Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Comment Conspiracy... (Score 1) 139

Whereas it's conceivable that a single software engineer, directed by a single manager, could have secretly written and uploaded the code that ran the defeat device

Of course is conceivable, but does anybody actually believe that ? You would need to be quite ingenuous to believe that... this is not an obscure open source project with almost no reviews, you cannot "slip" a patch without anyone noticing... moreover, you cannot keep that code for more than 6 years in the revision control system without anyone noticing.
This is not a conspiracy, this is just a company caught red handed.

Anyway, if you need any proof that this behaviour was indeed intended by the company, just have a look at this article: Bosch reportedly warned Volkswagen about illegal emissions software in 2007.

Comment Re:Can the enemy actually shoot down the F35? (Score 1) 732

I'm afraid what happened in Serbia is only one example, and it is something that really should never have happened. The radar used there was not particularly sophisticated. If anyone knows they can track a F-35 or F-22 right now then they are going to keep their cards close to their chest.

You can also shoot down the F-117 over Belgrade in the very comprehensive SAM Simulator. Try it, you will see this is not easy...

Comment Re:An image for dedicated use would be nice... (Score 1) 133

People expect to throw away their phone after 2 years. I'm sure you've thrown away other hardware because its OS couldn't be upgraded. Eg.: DVD players, NAS boxes, printers, or even wi-fi repeaters.

I'm pretty sure DVD players and printers are rather long-lived.

Comment Re:It's 2015! Almost 2016! Wtf! (Score 1) 515

It's not all about market muscle, even if this is a big part of the problem.
There is an area in which Linux is really lacking, which is "computer administration for dummies". Incidentally, the people who will be in the deepest trouble are home users, who are the administrators of their own computers, but have never learnt how to do that.
Grandma can use Linux: she will have a locked-down setup installed by her computer-savvy grandsons, and she only wants to go on the internet and print a few things.
Office users can use Linux, as their desktops are administrated by IT. Here the problem will be more about the OSS ecosystem. Almost every business uses "niche" software or "niche" features that are crucial to their operations.
But home users, who are always installing programs and configuring small things are in trouble. Let's say I run OpenSUSE... I can use YaST to configure my system. Or I can try to use the "system configuration" panel in KDE. Or I can use an independant KDE utility which will be happy to interfere with YaST settings, or will have absolutely no effect. Or I can use a command-line utility written in ncurses that I read about on the internet and was installed by default on the system (e.g alsamixer or others...). Or finally, I can hack directly the configuration text files, hoping that they have not been deprecated by a newer system.
If you know Linux, you will probably skip every of those steps to go to the final one, as it is the most reliable way to administer stuff with UNIX-likes. However, not every home user is either able to do that, or willing to learn that.
Let's compare the situation to Windows now, where you can go for 10 years with your home computer without even knowing what the registry is.

My United Airlines Website Hack Gets Snubbed 187

Bennett Haselton writes: United Airlines announced that they will offer up to 1 million air miles to users who can find security holes in their website. I demonstrated a way to brute-force a user's 4-digit PIN number and submitted it to them for review, emailing their Bugs Bounty contact address on three occasions, but I never heard back from them. Read on for the rest. If you've had a different experience with the program, please chime in below.

Two is not equal to three, even for large values of two.