Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: i can't wait! (Score 4, Funny) 92

At this rate I'll finally be able to have my entire music collection on an iPod without having to compress my music in that terrible FLAC format. FLAC is a "lossless" format but you can totally hear which bits have been squished into the file for too long! That's why I decompressed all my files and let them sit for a week, so that the bits can breathe.

Comment: No cheaper, just recyclable. (Score 0) 56

by Gravis Zero (#49333887) Attached to: Stanford Breakthrough Could Make Better Chips Cheaper

The new manufacturing method won't make the wafer any cheaper, but it does allow it to be reused roughly 50 to 100 times, dramatically reducing the per-chip cost and opening up gallium arsenide for wider use.

unless they are going to start buying back CPUs, this development means very little.

Comment: disable flash! (Score 3, Insightful) 42

there are very few reasons to keep flash installed/enabled. if you must have it, use flashblock but chances are you can just disable/remove it completely. if some site still uses flash to play video, leave a complaint in the comments. those that haven't switched to html5 yet will do so soon enough.

if you still have java plugin installed, you better have a good reason because no (sane) sites use that shit.

Comment: NVD link (Score 1) 45

by Gravis Zero (#49320035) Attached to: Cisco SPA300/500 IP Phones Vulnerable To Remote Eavesdropping

The debug console interface on Cisco Small Business SPA300 and SPA500 phones does not properly perform authentication, which allows local users to execute arbitrary debug-shell commands, or read or modify data in memory or a filesystem, via direct access to this interface, aka Bug ID CSCun77435.


CVSS Severity (version 2.0):
CVSS v2 Base Score: 6.9 (MEDIUM) (AV:L/AC:M/Au:N/C:C/I:C/A:C) (legend)
Impact Subscore: 10.0
Exploitability Subscore: 3.4

CVSS Version 2 Metrics:
Access Vector: Locally exploitable
Access Complexity: Medium
Authentication: Not required to exploit
Impact Type: Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service

Comment: Re:What's missing from this story? (Score 3, Interesting) 569

Why do Americans automatically accept that kicking the door down and holding everyone at gunpoint is a reasonable response to an anonymous 911 call?

Yes. This is the question that no one asks. Why we tolerate a culture in which police are empowered to kick in doors all the time.

a) Hollywood/media makes guns glamorous
b) it doesn't affect us personally (until it does)
c) there are other issues that are affecting us
d) our leaders have no interest in the matter (with rare exception).
e) out political system is broken

basically, the status quo is really difficult to change because it's controlled by groups of people that only change when members of them die.

Comment: Re:And now, by extension ... (Score 1) 107

And now I believe the black hat hackers should more or less just go scorched earth.

If there's no system left, there's no evidence. Just burn it on your way out.

i feel the same way but for a different reason: if there are no insecure systems left standing, only secure systems will be able to stand. in effect, security by destruction of the insecure. a sharp learning curve but companies will start making secure products that way.

Comment: Re:not just unlikely, completely avoidable. (Score 1) 70

by Gravis Zero (#49310389) Attached to: Government Spies Admit That Cyber Armageddon Is Unlikely

pff... try taking your meds. when parts of the internet go down, people notice. remember syria when the NSA actually did brick routers there? yeah, that made headlines. after finding out what the US gov has been up to, people have become much more interested in the cause of outages. if the military gets caught doing something like that on the american public, there will be pitchforks and torches making an appearance.

Comment: not just unlikely, completely avoidable. (Score 2) 70

by Gravis Zero (#49307279) Attached to: Government Spies Admit That Cyber Armageddon Is Unlikely

a cyber armageddon is super easy to avoid, all you have to do is not connect every damn machine to a network and for the ones that must be, secure them. it's quite obvious that we have the capability to find and exploit weaknesses, so why not use our knowledge and secure those few things that must be connected. we could also be prudent and require (by law) a certain level of software security for dangerous things connected to the internet (if stupid people insist on having them connected). finally, it sure wouldn't hurt if we started teaching things like how to mathematically prove a buffer wont overflow.

Comment: Re:Underlying problem (Score 1) 130

by Gravis Zero (#49306713) Attached to: ISPs Worry About FCC's 'Future Conduct' Policing

And here is the underlying problem with a good chunk of FCC regulation.
Basically, you can do anything you want until they decide it is against an arbitrary regulation. Then they can not only stop you from doing it, but fine you for having done it.

i call bullshit.

Think of the "decency" statues for broadcast TV. Sometimes you can swear (playing Saving Private Ryan) sometimes you can't (some random award show) Sometimes you can show nudity (NYPD Blue) sometimes you can't (Superbowl?) The FCC will let you know you violated the unspecified rules via a fine
well after the fact.

guess what, they have very detailed rules on decency and guess what, it actually makes sense. what is required to be censored is based on context! what context? well, the rating of the show, time it's broadcast and if it's a public broadcast or not and some other things that are well documented. fun fact, if you don't know if what you are going to show will violate the rules, you can ask them!

This is the regulatory regime being imposed on the business practices of ISPs.

the rules they have put forth are exceptionally simple. all they have to do is not limit the speed of the connection based on the connection endpoint. seriously, that's it! they can restrict your speed out the wazoo based on any criteria except the endpoint. want to slow down HTTP traffic? you can do that! however, you can't make it faster for XYZ because XYZ gave you money.

I don't like the big ISPs screwing around with the internet just as most anyone else, but this type of regulation is bonkers.

i'll take "bonkers" regulation over blatant abuse any day. then again, maybe you just haven't read all 300 pages, so you dont really know facts.

When some people discover the truth, they just can't understand why everybody isn't eager to hear it.