eTokens served me well, although it is impossible to find PKCS drivers for them for newer Windows and OS X versions these days.

They also serve as great ways to counter brute force attacks on a machine with FDE if using PGP's whole disk encryption (no token, no unlock key for the HDD unless one has a WDRT, or whole disk recovery token, stashed away.)

Comment Re:Obvious, once exposed, but not hard to patch (Score 1) 93

Two hashes are better because if one algorithm fails, you have a backup. However, with CPU and I/O time so precious in most cases, two hashes are not really feasible.

Were I going with an algo, I'd be using SHA3 or Skein, something that is as secure as one can get presently.

Slashdot Top Deals

Intel CPUs are not defective, they just act that way. -- Henry Spencer

Working...