Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:A fool and his money.... (Score 1) 180

Pretty much every Nexus phone has had a battery that is easy to replace, for levels of easy varying from "you can do it with one hand" to "you need a fingernail and a common Philips screwdriver". Sure, the Nexus 5 and 5X batteries aren't officially "user replaceable", but they're about as hard to replace as 4 AA cells in an old toy with a battery lid with screws. It takes more effort to replace the CMOS battery in a random PC than to replace the battery in a Nexus 5 or 5X.

Comment Re:Affects me, the last two companies I worked for (Score 4, Informative) 60

Only if you don't use an SSH agent. If you use an agent to store your keys, they are safe. Even if your keys leak because you're not using an agent, they can only leak in encrypted form (you use passphrases, don't you?). When the vulnerability is about to be triggered, a strange message (connection suspended, press return to resume) appears and must be dismissed (if you ^C at that point, you are safe).

In otherwords, this is a panic situation only for people using non-passphrased keys and no SSH agent. You also have to accept a prompt that is not normal and should raise red flags before the vulnerability can happen. People who fit that description probably have other security problems to worry about.

More realistically, you should patch your servers if you use any kind of SSH-based automation (e.g. where one master server uses SSH to automate tasks on slaves), since this allows an attacker to escalate from a target machine to the automation machine. But that requires first compromising the target, so it is not an emergency situation (unless your machines are already compromised and you don't know it, in which case, again, you have bigger problems).

Comment Re:My little pony (Score 4, Informative) 285

That animated content benefits from 10-bit encoding is true. That has less to do with hard edges and more to do with banding artifacts on flat shaded areas - TFA actually goes into that, mentioning soft focus and fog as producing hard-to-encode gradients, the same kind of gradients present in many kinds of animation and which would benefit from using 10-bit mode. Hard edges do tend to be hard to encode with typical video codecs too (but 10-bit probably won't help you there).

However, My Little Pony isn't a particularly good example, because it's full of completely flat areas that are trivial to encode. It might take a higher quality setting than you might expect to look crisp, but at the end of the day, you're going to be spending fewer bits per frame on it than on The Avengers. Animation has its own set of encoding tradeoffs/challenges (which is why good encoders have presets tuned for animation).

Comment Re:IPsec or simple ssh like tunneling (Score 5, Informative) 136

If the camera is HTTP, just reverse-proxy it with something like nginx into HTTPS, and let it handle basic HTTP authentication. HTTPS should be as secure as most VPNs in practice, and the authentication at the proxy level stops pre-authentication exploits against the camera. Now that Let's Encrypt is a thing you can even get a real cert easily. The security company doesn't have to know that you're doing this; you give them HTTPS URL and off they go.

Comment Put some effort into it (Score 0) 100

This post reads as:

"The thing I want doesn't do everything I want, but I can't be bothered to actually define what it is I actually want."

Well, put some effort into it. How are we supposed to know how to satisfy you if you don't even know what you want?

This shows such a lack of effort that I'm amazed you even managed to get your question posted on slashdot.

Comment Re:Memory like brain structure? (Score 4, Interesting) 19

What you're describing is the behaviour of our memory at a high level of abstraction. The comparison made by the article refers to how our memory works at the "bare metal" level. At this lowest level of data retention there is no processing. It's simply storage and retrieval. Redundancy is probably the next level up and then probably several layers of processing.

Comment Re:Am I missing something? (Score 1) 81

Man, you don't need to talk down to me.

I'm a regular on here and I have been reading all the Windows 10 coverage. That's how I know it's been light on facts and heavy on FUD.

It surprises me just how many of today's slashdot readers gobble that up without questioning the source.

I know it's almost a tradition here to not read the article, but it used to be that the readers at least applied some critical thinking.

Slashdot Top Deals

If you are smart enough to know that you're not smart enough to be an Engineer, then you're in Business.

Working...