Forgot your password?

+ - ask slashdot...

Submitted by Kekke
Kekke (236130) writes "You guys mod this up... im drunk.

here goes:

When you clear browser history after your favourite session....
I know, use dvd bootable blaa blaaa. How about the 99.9 something that cant cd/dvd boot ?
I will lookup to this, but has anyone checked it out all ready.....
Plain and simple does "erase/clean/empty" browser history REALLY do it or is the disk still fully readable?"

Comment: Dear doc... (Score 4, Funny) 155

by Kekke (#48088999) Attached to: Europol Predicts First Online Murder By End of This Year

Please use TOR when fetching My ventilator's new firmware.
And while yer add it, pls remove the rootkit from the darn Dialysis machine. My granddaughter charged Her iPhone from it's usb port.
My blood salts have been through the roof ever since....

My wheelchair threatens to ran me off cliff, if the payment isn't complete in three days.

+ - Aussie builds contactless Visa, Mastercard cloner app->

Submitted by mask.of.sanity
mask.of.sanity (1228908) writes "Aussie hacker Peter Fillmore has created an Android app that can clone contactless credit cards and process transactions that result in errors, not fraud detections.

The Aussie boffin probed the protocols behind Visa and Mastercard payment cards and proved the viability of an attack by successfully using cloned versions of his credit cards to shop at supermarket chain Woolworths, and buy beer at a Sydney pub.

Fillmore (@typhoonfilsy) demonstrated how a modded Nexus 4 could steal data from Paywave and Paypass cards that could be introduced into cloned cards. He said the phone could be subsituted with a larger suitcase-sized and a remote server for added ownage."

Link to Original Source

+ - Jihadists Use Water as a Weapon in Iraq

Submitted by (3830033) writes "Water has long played a role in armed struggle, from the Allied bombing of German dams during World War II to Saddam Hussein’s draining of Iraq’s southern marshes in the 1990s to punish residents for an anti-government rebellion. Now Erin Cunningham reports in the Washington Post that Islamic State militants are increasingly using water as a weapon, cutting off supplies to villages resisting their rule and pressing to expand their control over the country’s water infrastructure. The Islamic State “understands how powerful water is as a tool, and they are not afraid to use it,” said Michael Stephens. "A lot of effort has been expended to control resources in Iraq in a way not seen in other conflicts."

The White House was so alarmed in August when Islamic State fighters briefly seized the Mosul Dam — located on the Tigris River that runs through Baghdad — that it backed a major operation by Iraqi and Kurdish forces to wrest it back. “If that dam was breached, it could have proven catastrophic, with floods that would have threatened the lives of thousands of civilians and endangered our embassy compound in Baghdad,” said Obama. Last month, the Islamic State used its control of the Sudur mini-dam north of Baghdad to cut off water to Balad Ruz, a predominantly Shiite area of Diyala province. According to the town’s mayor, the militants lined the roads to the dam with improvised explosive devices, and the government was forced to hire trucks to bring potable water to the residents. “They can threaten many parts of the country if they control the water,” says Abdul Majid Satar. "They want to control it at any price""

+ - Obama names National Medal of Science, Technology & Innovation winners->

Submitted by alphadogg
alphadogg (971356) writes "Computer scientists who made breakthroughs in areas such as software architectures and database management systems were among those named National Medal of Technology and Innovation winners today by President Barack Obama. These awards, along with the National Medal of Science, are the nation's highest honors for achievement and leadership in advancing the fields of science and technology. Overall, 18 medalists were named."
Link to Original Source

+ - Snowflake-shaped networks are easiest to mend->

Submitted by Z00L00K
Z00L00K (682162) writes "Networks shaped like delicate snowflakes are the ones that are easiest to fix when disaster strikes.

Power grids, the internet and other networks often mitigate the effects of damage using redundancy: they build in multiple routes between nodes so that if one path is knocked out by falling trees, flooding or some other disaster, another route can take over. But that approach can make them expensive to set up and maintain. The alternative is to repair networks with new links as needed, which brings the price down – although it can also mean the network is down while it happens.

As a result, engineers tend to favour redundancy for critical infrastructure like power networks, says Robert Farr of the London Institute for Mathematical Sciences.

So Farr and colleagues decided to investigate which network structures are the easiest to repair. Some repairs just restore broken links in their original position, but that may not always be possible. So the team looked at networks that require links in new locations to get up and running again. They simulated a variety of networks, linking nodes in a regular square or triangular pattern and looked at the average cost of repairing different breaks, assuming that expense increases with the length of a rebuilt link."

Link to Original Source

+ - First birth from human womb transplant->

Submitted by BarbaraHudson
BarbaraHudson (3785311) writes "The headline sounds like something from the tabloids — "Woman becomes first to give birth from transplanted womb — using one donated from her own mother". But it's from The National Post quoting The Lancet:

The breakthrough was reported by The Lancet medical journal on its website last night. It is thought the birth occurred within the last month after doctors transplanted wombs into several women who had a rare genetic condition that meant they were born without their own womb.

In January, one of the patients underwent in-vitro fertilization treatment that resulted in an embryo being transferred to her new womb. The donated womb came from the woman’s own mother, so the baby is also the first born to a woman using the same womb from which she emerged herself.

In wake of the Lancet article, the Swedish team refused to confirm a baby had been born saying: "As soon as there is a scientific peer-reviewed paper, we will comment on this. I will provide you with information as soon as we have some."

Eight of Dr. Brannstrom’s patients received their wombs from close relatives, reducing the risk of their bodies rejecting them.

There's nothing at The Lancet online yet."
Link to Original Source

+ - Ask Slahdot?

Submitted by Kekke
Kekke (236130) writes "Just dropped to my complicated mind....If we don't self terminate that is....
What will Governments do to control the public, after the Quantum computing (and as is, unbreakable encrypting will be a realism).
Now, I shit you not, this will soon to be a reality.
Yeah, the governments will install a back doors to every imaginable code/system they "release" to the public.....
Or they will simply keep it to them self's,,,? Possible, not probable.

No, Quantum does not work that way, in my humble opinion, governments are screwed.
"crowd information controll (thus crowd controll) will simply not work"
My one wild guess would be energy war..... i.e Quantum systems would be toild to engage them selves, and from human point of view (wich is wrong) the more energy you would be cababple to push to the system, the more it could calculate, and thus beat the non existent "enemy"
Now, My mind needs pointers, so, any ideas?"

Comment: Just two words.... (Score 1) 153

by Kekke (#48026053) Attached to: LTE Upgrade Will Let Phones Connect To Nearby Devices Without Towers

Now make Me a liar....
But this will definetely blow to our face in the matter of privacy and such.
I know, I know, what hasn't?
But these are precisely the kinda tech, that I'd love to see, without "unforeseen" ShellShock bugs.
So, make it slow, what I mean by that, is take those extra 2 weeks for develops and tech guys, and make it safe for God's sake.
After the marketing idiots, I mean people, have their way, the game is over.

There where two words on this post, pick yer own.

Comment: Meanwhile in Finland.... (Score 1) 94

by Kekke (#47896847) Attached to: Drone-Based Businesses: Growing In Canada, Grounded In the US

Finnish Traffic security official Trafi announced today about new regulations of operating rc-helicopters (multicopters, and such). According to new regulations rc-pilot must keep his copter always within 500 meters range, and below 150 m of altitude. Also flying within highly populated areas is prohibited, with few exceptions. No word on penalty's for breaking the rules yet.

+ - Finland sets tight regulations on "drones" and rc-helicopters in general.->

Submitted by Kekke
Kekke (236130) writes "Finnish Traffic security official Trafi announced today about new regulations of operating rc-helicopters (multicopters, and such). According to new regulations rc-pilot must keep his copter always within 500 meters range, and below 150 m of altitude. Also flying within highly populated areas is prohibited, with few exceptions. No word on penalty's for breaking the rules yet. Link is in Finnish."
Link to Original Source

This screen intentionally left blank.