Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
What's the story with these ads on Slashdot? Check out our new blog post to find out. ×

Comment Re:Any other evidence? (Score 1) 214

I agree Brian. I'm a network engineer as well, and uh, even if they find the router, unless it's logging itself to flash, they won't find any evidence. Maybe if it's configured for voip that's some pretty pressing evidence. I think if they want to find out where the call came from, the "stolen router" isn't the key to the technical piece of the investigation. The routing of the phone call is. It would be routed through the telco system a certain way, and if he did fake it, the origin of the call would be the server where the voip client (router or otherwise) was registered, and not his wife's cell phone. A subpoena to the telco in question would yield better evidence and the router config, or the router itself would become a moot point. It's a network. The tracks through the network are the evidence, not any single piece of equipment.

Comment Wife's Laptop (Score 3, Interesting) 183

My wife has a Samsung R580 which is almost a year newer than the laptops the guy mentioned in the article. I was going to scan it with some decent rootkit programs (like f-secure blacklight or rootkit revealer) only to find out some of my favorites don't work with 64bit Win7. I wrote to the guy who wrote the article, asking about the name of the "commercial security scanner" he installed. He never replied back. I booted my wife's laptop into Linux last night using a Live CD, and performed some find commands for supporting files of the StarLogger program (which showed up in a google search). Nothing. I was thinking if this was true, hers was exempt because it was almost a year older. Turns out, I find out today, I did more research than this supposedly "phd security expert" had.

Comment Which Switch? (Score 1) 107

I love the vernacular "switch". It's a telco switch. Not to be confused with the more nerdy (and hopefully slashdot-friendly) network switch. As in Layer 2 of the OSI model. Because the $50 gigabit switch sitting on my desk can handle "tens of thousands of gigabytes of data a day" as well. Maybe I'm just not impressed with telco stuff, being a network nerd and overall "virtual protocol" kinda guy. Just wanted to point out if you're thinking network switch like I was, you won't be comparing apples to apples.
Hardware Hacking

Combining Two Kinects To Make Better 3D Video 106

suraj.sun sends this quote from Engadget about improving the Kinect 3D video recordings we discussed recently: "[Oliver Kreylos is] blowing minds and demonstrating that two Kinects can be paired and their output meshed — one basically filling in the gaps of the other. He found that the two do create some interference, the dotted IR pattern of one causing some holes and blotches in the other, but when the two are combined they basically help each other out and the results are quite impressive."
Earth

Earth's Water Didn't Come From Outer Space 181

sciencehabit writes "Where did Earth's oceans come from? Astronomers have long contended that icy comets and asteroids delivered the water for them during an epoch of heavy bombardment that ended about 3.9 billion years ago. But a new study suggests that Earth supplied its own water, leaching it from the rocks that formed the planet. The finding may help explain why life on Earth appeared so early, and it may indicate that other rocky worlds are also awash in vast seas."

You are false data.

Working...