Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Polls on the front page of Slashdot? Is the world coming to an end?! Nope; read more about it. ×

Comment: Re:Timeo Danaos et dona ferentes (Score 1) 182

by DaHat (#49826889) Attached to: Microsoft To Support SSH In Windows and Contribute To OpenSSH

Hell, I even played with scripting text to speech alerting just to see if I could, and it was really easy!

I know a guy who did that with a telephony system which calls him when something goes wrong then accepts voice input for what to do next... including executing a limited # of PS commands.

I've not seen the code, but like you said, I'm told it's pretty easy.

Comment: Re:Odd thoughts: (Score 1) 182

by DaHat (#49826749) Attached to: Microsoft To Support SSH In Windows and Contribute To OpenSSH

PowerShell primary commands are formatted Verb-Noun. This is awfully convenient, as a PowerShell user can guess hundreds of commands just by learning a few verbs and a few nouns.

Not to mention built in tab completion for arguments where you can read the man page after finding the cmdlet to know which arguments you will have to use, or just quickly tab through to what you know is going to be there.

Comment: Re:outrageous (Score 2) 362

by DaHat (#49802545) Attached to: Silk Road Founder Ross Ulbricht Sentenced To Life In Prison

Except for that you are speaking of what really amount to common carriers which transport bits without much worry about what they are.

Now if Comcast was in the business of advertising they have the best internet pipe for looking for slaves, chemical weapons or terrorists for hire... you might have a point.

There is a big difference between something legitimate being used for illegitimate purposes and something being built explicitly for illegitimate purposes... this is why guns tend to be legal while building a bomb is not.

Comment: Re:Just wondering (Score 1) 225

by DaHat (#49795497) Attached to: Why Detecting Drones Is a Tough Gig

There is also the issue of noise in the signal and filtering of it.

While a good radar system is probably able to pick up a bird or a drone flying about, that also means it could probably see a baseball, a kite, or someone throwing a 12"x12" piece of aluminum foil into the air... and that in addition to general noise which may get picked up.

Rather than have all such items show up on an operators radar, there is likely a threshold that only objects over a certain size or moving at a certain speed (or both) end up being 'visible'.

Comment: Re:You seem to talk much like the Prosecutor... (Score 1) 82

by DaHat (#49795005) Attached to: Murder Accusations Hang Over Silk Road Boss Ulbricht's Sentencing

So your best/only response is to accuse me of being a paid shill?

Truly now we see the depth of your intellect... though I doubt even a new born could drown in such waters if one were to try.

Never can it be that someone on their own might had a different opinion, no, never that.

Or would you like to cite specific and tangible EVIDENCE of what you claimed? I hear lots of claims of the NSA being involved yet so little to back it up... that must be part of why the judge (another NSA shill?) rejected those claims.

Comment: Re:This was a 'Show Trial' at best... (Score 4, Insightful) 82

by DaHat (#49794767) Attached to: Murder Accusations Hang Over Silk Road Boss Ulbricht's Sentencing

First off, even getting that laptop was fruit of the poisoned tree because they got it using evidence the NSA gathered through illegal wiretapping programs.


Even then, Ulbreit admitted he built the site. He just didn't run it during the period in question. The entire point of the name "Dread Pirate Roberts" is that anyone can use it.

So he admitted buying the gun and evidence puts him at the murder scene... but you are still going to fight the idea that he pulled the trigger? You can be an accessory to a crime without directly taking part.

But then lets just ignore the other evidence on his laptop which did show him being a more active runner of the site than you suggest.

Besides, the site did use Tor correctly.

Really? So you've personally audited it and certified that in your capacity as an AC Tor expert?

FYI: Posting to Stackoverflow with your own name when trying to learn how to setup a Tor hidden service isn't the brightest thing when you are trying to not have the site tied to you.

It didn't help because the NSA has infiltrated Tor, which should surprise no one, because it was originally built by the US DOD anyway.

Like many, I'm still waiting to see/hear of these secret backdoors in Tor that were somehow inserted not through rouge check-ins... but through large checks to the Tor foundation.

Lemme guess... 9/11 was an inside job?

Comment: Re:This was a 'Show Trial' at best... (Score 4, Insightful) 82

by DaHat (#49794545) Attached to: Murder Accusations Hang Over Silk Road Boss Ulbricht's Sentencing

Secret evidence, discovery denied for obvious things...

When you get a hold of the accused laptop which is logged in and has ample evidence of being an administrator of the site in question... what exculpatory evidence do you think existed that could have gotten him off that he was denied?

And they proved Tor is not secure; arguments to the contrary are just not convincing anymore.

Tor is secure if you use it right... many do not. Bitcoin however we did find is far from anonymous and the evidence in the blockchain could be used against you years or even decades after your illicit purchase.

Comment: Re:Very Serious (Score 2) 85

by DaHat (#49778489) Attached to: IRS: Personal Info of 100,000 Taxpayers Accessed Illegally

Exactly... and even if they happened to create a perfect system on day one, the training required to get the average person to be able to use it would be herculean task.

It's hard enough convincing many of our parents not to type in their username & password to just everywhere "Look for the lock icon in the address bar" we used to say, until malicious sites started setting the icon of the site to a lock.

PKI is fantastic when it's largely automated and transparent... and I trust my parents web browser and OS's binary signature checking far more than I do their ability to learn how to actively participate in such a system.


Russian Space Agency Misused $1.8 Billion, May Be Replaced 94

Posted by Soulskill
from the that's-a-lot-of-vodka dept.
An anonymous reader writes: After a pair of high profile launch failures in the past few months, Russian space agency Roscosmos is making headlines again: this time for corruption. A public spending watchdog reported that the organization had misused 92 billion rubles ($1.8 billion) in 2014 alone. Deputy Prime Minister Dmitry Rogozin said their space efforts have been undermined by rampant corruption. "We have uncovered acts of fraud, abuse of authority (and) document forgery. With such a level of moral decay, one should not be surprised at the high accident rate." He also said Roscosmos is to be "abolished," and replaced by a state corporation of the same name by the end of the year. "In its new, corporate identity, Roscosmos will be responsible not only for setting mission goals but managing wages for space industry workers and modernizing production facilities."

If I have seen farther than others, it is because I was standing on the shoulders of giants. -- Isaac Newton