Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Really? (Score 1) 61

the Trojan gets delivered to users via the Rig exploit kit, which uses Flash and Silverlight exploits. The victims get saddled with the malware when they unknowingly visit a website hosting the exploit kit

Say it isn't so! Flash and Silverlight got used as a security hole? Well, I'm truly shoc ... oh, fuck it ... this is exactly why I don't install this shit in my browsers, and why I don't let strange websites run scripts.

Flash has been a gaping security hole about as long as it has existed.

I can only assume Silverlight is little better, but the only browser I have it in is IE on a work machine because we need it to run some in-house software.

But I don't let that browser touch the real internet. Because I don't let IE access the internet unless every other browser has failed.

I'm afraid I no longer have any sympathy when I hear people got hacked via Flash. Because at this point, it's hardly surprising.

Comment Mechanical stresses ... (Score 4, Informative) 198

I seem to recall a news story from a few years ago where they'd tried to put wave power in the Bay of Fundy, where the highest tides in the world are.

OpenHydro -- the Irish company which installed the world's first 1-megawatt tidal turbine in the Bay of Fundy -- and its partner Nova Scotia Power deployed the 10-tonne turbine on the floor of the Minas Passage in November 2009.

Then just 20 days later, all 12 turbine rotor blades were destroyed by tidal flows that were two and a half times stronger than for what the turbine was designed.

Basically, the tides destroyed the machinery in three weeks or so.

So, yes, there's plenty of mechanical energy to harvest. The problem is that it might also be stronger than the stuff you've built.

Comment Re:Gotta say... (Score 1) 122

OK, now let's run with that analogy, it's close enough for illustrative purposes.

So, 1/3 of all cars are exposed to this radiation which weakens seatbelts anyway.

Now, a small proportion of all cars, we could go by model but let's go by circumstance instead... Maybe let's say 98% cars used for off-roading are exposed to this radiation.

So now, instead of 33%, it's what, 34%, 35%? If this is an issue, then the 33% is also an issue and we should be doing what we an to eliminate that. Sure, it's not ideal if you're a farm worker or an off-roader (in the car analogy case) but many jobs and activities have negative aspects.

I just think that statistics are being used here to generate a story when there isn't one. "Farm workers have increased risk of infection" just doesn't have the same ring for pulling in the $$$

Comment Re:One day, someone will explain it to me. (Score 2) 115

But most of all, if the product and implementation have security flaws that have been exploited, don't buy them.

I rank that statement as about as intelligent as "if the food is contaminated, don't eat it". It's trite, ignores the problem, and acts like somehow consumers would actually know this.

The reality is, by the time it's known to have happened, and they actually tell people about it, it's too damned late.

Given the terrible approach most of these companies have to security, the fact that they hide the fact that they've been exploited, or are otherwise unaware that they've been exploited ... I sure as hell wouldn't trust them to know, or notify us if their security proves to be crap.

I just assume their security is crap from the beginning, because it usually is.

Slashdot Top Deals

"I've seen it. It's rubbish." -- Marvin the Paranoid Android

Working...