Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment Re:Anonymous? (Score 2) 151

They're called Anonymous because they're not just random people, but rather a stand alone complex—which, albeit, is just a group of random people, but with the addition of unintended or decentralized cooperation. And that's something to which it is meaningful to give a name.

This guy goes into it more:

Comment Re:Can't wait to see... (Score 3, Interesting) 185

Stainless steel is similarly naturally antimicrobial.

No, it's not. Which you'd have known if you'd clicked on the GP's link. From Wikipedia:

Unlike copper alloys, stainless steel (S30400) does not exhibit any degree of bactericidal properties. This material, which is one of the most common touch surface materials in the healthcare industry, allows toxic E. coli O157:H7 to remain viable for weeks.

The GP is also inaccurate in implying that copper alloys are used in all hospitals; this seems to be a relatively recent realization and is only slowly being rolled out.

St. Francis Private Hospital ... decided to become the first hospital in the world to fully specify hygienic copper door handles throughout its facility as part of its infection control program. A full upgrade of all door furniture ... commenced in January 2010.

Comment Re:3k - 64cores + 54+GB of ram. (Score 1) 205

Interlagos only has 1 floating point unit for every 2 integer cores.

Not really true. It has one 256 bit FP unit which can do AVX instructions, or it can be used as two 128 bit FP units.

There seems to be lots of confusion about the bulldozer architecture. Its real limitations are that it shares the L1 instruction cache, L2 cache, and decoder between (essentially) two cores, and that it has not-so-hot branch prediction (compared to Intel) combined with a longer pipeline resulting in lower IPC compared to Phenom. The FP performance has remained pretty much the same, except it can do FMAC and AVX now.

Comment Re:Vundo and friends (Score 4, Informative) 120

I deal with this type of malware for a living. Once you know what it does it's quite quick to clean up a system.

Fist off, it's foolish and counterproductive to try to remove malware by using the OS that's infected. Boot to a live CD (like BartPE so you can mount the registry) and at the very least disable it from startup. From there feel free to boot to the OS and repair the damage.

The start menu is indeed moved to the user's Temp folder. In detail:
smtemp\1 is the public start menu
smtemp\2 is the user's start menu
smtemp\3 is the public desktop (I think, I've only seen this folder once)
smtemp\4 is the user's desktop
It also disables the listing of recently used programs in the start menu and un-pins everything. It's easy to turn that back on.

The following is a terrible idea:
attrib -h /S /D C:\*.*
as it will unhide everything on the computer.

It's quite easy to instead just select all the profiles under \Users\, go to properties, uncheck hidden, and apply to all sub objects. Afterwards, go into each profile and rehide only the top folder of AppData and all of the files in the root of the profile (things like ntuser.dat). In XP there are a number of other folders under the profile that are hidden by default. Reference a known good computer to see which ones.

It may also set some group policies to disable the desktop, the task manager, and disable changing the wallpaper. Delete these.

The particular malware that does this does not alter .exe associations, but if you need to fix those, there is a far more reliable free tool from Kaspersky called AVZ. The option is under File -> System Recovery. (Tip: you can rename avz.exe to something like so you can run it. Or manually fix the association for .exe and let the tool fix the rest.)

Another spot to look out for is IFEO debugger entries. Look under:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options

Inside you will find keys of image names (like iexplore.exe). Under each key you may see a string value called Debugger. It's data will be set to the path of the malware that's infected the computer. If such a key exists, the 'debugger' will be launched whenever you try to execute the specified image.

That about sums it up for all of the 'modern' 'viruses'. Quite pathetic. The only reason these things work is because people are tricked into letting them through UAC. The new Mac infections function nearly identically. They require that the user enter their root password for them to install, and all they do is put themselves in the Mac's startup locations, so they're even easier to remove.

FCC Backs Net Neutrality, Chairman's Full Speech Posted 270

ArmyofGnomes writes "FCC chairman Julius Genachowski delivered Monday on President Obama's promise to back 'net neutrality' — but he went much further than merely seeking to expand rules that prohibit ISPs from filtering or blocking net traffic by proposing that they cover all broadband connections, including data connections for smartphones. Genachowski stated: 'I understand the Internet is a dynamic network and that technology continues to grow and evolve. I recognize that if we were to create unduly detailed rules that attempted to address every possible assault on openness, such rules would become outdated quickly. But the fact that the Internet is evolving rapidly does not mean we can, or should, abandon the underlying values fostered by an open network, or the important goal of setting rules of the road to protect the free and open Internet. ... In view of these challenges and opportunities, and because it is vital that the Internet continue to be an engine of innovation, economic growth, competition and democratic engagement, I believe the FCC must be a smart cop on the beat preserving a free and open Internet.'"

Comment Re:Hamiltonian path != traveling salesman (Score 1) 135

You are indeed correct. I was more trying to point out that the implementation of each problem is going to be different, as one problem requires the consideration of a few more details than the other. And while it may be fairly trivial to use the solution of one problem to solve the other—as you describe—in the silicon world, it may not be so for their bacteria-computer. It could be a big headache to set up a bacteria-solver for a problem of much greater complexity, with the intention of interpreting the result and converting it into the solution of a different problem. Moreover, it remains to be seen whether it's even possible to set up their computer in such a fashion (they only used 3 nodes with the computation taking place in two bits of information: glowing red and glowing green).

Comment Hamiltonian path != traveling salesman (Score 3, Insightful) 135

TFA oversimplifies by claiming that finding a Hamiltonian path solves the traveling salesman problem of finding the shortest path. The traveling salesman problem deals with variable edge lengths instead of just finite/infinte, and therefore requires a bit more complex implementation to solve (although they are both still NP-complete).

I would be more impressed if they found the shortest path on an undirected graph with variable length edges.

It's not hard to admit errors that are [only] cosmetically wrong. -- J.K. Galbraith