Please create an account to participate in the Slashdot moderation system


Forgot your password?
Slashdot Deals: Prep for the CompTIA A+ certification exam. Save 95% on the CompTIA IT Certification Bundle ×

Comment Will likely never work in the USA (Score 1) 145

Congress passed a law requiring US based ITSP's to provide E911 support. If this idea ever went live it would require the same connections to E911. This connection costs money, its not free...

GNU VoIP would have to pay Verizon/Comcast/et cetera to connect to E911 and who is going to pay for that?

Unless congress provides an exemption.. (pfft, yahh)

Comment Re:Nothing new (Score 1, Flamebait) 152

I thought the box near my garbage can that said "Mossberg" on it and the 3 empty 50lb bags of dog food were enough? Is my "NRA Inside means you stay out" sticker on my window just for good measure? Stupid crooks like these guys think they're smarter then they are typically die whimpering.. alone.. on my kitchen floor.. and if they don't die fast enough I'll smother them with the book of Job for good measure. If that doesn't work I think Monday Night Redemption is OK too... Long live the Castle Doctrine!!

Comment Distress Keys and Images (Score 3, Interesting) 500

Some crypto junkies talk about distress keys. Where a user can enter two different keys depending on the situation. The real key loads the real OS. The distress key loads the "fake" OS. There are many ways to detect this in modern experiments. None will work without manipulating low level HD blocking.

Comment ASCII Delimited Security Issues (Score 2, Insightful) 140

Seems to me that ASCII delimited protocols always have these types of issues. Its quite easy to write fuzzers for human readable protocols compared to binary encoded protocols. Too bad these developers don't know how to write good unit tests... This could have been avoided..

Comment Re:P2P and Revered Connections (Score 1) 307

You make an interesting point. The idea of a secure P2P private networks still doesn't sit well with me. The insider threat can still act as the attacker and remove data from their assigned facility. None the less, business requirements "are" business requirements. "Its not the technology that's the problem", its how easy it is to abuse.

Comment Great, why don't we just give them our laptops! (Score 1) 236

So, the idea was to load "sleeper" software by default on all these machines? Is the URL associated with this "service" always at the same memory location? It shouldn't be that hard for a Malware author to check for this BIOS and try to change the address. Who feels like being monitored by criminals? 10% off sale price?

Comment Re:Binary Encoded Messages (Score 1) 254

Maybe, maybe not. When was the last time you hear a telecommunications company update their software within a reasonable time frame? It would just be easier and cheaper for the phones to get updated. So the phone manufactures will blame the telcoms while the telcoms will blame the manufactures. I can see where this is going...

What is now proved was once only imagin'd. -- William Blake