Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:How many ways are there to do simple things? (Score 1) 694

The system we used here was actually smart enough to not flag common idioms like this, and also still flag cases where only the variable names and formatting had been changed. Also, our assignments were usually complex enough that there would be enough variation, anyways. Most things about our automated hand-in system sucked, but the plagiarism detector wasn't one of them. If you're curious: https://www.ipd.uni-karlsruhe.de/jplag/
Security

Stealing Data Via Electrical Outlet 208

Ponca City, We love you writes "NetworkWorld reports that security consultants Andrea Barisani and Daniele Bianco are preparing to unveil their methodology at the Black Hat USA conference for stealing information typed on a computer keyboard using nothing more than the power outlet to which the computer is connected. When you type on a standard computer keyboard, electrical signals run through the cable to the PC. Those cables aren't shielded, so the signal leaks via the ground wire in the cable and into the ground wire on the computer's power supply. The attacker connects a probe to a nearby power socket, detects the ground leakage, and converts the signal back into alphanumeric characters. So far, the attack has proven successful using outlets up to about 15 meters away. The cost of the equipment to carry out the power-line attack could be as little as $500 and while the researchers admit their hacking tools are rudimentary, they believe they could be improved upon with a little time, effort and backing. 'If our small research was able to accomplish acceptable results in a brief development time (approximately a week of work) and with cheap hardware,' they say, 'Consider what a dedicated team or government agency can accomplish with more expensive equipment and effort.'"
The Courts

Groklaw Summarizes the Lori Drew Verdict 457

Bootsy Collins writes "Last Wednesday, the Lori Drew 'cyberbullying' case ended in three misdemeanor convictions under the Computer Fraud and Abuse Act, a 1986 US Federal law intended to address illegally accessing computer systems. The interpretation of the act by the Court to cover violations of website terms of service, a circumstance obviously not considered in the law's formulation and passage, may have profound effects on the intersection of the Internet and US law. Referring to an amicus curiae brief filed by online rights organizations and law professors, PJ at Groklaw breaks down the implications of the decision to support her assertion that 'unless this case is overturned, it is time to get off the Internet completely, because it will have become too risky to use a computer.'"
Linux

Hardy Heron Making Linux Ready for the Masses? 1100

desmondhaynes writes "Is Linux ready for the masses? Is Linux really being targeted towards the 'casual computer user'? Computerworld thinks we're getting there, talking of Linux 'going mainstream 'with Ubuntu. 'If there is a single complaint that is laid at the feet of Linux time and time again, it's that the operating system is too complicated and arcane for casual computer users to tolerate. You can't ask newbies to install device drivers or recompile the kernel, naysayers argue. Of course, many of those criticisms date back to the bad old days, but Ubuntu, the user-friendly distribution sponsored by Mark Shuttleworth's Canonical Ltd., has made a mission out of dispelling such complaints entirely.'"

Slashdot Top Deals

Solutions are obvious if one only has the optical power to observe them over the horizon. -- K.A. Arsdall

Working...