Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Alternatives (Score 5, Insightful) 88

Personally, I would like see one of two things happening:

1. Break up Comcast and make the new pieces share infrastructure (so they would have to compete with each other).
2. Allow the merger, but with the stipulation that laws would be put in place to spur competition. Such as allowing municipalities to bulid their own network (like Chatanooga).

While few people actually have a choice, I'm still left wishing I didn't have to choose between AT&T & Comcast.

Comment Re:13 to 15 deaths (Score 1) 518

What I was trying to communicate was let's not think of it in terms of "if it saves one life", but in terms
of "if it saves the life of someone I know" (which would have been our case).

I think the argument would have been much different
if we were trying to ban cars rather than changing something small to make it a little safer.

Comment Re:13 to 15 deaths (Score 1) 518

Hopefully Intelligent Transportation Systems (https://en.wikipedia.org/wiki/Intelligent_transportation_system) will be mature enough to reduce those accidents/deaths as well. But for now, we will have to be content with 15 - 30 lives.

On a personal note, a close friend of ours lost their child to an accident that could have been avoided with a rear-view camera. Seeing all the pain that they went through, it makes me wish this existed back then.

User Journal

Journal Journal: Running Oracle DB modules in Kali Linux

Apparently, there is some manual work that needs to be done before one can run Oracle DB modules in Metasploit under Kali Linux. This is because of proprietary libraries from our dear Oracle.

Here are the instructions that worked for me:
http://blog.infosecsee.com/2013/08/how-to-get-oracle-support-in-metasploit.html

User Journal

Journal Journal: TP-Link wr703n minipwner

So I followed the instructions here:
http://www.minipwner.com/
to create a minipwner box using a TP-Link mini router.

However, using an older openwrt image would break the ones with the 1.7 firmware.
Here is the fix:

Unbrick wr703n wifi router
http://forums.openpilot.org/blog/52/entry-92-unbrick-wr703n-wifi-router/

Comment Re:SGI was doing this a looong time ago... (Score 1) 230

+1 to the parent. I used to work at SGI and, as you said, this is old news. One small note, unless rackspace is also doing something different, I believe you are talking about Rackable Systems intead of Rackspace.

This might be the first time Intel is doing it with their HW though. If I recall correctly, SGI did it with their MIPS systems.

Comment Re:Attitude (Score 2, Insightful) 165

One advantage of changing your default SSID a vanilla install is that it makes it harder to crack.
The SSID is used as salt in the encryption mechanism.

Here is an article that describes it in more detail:
http://netsecurity.about.com/od/secureyourwifinetwork/a/WPA2-Crack.htm

Plus... having a goofy SSID is fun :) Mine is "Dialup".

User Journal

Journal Journal: Wrote my first snort rule!

Wrote my first snort rule! It detects if someone is trying to capture credentials via the auxiliary/server/capture/smb module.
More information about this type of attack is here:
http://www.packetstan.com/2011/03/nbns-spoofing-on-your-way-to-world.html;

Wireless Networking

Submission + - Your Neighbor's WiFi Wants You to Vote for Romney

Hugh Pickens writes writes: "Megan Garber writes that wireless routers have become the lawn signs of the digital age particularly in large apartment buildings, where almost every unit has a unique wifi network that will be detected in turn by all the other unique wifi networks, SSIDs can be a cheeky, geeky way to broadcast messages to your immediate neighbors. Most of us keep it simple with "275_Elm_Street," "Apt23," or "my_network" but some get more creative with names like: "Apt112IHaveYourMail," "PrettyFlyForAWiFi," or "WeCanHearYouHavingSex" — a great way to freak out your annoying neighbors without hiding in their bushes or peeping in their windows late at night. Now the team at OpenSignalMaps, which maintains a database of geolocated wifi access points, analyzed the data they've collected about wireless routers to see whether wifi names are "being used to fly political colors" and have found, globally, 1,140 results for "Obama" and an additional six for "Romney" — an indication not necessarily of Romney's popularity relative to the president's, but of the attention that four years as president can confer. "There's something uniquely contemporary and incredibly old-school about that kind of broadcasting: It's messaging meant only for your immediate neighbors," writes Garber "It's both intimate and isolating, both invasive and impersonal, both omnipresent and invisible, both passive and aggressive." Which makes them a good metaphor for political discourse as it looks in the US today with its particular mix of intimacy and impersonality. "The politicized network names are like lawn signs for people who don't have lawns.""

Comment The cost of DRM (Score 0) 5

Why don't you release a 'not for commercial use' copy w/o the spying. That will prevent it from being distributed on P2P sites. The added benefit is that people would learn to use and love your software. Eventually, they can be your marketing arm and help convince management to purchase the software for business use.

Also, as you might be aware, developing DRM is very costly. The cost of DRM is expected to reach $9bln this year: http://drm.info/node/93

Linux

Submission + - Apple orphans Linux CUPS features- handicaps open source printing

donadony writes: "CUPS, is the printing standard that open source projects have used successfully to convert desktops and computers to become printer servers, allowing plug-in, modular type of printing. However, now Apple after it acquired it from its developer Michael Sweet, at Easy Software Products, in 2007, has chosen to abandon certain Linux exclusive features, and continuing with popular Mac OS X features.The changeover is being attempted by Appleto set new printing standards that will not require ‘drivers’ in the future. However, the journey in between from the present ‘driver-only’ printers that communities across the world are engaged to Apple’s printer-utopia, just got tougher and essentially involves more work for Linux users."
Government

Submission + - Whitehouse petition on JotForm (whitehouse.gov)

Yoik writes: There is now a petition up on Whitehouse.gov asking for an explanation of the JotForm apparent idiocy. It will probably get a "We can't comment..." but is worth a try.
Technology

Submission + - Rio Tinto bets on future of automated mining (reuters.com)

An anonymous reader writes: Global miner Rio Tinto has accelerated a move toward automation, unveiling a $518 million (AUD) plan to pioneer the use of driverless trains in Australia and increasing its bet on a future where machines rather than miners do most of the work.

The world's no.2 iron ore miner, which already has driverless trucks, plans to run fully automated trains across its 1,500 km (930 mile) iron-ore rail network in northwest Australia from 2014, to help boost output 60 percent by 2015.

DRM

Submission + - Copy protection advice for ~$10k software 5

An anonymous reader writes: Hi /., I'm a long time reader and would like some advice.

I'm part owner of a relatively small video editing software company. We're not yet profitable, and our stuff turned up on thePirateBay recently. Some of our potential paying customers are using it without paying, and some non-potential customers are using it without paying. Our copy protection isn't that tough to crack, and I'd rather see the developers working on the product than the DRM (I'm convinced any sufficiently desirable digital widget will get copied without authorization).

Would it be insane to release a 'not for commercial use' copy that does some spying and reporting on you, along with a spy-free version for ~$10,000? I feel like that would reduce the incentive to crack the paid version, and legit businesses (In the US anyway but we're trying to sell everywhere) would generally pay and maybe we could identify some of the people using it to make money without paying us (and then sue the one with the biggest pockets). What would you do? I respect the collective wisdom of ./; thanks for your time!
Privacy

Submission + - Anonymous Cowards, Deanonymized (33bits.org) 1

mbstone writes: Arvind Narayanan writes: What if authors can be identified based on nothing but a comparison of the content they publish to other web content they have previously authored? Naryanan has a new paper to be presented at the 33rd IEEE Symposium on Security & Privacy. Just as individual telegraphers could be identified by other telegraphers from their "fists," Naryanan posits that an author's habitual choices of words, such as, for example, the frequency with which the author uses "since" as opposed to "because," can be processed through an algorithm to identify the author's writing. Fortunately, and for now, manually altering one's writing style is effective as a countermeasure.

Slashdot Top Deals

"If it ain't broke, don't fix it." - Bert Lantz

Working...