Forgot your password?
typodupeerror

Comment: Re:Really? (Score 1) 706

by Raedwald (#44861799) Attached to: Student Arrested For Using Phone App To 'Shoot' Classmates

Zero Tolerance: A regulatory philosophy that administrators hide behind to avoid having to make decisions and subsequently defend those decisions.

And also, zero tolerance = zero justice. By replacing human judgement with an inflexible rule, we replace the justice that come from judgement (being judicious) with a mechanical tyranny.

In the context of school bullying, this will disproportionately fall on the victims of bullying. The bullies are good at bullying. From practice they know just how much they can get away with without crossing the line of official sanction. Frustrated and angry victims are not so practiced, so when they snap, they are more likley to cross the line that gets them punished.

Comment: What crap? RTFA! (Score 1) 182

by Raedwald (#38994139) Attached to: IBM Seeks Patent On Judging Programmers By Commits

The guy that spends a week finding a five year old memory bug, that no one has every been able to find is now ineffective, whereas a dweeb performing trivial refactoring is classed as a genius?

Heaven forbid that you should RTFA, or even the summary, so plow on with your prejudice. Nowere does its say that frequent check-ins would be used as indicating a good programmer. Quoth the patent:

The data analysis component 433 may also include a comparison component 435 for comparing analyzed profile attributes of more than one developer... Determine any other valid statistical comparison between this user profile and other user profiles to find the standard deviation of a profile from the mean profile values. This finds users who may be at the extreme side of the average who may need to be highlighted for support or acclaim

So, Alice and Bob are good programmers and check-in once a week. Charlie is a bad programmer and checks-in ten times a day. Perhaps his manager says to him Why don't you work more like Alice and Bob? They make less frequent changes. Perhaps you need to slow down a little?. Once you have data to analyse, you will be able to find correlations. This is how spam filters work, after all. They do not a priori decide that Viagra indicates spam: the data indicates that is so.

Comment: Re:A new DPA application (Score 1) 170

by Raedwald (#37466804) Attached to: Smart Meters Reveal What You're Watching

DVR makes this MUCH more difficult because fast-forward/rewind vastly increases the number of datasets you need to compare against. Also, while in theory you could identify a DVD, the selection of possible DVDs is so great and the amount of noise in the measurements is such that you're never in practice going to be able to identify someone's watched content reliably.

Welcome to my world. I write software for computing TV ratings, including for DVR and VOD use, and capable of being used for DVDs. It already exists.

Comment: Re:Slippery slope? (Score 1) 301

by Raedwald (#37375430) Attached to: Global Mall Operator Starts Reading License Plates

I'll quote The Register on why it is sad that you don't think there is anything wrong in this:

Once, we did understand. Twenty-five years ago, Independent science correspondent Steve Connor and I wrote a tome about Britain's Databanks and the effect of growing data processing on civil society. Steve had located Britain's first ever vehicle Automatic Number Plate Recognition (ANPR) device, a washing-machine-sized contraption planted on a motorway bridge near St Albans. It heralded the potentially tyrannical ultimate development of a nationwide movement surveillance. We both reached for and proclaimed words from early reviews of data protection laws that had warned that new sensors and new software such as free text retrieval (FTR) raised "new dimensions of unease". A quarter-century on, these words are all but unsayable. The thoughts no longer fit the world.

Comment: Re:Dear Evangelicals, (Score 1) 1014

by Raedwald (#37177090) Attached to: Evangelical Scientists Debate Creation Story

a growing cadre of Christian scholars who say they want their faith to come into the 21st century

Christianity has already done that. The problem is not Christians, but fundamentalist Christians. I'm an aetheist, but if I were a Christian I would be enraged at the way that fundamentalist Chrisitains identify their particular sect as Christianity in toto, labelling everyone else who also calls themselves a Christian as not Christian.

Security

+ - Passenger not guilty despite annoying the TSA->

Submitted by ConfusedVorlon
ConfusedVorlon (657247) writes "A six-woman Bernalillo County Metropolitan Court jury has found Phil Mocek “NOT GUILTY” of all of the charges brought against him following his arrest in November 2009 at the TSA checkpoint at the Albuquerque airport.

Annoying the TSA is not a crime. Photography is not a crime. You have the right to fly without ID, and to photograph, film, and record what happens. Your best defense is your own camera and microphone. Ordinary jurors know, and are prepared to recognize with their verdict, that the TSA and police lie about what they are doing and why."

Link to Original Source
Security

+ - MeeGo Handset Security on a Netbook->

Submitted by M10
M10 (1923480) writes "We ported the public components of the (Nokia) MeeGo 1.2 security to an (Intel) MeeGo 1.1 Netbook. To get a feel for some of the MeeGo security features, have a look at our blog.
"So how is this better than having mount as a setuid program? Well, we still have to give away the formidable dac_override capability and the root user-id, but mount does not have all the other root capabilities any longer, which previously opened the doors for other exploits. At least now mount is only capable of doing just the filesystem work it was meant to do, and not for instance open raw sockets or load kernel modules. The principle of least privilege, you know.""

Link to Original Source
Hardware

+ - Stephen Fry and DVD Jon back USB Sniffer Project->

Submitted by Anonymous Coward
An anonymous reader writes "bushing and pytey of the iPhone DevTeam and Team Twiizers have created a Kickstarter project to fund the build of an open-source/open-hardware high-speed USB protocol analyzer. The board features a high-speed USB 2.0 sniffer that will help with the reverse engineering of proprietary USB hardware, the project has gained the backing from two high-profile individuals Jon Lech Johansen (DVD Jon) and Actor and Comedian Stephen Fry"
Link to Original Source
Idle

+ - Thou Shalt Not Facebook

Submitted by
Ponca City
Ponca City writes "Jenice Armstrong writes in the Philadelphia Daily News that Rev. Cedric Miller, pastor of the Living Word Christian Fellowship with about 1,100 members, wants all married members of his flock to log off Facebook for good after noticing how many of the couples coming to him kept mentioning Facebook as being a factor in their relationship troubles. In the past six months, 20 couples in his congregation came to him and mentioned Facebook as an issue. "What happens is someone from yesterday surfaces, it leads to conversations and there have been physical meet-ups. The temptation is just too great." says Miller adding that people are reigniting old passions on Facebook and connecting with people who should stay in the past. But not everyone agrees with Miller's assessment. "Facebook doesn't create dissatisfied marriages," says Williams Rosenblatt. "People who are dissatisfied now have better means of creating support systems and networks that are much more vast, and it's much easier to connect with people that way." Still Rev. Miller is unrepentant and says that although the average citizen will see his actions as controlling, he doesn't care. "I'm not concerned with being politically correct. I'm trying to save families and marriages.""
Science

+ - Life found in deepest layer of Earth's crust->

Submitted by michaelmarshall
michaelmarshall (1132405) writes "For the first time life has been found in the gabbroic layer of the crust. The new biosphere is all bacteria, as you might expect, but they are different to the bacteria in the layers above: they mostly feed on hydrocarbons that are produced by abiotic reactions deep in the crust. It could mean that similar microbes are living even deeper, perhaps even in the mantle."
Link to Original Source
Crime

+ - Scalpers bought tix with CAPTCHA-busting botnet->

Submitted by alphadogg
alphadogg (971356) writes "Three California men have pleaded guilty charges they built a network of CAPTCHA-solving computers that flooded online ticket vendors and snatched up the very best seats for Bruce Springsteen concerts, Broadway productions and even TV tapings of Dancing with the Stars.

The men ran a company called Wiseguy Tickets, and for years they had an inside track on some of the best seats in the house at many events. They scored about 1.5 million tickets after hiring Bulgarian programmers to build "a nationwide network of computers that impersonated individual visitors" on websites such as Ticketmaster, MLB.com and LiveNation, the U.S. Department of Justice (DoJ) said Thursday in a press release. The network would "flood vendors computers at the exact moment that event tickets went on sale," the DoJ said.

They had to create shell corporations, register hundreds of fake Internet domains (one was stupidcellphone.com) and sign up for thousands of bogus e-mail addresses to make the scam work. Wiseguy Tickets then resold the tickets to brokers, at a profit.

"These defendants made money by combining age-old fraud with new-age computer hacking," the DoJ said in its press release."

Link to Original Source
Security

Firefox Extension Makes Social-Network ID Spoofing Trivial 185

Posted by timothy
from the plausible-deniability-for-farmville dept.
Orome1 writes "A simple-to-use Firefox plugin presented yesterday at Toorcon in San Diego has hit the security world with the realization that squabbles about Facebook's changing privacy settings and various privacy breaches simply miss the point. 'When it comes to user privacy, SSL is the elephant in the room,' said Eric Butler, the developer of the extension in question, dubbed Firesheep. By installing and running it, anyone can 'sniff out' the unencrypted HTTP sessions currently allowing users on that network segment to access social networks, online services and other website requiring a login, and simply hijack them and impersonate the user."

Machines that have broken down will work perfectly when the repairman arrives.

Working...