Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
Take advantage of Black Friday with 15% off sitewide with coupon code "BLACKFRIDAY" on Slashdot Deals (some exclusions apply)". ×

Comment Facepalm (Score 1) 151

I was out camping with a larger group. You know, all those friends of friends who say the darndest things. As topics bounced around I was reminded of this device and mentioned it, saying "it was basically an explosive finding dowsing rod" and one of the people pipes up
"Well nothing wrong with that then, dowsing rods work just fine"

What do you even say?

Comment Better idea (Score 3, Interesting) 130

We already have "did this package get dropped" sensors. So take that to the next level.

Vacume seal an interior bag. Place a module inside the bag with:
1. Internal Battery
2. Sensor package including light and air pressure/composition sensors
3. A small amount of memory
4. A running program which will erase the memory if any of the sensors detect a change
5. a small transmitter, capable of answering a challenge.

Customer/Cisco generate a key using a key exchange protocol, key is loaded into box gaurdian module. Box is shipped. Customer uses an RF device to query the package to see if it has been tampered with, customer informs cisco for an immediate RMA, but accepts delivery, so as to be sure the box can be returned in tact for analysis.

Comment Re:The hilarity it keeps growing. (Score 1) 259

Thing is....its not even new.

I first became aware of encryption back when it was still being pointed out that ITAR regulations are stupid when the encryption they block from export already exists, and some of it was even patented, outside the US. There were, quite literally, two versions of the same library based on whether you were in the US or outside the US....same routines, same capabilities.

And this was the mid 1990. How ridiculous is it to be threatening people with prison time for "exporting" something that was already out there?

Yes blame the tools....the same tools which have been available to the entire fucking world for 3+ decades.

Terrorists capable of using freely downloadable software that does math....yes.... big news story. Be afraid, they can do math. Somehow they can build bombs but its still shocking they can download freely available software.

In the end its all just fearmongering, whatever people will buy and sounds scary.

Comment Completely Agree (Score 3, Funny) 342

Absolutely. I don't block ads, but ads get blocked, because my browser security package (noscript+requestpolicy) just doesn't load anything from a 3rd party site unless I approve it, and then doesn't run javascript unless I approve it.

Its generally a bit annoying but.... I put up with it for the same reason I wouldn't have sex with someone I just met without condoms. However, that isn't really even an apt comparison....because sex with a random person is, mostly a pretty rare event, even if you are trying.

Browsing the web is like.... if we replaced the social custom of saying "hello" with anal sex, and browsing a website is like going to a dinner party with your friend, and 20 of his friends that he brought along; and they are all anxious to greet you, and quite offended that you even brought up the word condom.

Comment Re:News At Eleven (Score 1) 108

So how is paying someone else to do something different from doing it yourself anyway?

They are acting... on your request. You are using them, as a tool, to perform the action, and using department funds to compensate them. Acting via a proxy is still acting.

In fact, its involving them in a criminal conspiracy, as conspiracy to commit a criminal act is, itself, a crime. Everyone involved should be facing felony charges.

Comment Fear? (Score 1) 118

I don't understand this word "fear"? How can they "Fear" anything? Does a single one of them actually risk prosecution? Does any one of them think that, if they were prosecuted, the provisions of the Westfall act which allow the Government itself to stand for the defendant would not be invoked?

They have nothing to fear but reassignment at worst.

Comment Re:but its working (Score 2) 118

No. There really is no market for murder. Even in the rare instance where someone seriously seeks out such a market, they end up talking to the police, or finding some unstable fool. The only market for murder is the military contracting one, and you need a lot of dough and connections to use that.

Comment Re:I'm 8 hours in (Score 1) 367

I never played a mute in fallout. I don't need a voice actor to give my own character a voice.

Personally, I am not bothered as much, but I do prefer games that don't do that. Actually, I prefer the game not even "phrase" my responses for me. I think one of the better systems was the old shadowrun game for the NES where dialog options were made by using keywords to select topics....leaving your side of the conversation entirely up to your own head-cannon.

Comment Re:Just to note... (Score 1) 163

> You have to go back a bit further, with PGP in 91, or even further back with InfoZip's encryption, IIRC. I'm sure I haven't gone to the beginning.

Very true, and I probably wasn't even the first person to compile decent encryption routines on an apple 2 either, hell, by that time someone had already developed a TCP/IP stack and gno existed.

> lightning connectors finally addressed one of the biggest annoyances - keyed connectors.

I guess that was never one of my biggest annoyances. In fact, connector wise, the real huge pain was always DIN style connectors with thin wires that had to push into individual holes in a female socket. Original USB and SATA, as basically edge card connectors that slide together, already solved 95% of the real pain.

What really gets me is the complexity. Its a connectior. Being keyed is a SMALL price to pay for lacking the complexity of specialized hardware in the cable for no other purpose than switching the pins around so you can plug it in either way. To me, it seems such a level of complexity for such a miniscule problem points far more at a desire to enforce user lock-in and freeze out aftermarket parts.....both of which I put in the category of "Screwing your own customers".

Comment Re:Just to note... (Score 1) 163

> But you already did.

I said "will not" not "never have". However, I could have said never have with the caveat of being a customer and rather than consumer. The GS was a gift from my parents and while I did personally buy one, it was at a flea market years later (and it was an original "Woz Edition" GS).

If you want me to clarify, I have not purchased an apple product, except possibly an Ipod as a gift for someone else who wanted one, since the Apple ][ was on the market, and Apple has, quite consistently, made decisions which have reinforced that decision since then.

If you're not careful, you're going to catch something.