Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:VoIP -- problem NOT solved (Score 2) 62

VOIP will protect the data if the content is properly encrypted, but headers and locations are still exposed. The phone can still be identified and located, which is already great information for the police. The IP addresses can be tracked in the header and voila, pen-register services without a warrant. And if VOIP is not encrypted, or if the encryption is weak, even the content can be accessed.

Comment Re:Join the army (Score 2) 789

Another requirement is to pass physical and medical tests. The Legion won't take you if you have poor eyesight, weight too much, or are otherwise unfit. The mythical slashdot readers who spend their days snacking in front of the computer might have a hard time getting accepted.

On the other hand, if you are accepted in the Legion, you will have a fun time in places like Afghanistan, Djibouti or the Ivory Coast, to name a few. If you goal was to escape being shot at, you may want to reconsider.

Comment Re:This is getting stupid. (Score 1) 94

ICANN was supposed to managed the legacy of Jon Postel. Instead, it is managing the interests of a coterie of Internet parasites. As the parent said, "the new top-level domains (and some of the existing top-level domains) are basically a money grab," effectively allowing the new registrars to levy taxes on trademark owners. Good old fashion blackmail, as in "nice trademark you have here, you would not want something bad to happen, like having it managed by a porn site or a competitor, what about getting some protection?"

Comment Re:Huh? Not random! (Score 1) 312

Randomness will produce everything indeed. But this experiment is not random. The monkeys are not *producing* the work of Shakespeare. They are *reproducing* it. The master program already know the work, and has it programmed in its tests. There is a big filter here: take this random bit, and decide whether it is "part of Shakespeare's work." Not quite the same as letting the monkeys type a full page, and then have readers decided whether this is "as good as Shakespeare." Prior knowledge killed Schrödinger's Cat!

Comment Third parties make that untenable (Score 1) 90

This is a vexing problem because not all patent holders participate in the standard making. If a company participates in the standard making, the standard organization has leverage: guarantee that others can use your patents under reasonable conditions, preferably free, or we will not consider your contributions. But if a company does not participate, the standard making organization has no leverage at all.

Consider for example what happen to Wi-Fi. The IEEE has a fairly detailed patent policy, and the Wi-Fi standards have been very successful. But after millions of cards were sold, CSIRO came out of the blue and asserted a patent on indoor OFDM that they said covered Wi-Fi. The resulting lawsuits have costed millions.

Comment Re:Finally (Score 1) 200

Microsoft's analysis is published at: http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Worm%3AWin32%2FMorto.A

The list of password that the worm tries is interesting. Apart from the obvious abc123 and the like, the worm tries "RavMonD" and "zhudongfangyu". Is that a clue? Some Chinese hommage to the bazar?

Comment Challenge respose is dead, almost. (Score 1) 615

The problem with NTLM has been known for some time, but it is not just NTLM. It is in fact any challenge response protocol. Check this slide deck presented at the IETF in 2005: http://www.huitema.net/talks/ietf63-security.ppt. The punch line is simple: don't rely on challenge response protocols! If the attacker can see both the challenge and the hash, and if the password can be remembered by the user, it will probably be cracked.

Comment I was learning that in the 60's (Score 1) 741

The latin and greek questions are actually pretty simple. Latin and Greek were still fairly common options in French high school in the 60's, and I studied all that. The Latin reference text here being Caesar's "De Bello Gallico," which we were studying in the 7th or 8th grade. The Greek reference text is Xenopho's Anabasis, which we were studying in the 9th or 10th grade. Both Caesar and Xenopho are considered "easy" - they use fairly direct language and constructions. Similarly, the grammar questions correspond more or less to your first or second year of language study. The references to roman and greek history, e.g. Actium, Pharsalis, Jugurtha may feel fairly obscure now, but are in fact part of the basic curriculum of "Ancient History." Bottom line, the test was not very hard for a high school who paid attention in class. I was surprised to see that they would provide the translations of the words as part of the question. We did not have that available when passing exams.

Comment Re:Where are the torrents? (Score 1) 348

I was not so much think of getting the bits from fellow users as getting the bits from several Akamai servers -- or similar. Instead of blindly following some dumb "closest IP" rule, the download could test a couple of candidate servers and get the bits from those with the best bandwidth -- much like torrents do.

Comment Where are the torrents? (Score 3, Insightful) 348

Load balancing based on the DNS resolver is so 1999! Even when it works, it works by chance, and does not test the actual speed between your PC and the potential servers. Compare that to Bit Torrent, which actually tests the speed of the downloads. You really wonder why Apple, and Akamai, would not use some kind of torrent technology!

Comment Re:Dual stack failed? (Score 1) 320

Quoting an AC to start the conversation, penning a lead with bold statements that are not much supported in fact... Slow news day, probably.

Pretty much every PC, server or even smart phone OS ships with dual stack. Enable IPv6 on your home gateway and poof, IPv6 in your PC lights up. AT the same time, your PC can keep using IPv4 for non IPv6 web sites, or for that old Ethernet enabled printer in the basement. It works pretty much as expected. Not having unique IPv4 addresses does not change anything to the question -- IPv4 goes through NAT, IPv6 goes direct.

Comment Re:Why engines are falling apart - fiberglass tank (Score 1) 586

Ethanol is a big [problem for boats that often have fuel tanks made of plastic or fiberglass. Some of the plastic gets dissolved by the ethanol, and then ends up clogging various engine parts. The Boat US association has done extensive tests of that: http://www.boatus.com/seaworthy/fueltest.asp#results. The real worse case comes if ethanol is mixed with diesel, transforming a basically safe fuel into one that can explode. Really not a good idea.

Comment Re:In the wake of Thursday... (Score 1) 402

It is not so much "the UN" as "a group of authoritarian governments." The Internet enables freedom of speech. The Saudis kingdom and the Chinese communist party, to give two examples, don't like that. They have tried very hard to build their own nation wide firewalls, in the name of protecting religion or political harmony. But firewalls cannot control what happens outside of their borders.

They would go under the name of "internet governance" and argue against "US domination", but he dream of dictatures is clear. In addition to control what can be written within the borders of their countries, they would very much like to extend censorship world-wide.

And if it can creates a few more cosy positions for international bureaucrats, the UN will love it!

Comment Let's says that this is really idiotic! (Score 2, Informative) 332

There are so many ways this suggestion is wrong, it is not even funny.

TFA says WPA2 negotiates unique encryption keys with every computer that connects to it. This means you and I cannot spy on one another's traffic even when sharing access on the same access point. That's true, but anyone who can listen to the exchange and know the shared key will be able to learn the key. Plus, there is a very neat man in the middle attack.

Suppose that I am an evil sheep herder near a Starbuck cafe. Nothing prevents me from broadcasting a Wi-Fi beacon that announces that I am running a Starbuck access point. Here comes the sheep, who is really happyto see that the connection is secure. Hey, he used WPA2 and the "free" password, his packets are encrypted. Except they are all coming to my laptop. Oops!

Slashdot Top Deals

Happiness is twin floppies.

Working...