Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Speeding not always an issue (Score 1) 335

There's a difference between accelerating to a similar speed as the traffic you're joining and accelerating so that you wheel-spin past a single vehicle. It would take a bit of algorithm tuning to get it right, but I imagine that certain sections of road (especially junctions) require quick acceleration. There's also sections of road that you don't want to be accelerating ferociously e.g. before blind corners.

Comment Re:Speeding not always an issue (Score 2) 335

If you're going to be using "science", then a good first step would be investigating the correlation of accidents and speed. Speed by itself is not a reliable indicator of the recklessness of the driver.

I'd prefer more intelligent sensors/cameras that penalise aggressive acceleration (i.e. sudden rate of change of speed in close proximity of other road users) or can detect lack of awareness of the driver.

Comment Re:Also affects Linux - patch now! (Score 1) 115

As it's stateless UDP, there's not much of a connection to the proper server. All you need to do is send the appropriate source and destination ports and IP address and you're good. It would involve waiting for an outgoing request and then sending spoofed packets that look like they are a reply. The one with the right ports will be allowed through the firewall as it looks like a reply.

Comment Re:Also affects Linux - patch now! (Score 1) 115

Okay, not an open port, but if you request a time update wouldn't an attacker be able to respond with a spoofed malicious packet? By sending out a request, the (stateful) firewall will usually allow a response back. I'm not an expert, so I'd be interested to see if someone more knowledgeable could explain that in more detail.

Comment Also affects Linux - patch now! (Score 5, Informative) 115

This is a major bug in NTPd, so if you're using it on Linux, you'll want to patch it too (or switch to openNTP which isn't affected). The big problem is that it can be exploited with a single (specially crafted) UDP packet, so it's easy for malicious actors to probe lots of machines with very little overhead.

Comment Also affects Linux - patch now! (Score 1) 1

This is a major bug in NTPd, so if you're using it on Linux, you'll want to patch it too (or switch to openNTP which isn't affected). The big problem is that it can be exploited with a single (specially crafted) UDP packet, so it's easy for malicious actors to probe lots of machines with very little overhead.

Slashdot Top Deals

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...