Follow Slashdot stories on Twitter


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Conference room chairs? (Score 0) 369

by AgtSkippy (#35734672) Attached to: Software Firm Looking To Hire Naked Coders

Just think, somebody's naked butt would get wiped on that cloth ten times per day. That's a deal-breaker right there.

Actually naturists have a strict towel policy. (Not unlike hitchhikers.) You always have your towel to sit on. Problem solved just by enforcing a "graphic side down" towel sitting policy.

Comment: Re:Wow! (Score 1) 154

by AgtSkippy (#32310424) Attached to: Installing Android 2.2 "Froyo" On the Nexus One
I think maybe theres a slight chance I understood what you were saying... Was that sarcasm in the first paragraph? "Waiting three weeks for a simple update of resorting to manual install, not even a yum. On a phone that was bought last week? Sign me up!" Three horrible weeks OMG. I'm just glad google's around to keep the OHA from falling to the tragedy of the commons, even if it means my Droid will take a month or longer (I'm expecting 3) to get the updates announced this week. "Just like the MS" Ah yes, the microsoft... how we all loathe the microsoft.

+ - New attack breaks WPA WiFi crypto in 1 minute->

Submitted by
Trailrunner7 writes "First it was WEP, then TKIP and now WPA. A pair of Japanese researchers have developed a new technique for decrypting wireless packets encrypted with WPA , the most common wireless encryption protocol, in about a minute. The attack is an improvement on an existing technique and makes it simple for attackers to sniff and then crack supposedly secure wireless traffic. reports: "The attack builds on the work done earlier by another pair of researchers who found a way to break the WPA encryption protocol that is used on many WiFi routers. Known as the Beck-Tews attack, the method involved making minor changes to packets encrypted with TKIP, a predecessor to WPA, and then sending the packets back to the access point. The vulnerability was in the way that the checksum was used. However, the attack required a significant amount of time to execute, as much as 15 minutes, making it somewhat impractical to execute in the real world. The newer attack, developed by Toshihiro Ohigashi and Masakatu Morii, improves on the Beck-Tews attack and lowers the amount of time needed to execute it to about one minute.""
Link to Original Source

+ - Three Great Social Media Job Searches->

Submitted by
techlifemashup writes "They say don't put all your eggs in one basket, and this way of thinking couldn't be more true when it comes to applying for jobs online. Searching for jobs on the internet has become the standard for job search and with good reason. I don't think any of us need a reminder of what it was like applying for a job pre-internet days; no thank you! Job searches continue to be on the rise and social media sites continue to flourish with ever growing communities. So it seems like a good time to highlight three great ways to use social media sites to search for your next job, whether it be from an employer or through freelance ventures."
Link to Original Source

Is the Federal Government the Most Interesting Tech Startup For 2009? 148

Posted by ScuttleMonkey
from the get-stuff-done-czar dept.
With all of the recent focus on technology and the promises to continue "getting stuff done" by the US government, Techdirt's Masnick suggests that they might just be the most interesting tech startup to watch this year. "But, of course, talk is cheap (especially in politics). And, while Chopra (and Vivek Kundra, the government's CIO) both actually have a nice track record of accomplishing these sorts of goals in their past jobs, the proof is in what's actually getting done. We'd already mentioned at least one success story with the IT dashboard at, but can it continue? I have to admit, a second thing that impressed me about Chopra was that, even with such a success, he didn't focus on it. The fact that he got together such a site in such a short period of time is impressive enough, and while he mentioned it in his talks, most of them were much more focused not on what he'd already done, but on what he was going to do — and the plans all seemed quite achievable.

"Mach was the greatest intellectual fraud in the last ten years." "What about X?" "I said `intellectual'." ;login, 9/1990