Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Requires local access (Score 1) 210

this will be easily stopped by adding a filename prefix or suffix

No it won't. It is still easy to make collisions with a known prefix or suffix. You would have to include a random component.
Even if that was a feasible workaround, it's hardly a common best practice, nor should it be.

There goes this script kiddie's

He discovered this vulnerability himself, and wrote the attack code; he is by definition not a script kiddie. Never mind that he's a professor and published cryptographer.

while about experimental software not being perfect.

This has nothing to do with being experimental software. This is not a bug, it is a weakness in the design. Furthermore, the bad behaviour will not manifest by accident - you have to deliberately provoke it.
This is the type of problem that isn't fixed before someone finds and reports it -- like Junod did.

Please cease your inane babbling.

Microsoft

Microsoft Granted Patent For Augmented Reality Glasses 89

another random user writes with an excerpt from the BBC about Microsoft's vision for augmented reality glasses: "A patent granted to the U.S. tech firm describes how the eyewear could be used to bring up statistics over a wearer's view of a baseball game or details of characters in a play. The newly-released document was filed in May 2011 and is highly detailed. ... Although some have questioned how many people would want to wear such devices, a recent report by Juniper Research indicated that the market for smart glasses and other next-generation wearable tech could be worth $1.5bn by 2014 and would multiply over following years." Noticeable differences from Google's version: two lenses, a wrist computer, and wires.

Comment Re:Brilliant references! (Score 4, Funny) 197

Also be sure to check out the brilliant paper recently published by Hakin9 in their issue on Nmap.

The authors detail the working of their DARPA Inference Cheking Kludge Scanner (DICKS), and cite such prominent references as
Z. Sun, "Towards the synthesis of vacuum tubes," Journal of Concurrent, Extensible Technology, vol. 84, pp. 1-19, Feb. 2005.
C. Hoare, J. Wilkinson, and D. Ritchie, "Contrasting Scheme and Internet QoS using SluicyMash," Journal of Flexible, Omniscient Epistemologies, vol. 20, pp. 154-194, Feb. 2000

Some excerpts:

"Obviously, event-driven modalities and web browsers are based entirely on the assumption that extreme programming and digital-to-analog converters are not in conflict with the deployment of massive multiplayer online role-playing games."

"We show our method's real-time evaluation in Figure 1. We consider a framework consisting of n flip-flop gates. Such a claim might seem counter intuitive but is derived from known results. Next, NMAP does not require such a theoretical emulation to run correctly, but it doesn't hurt. This seems to hold in most cases. We use our previously enabled results as a basis for all of these assumptions. This seems to hold in most cases."

"Figure 1.3: The 10th-percentile latency of NMAP, as a function of popularity of IPv7"

Android

Universal Android Laptop Dock: Microsoft Nightmare, Or Toy? 262

ozmanjusri writes with this story from PC World: "A company that makes keyboard docks has announced a laptop-like peripheral that uses smartphones for processing and storage. Since many Android and Apple phones have multi-core processors powerful enough to deliver laptop-level performance, they only lack usable screens and keyboards to be productive for most office work. ClamCase believes their 13.3-inch 1,280 x 720 ClamBook with keyboard, multi-touch touchpad, and dedicated Android keys will make up for the lack, and turn smartphones into fully-functional laptops. A device like the ClamBook could be a real game-changer for the computer industry. If it succeeds, peripheral makers could build docks which would allow any monitor, keyboard, mouse and storage to be powered by any Android phone. It's a combination which would make BYOD offices very tempting for the corporations who are the Windows/Office combination's remaining cash-cow." I only wish the company would license the idea as well to established makers, so otherwise conventional laptops could gain the ability to easily become advanced phone screens, too.
Google

Sergey Brin Demos Google Glasses Prototype 122

MojoKid writes "Folks have been clamoring for more on Google's Project Glass and Sergey Brin — one of the co-founders of Google — is now burying himself in the R&D department associated with its development. Recently Brin appeared on 'The Gavin Newsom Show' with the prototype glasses perched on his face. The visit was actually a bit awkward as you can see in the video, as it's a lot of Brin and Newsom describing what they're seeing via the glasses with no visual for the audience. However, Brin dropped a bomb when he stated that he'd like to have the glasses out as early as next year."
Censorship

Judge Who Ordered Pirate Bay Censorship Found To Be Corrupt 104

TheGift73 writes "TorrentFreak reports that 'This week yet another court order was handed down in Europe with the aim of censoring The Pirate Bay. The ruling forbids the Dutch Pirate Party from not only running a direct proxy, but also telling people how to circumvent an earlier court ordered blockade. However, according to Pirate Party founder Rick Falkvinge, the judge in the case has a history of corruption relating to another file-sharing case he presided over in the Netherlands. The Court of The Hague in the Netherlands has been particularly busy this work with Pirate Bay-related cases.' Falkvinge wrote, '... not only was the plaintiff and judge personally and closely acquainted, the plaintiff in a controversial copyright monopoly case was running a commercial anti-piracy outfit together with the judge in the case. Money was involved. Commercial interest was involved. The judge was, as it appears from this brochure for the quite expensive course, getting money. Shortly after the case. In a directly related matter together with the plaintiff. That makes the judge not only corrupt, but textbook corrupt.'"

Comment Re:Waiting for ad.doubleclick.net ...zzz... (Score 1) 275

Some web browsers just render the page assuming that included scripts won't call document.write(), and then render the page again when the scripts have loaded, in case they do.
I think Chrome does this, and Opera has it as an experimental option in opera:config ("Delayed script execution").
It speeds up things a lot, especially if you aren't blocking ads. Many sites spend most of their loading time just waiting for ad servers.

There ought to be an attribute or something that webmasters could use to explicitly request XHTML semantics... Something like

Comment Re:Some Discrepancies with Your Bitching (Score 1) 194

Tying NaCl to a specific architecture was a very bad move in the first place, and PNaCl doesn't help a lot.
LLVM bitcode isn't intended to be a platform-independent transport of code - it isn't frozen, so you'll have to tie yourself to a specific LLVM version, while LLVM is still improving a lot with each release.
Neither is it very portable - it isn't endian independent, and it reflects details of the ABI, which means you can't even portably call C functions. It's really just a compiler IR.

See also e.g. this post.

I can certainly see reasons that you'd want to tie a VM to the browser instead of being stuck with ECMAScript for every situation, but you need to bring a real, portable VM to the table. LLVM isn't it, and the idea of putting architecture dependent binaries on the web is patently ridiculous, as should be obvious just from the time NaCl spent as x86 only. Imagine if web site owners had to recompile their site for every new architecture that became supported. "This site is best viewed on a x86"

Comment Re:So why do I trust the notaries? (Score 1) 127

*Ideally* In the CA relationship, you would at least have assurance that the site being validated worked explicitly with a trustworthy CA. In the reputation system, the site being validated didn't work with anyone and has no way to authoritatively 'tell' someone they got compromised.

A CA could be one such authentication step. Consider a network of independent notaries to which the CAs could securely push public certificates and tie them to a domain name.
Now you have to compromise the CA (or a sufficient number of the notaries, some perhaps run by the CAs themselves), and you have to perform the MITM upstream, not downstream, so the perspectives-like notaries will still see a consistent view.

Comment Re:So why do I trust the notaries? (Score 2) 127

-DNSSEC secured results enumerating the CAs the site selected to secure the domain. If DigiNotar signs yourdomain.com and your DNSSEC says 'Thawte', then there is an issue.
-Multiple CAs signing a certificate. If you have 3 or so CAs (all listed in your DNSSEC record of course), then compromising all three would be required to compromise your security.

What does this gain you over storing the cert signature itself in DNSSEC?

Since the people attesting to the authenticity of a certificate have zero 'special' interaction, it remains feasible to fool them.

Nothing prevents a notary from taking extra steps to verify the authenticity of a certificate. That is one of the advantages of the concept: other methods of authentication can be added in a modular way.
In some ways the notary system gives you the security of the strongest of the notaries you trust, and the CA system gives you the security of the weakest of the CAs you trust.

Comment Re:So why do I trust the notaries? (Score 2) 127

if someone MITM's very close to you (think the people who own/control the AP you're connecting through at a hotel), they could MITM *all* of the notaries as well

The communication with the notaries is in all likelihood encrypted and signed with predistributed keys, similar to CA certificates today. That's not a large problem, because ultimately you have to trust the software you are running anyway.
That still retains all the benefits over the CA system that you mention; you get multiple points of trust that all have to be compromised, and if one is compromised you can distrust it with minimal consequences.

Comment Re:Extortion (Score 1) 186

We do have some idea.

We know that Microsoft is approaching this in pretty much the most scummy and mafia-like way possible, using strong-arm tactics to make companies sign NDA agreements to prevent information leaking out that would allow other companies to protect themselves ahead of time.

We know that the patents that we have seen, mostly thanks to B&N having some balls and not falling for the MS's cheap tricks, are dubious and certainly not worth what Microsoft is demanding, given that you can licence Windows 7 for about the same price.

I personally know that I'll do my best to not give MS a dime of my money, though they sure know to take their rent from PC and phone manufacturers, and in fact I'm glad this story came up, because I was about to inadvertently buy some of their hardware, but come to think of it I won't, because who wants to subsidize shit like this?

Robotics

Paralyzed Patients Control Robot With Brain Waves 49

sciencehabit writes with a writeup of a French research paper in Science. From the article: "They're not quite psychic yet, but machines are getting better at reading your mind. Researchers have invented a new, noninvasive method for recording patterns of brain activity and using them to steer a robot. Scientists hope the technology will give 'locked in' patients ... the ability to interact with others and even give the illusion of being physically present ... with friends and family." The really interesting thing here is that people who had not used their limbs in years were able to learn how to control the robot (as well as the control group did) after being trained only an hour a week for six weeks.

Comment Re:Also iD Tech 4 blows (Score 1) 172

To be honest, while id Tech 5 with its heavy focus on textures is an interesting experiment, I'm looking a lot more forward to id Tech 6. It looks like it will use raycasting on sparse voxel octrees, same as the Unlimited Detail guys. That will by all accounts amount to a generational leap in graphics, doing for geometry pretty much what MegaTexturing does for textures.

John Carmack has been talking about voxels since 2008, but the hardware weren't up to it back then. Apparently they're doing research on id Tech 6 now.

While the Unlimited Detail guys have made some promising demos using static geometry with static lightning, I believe rendering a more dynamic game world with animation and varying lightning remains an unsolved problem. I can't wait to see what Carmack and his team can come up with.

Slashdot Top Deals

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...