Forgot your password?
typodupeerror

Comment: A Different Approach (Score 1) 284

by Kevinoid (#41971461) Attached to: Ask Slashdot: How To Catch Photoshop Plagiarism?

I disagree with the approach of flattening, printing, or otherwise destroying information in the final-result file, because there can be a lot of learning value for the students in having the solution. The approach of manipulating the image in some way and attempting to detect that modification in the result could work, although it seems like a lot of effort.

Instead, could you require the students to submit the intermediate results as well? That way you have more evidence that the students actually performed the steps. Also, if there is any variation in the steps, it gives you more information about possible copying between students if all intermediate results are the same in addition to the final result.

Image

Supersizing the "Last Supper" 98

Posted by samzenpus
from the a-meal-fit-for-a-king-of-kings dept.
gandhi_2 writes "A pair of sibling scholars compared 52 artists' renditions of 'The Last Supper', and found that the size of the meal painted had grown through the years. Over the last millennium they found that entrees had increased by 70%, bread by 23%, and plate size by 65.6%. Their findings were published in the International Journal of Obesity. From the article: 'The apostles depicted during the Middle Ages appear to be the ascetics they are said to have been. But by 1498, when Leonardo da Vinci completed his masterpiece, the party was more lavishly fed. Almost a century later, the Mannerist painter Jacobo Tintoretto piled the food on the apostles' plates still higher.'"
Graphics

+ - Consumers pledge to support open graphics drivers

Submitted by
the Hewster
the Hewster writes "A pledge has been setup at pledgebank.com to let the Free Software and Open Source community show that they are ready to vote with their wallet and support graphics cards manufacturers with open graphics drivers.
To add incentive to either nVidia or ATI to open up their drivers, the pledge is to support the first of the two to open their drivers over the next 5 years. Disclaimer: I am the author of the pledge."
Security

+ - Scanning Ajax for XSS Entry Points

Submitted by Anonymous Coward
An anonymous reader writes "Ajax code loaded in browser can have entry points to XSS and it is the job of the security analyst to identify these entry points. It is difficult to decisively conclude that possible entry points to an application can be exploited. One may need to do a trace or debug to measure the risk of these entry points. This paper introduces you to a quick way to identify XSS entry points in an application."

Comment: Finding Good Political Information (Score 1) 674

by Kevinoid (#16750107) Attached to: Republican Robocall Pretexting Campaign
I completely agree with the gripe about the lack of solid information about candidates views (other than supporting non-controversial positions). The best source that I have found for such information is Project Vote Smart http://www.vote-smart.org/ and specifically candidates responses to the National Political Awareness Test (NPAT) http://www.vote-smart.org/npat_about.php - which gathers information on the candidates' positions on political issues.

"Never ascribe to malice that which is caused by greed and ignorance." -- Cal Keegan

Working...