Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Comment: Re: Tolls? (Score 1) 803

by RavenLrD20k (#49737693) Attached to: Oregon Testing Pay-Per-Mile Driving Fee To Replace Gas Tax

Except everybody wants to drive giant guzzler SUVs that are bigger than ever.

I'd sure love to find one, now... all I'm seeing on the road lately are these Piece of Crap CUVs that are just oversized unibody station wagons. Who the hell wants to go offroad with that? Powertrain on them will most likely break just from jumping a curb at 3 MPH (Yes, I know. Hyperbole).

+ - Princeton Study: Congress Statistically Does Not Care About You

Submitted by chavez988
chavez988 writes: A study conducted by Princeton researchers recently found there is almost no statistical correlation between the opinions of 90% of the the population and how congress votes, but a an almost 1-to-1 correlation between the top 10%. So one question is whether or not we can still call congressmen "representatives"? This video explains the study well.

+ - Should I get an Arduino or a Raspberry Pi?->

Submitted by Anonymous Coward
An anonymous reader writes: I spend a lot of time at conferences and events like Maker Faires, and having co-authored a book on the Raspberry Pi, I spend a lot of time talking to people about things like small electronics and open hardware. Probably the most frequent question I hear is, "Should I get a Raspberry Pi or an Arduino?" They're both inexpensive boards, but if you want to reuse it in the future, you'll need to think about multiple projects as you're planning.
Link to Original Source

+ - Trojanized, Info-Stealing PuTTY Version Lurking Online

Submitted by Anonymous Coward
An anonymous reader writes: A malicious version of the popular open source SSH client PuTTY has been spotted and found to have information-stealing capabilities. Compiled from source, this malicious version is apparently capable of stealing the credentials needed to connect to those servers. "Data that is sent through SSH connections may be sensitive and is often considered a gold mine for a malicious actor. Attackers can ultimately use this sensitive information to get the highest level of privileges on a computer or server, (known as 'root' access) which can give them complete control over the targeted system," the researchers explained.

Comment: Re:Not Open (Score 1) 368

If he uses Hibernation either a swap partition or a swap file (if you have uswsusp installed) is a requirement. The reason it's usually recommended that swap partitions are to be at least as big as your RAM (more often I hear twice as large as available RAM) is so that when the system is being placed into hibernation, the entire contents and state of RAM can be written to disk before the system powers down.

Comment: Re:Moral (Score 1) 124

by RavenLrD20k (#49689981) Attached to: Hackers Using Starbucks Gift Cards To Access Credit Cards

Technology is supposed to make life easier, not harder.

That may be true, but the current track record of technology is that when it makes things easier for the user it also makes things easier for the hacker.

Don't want a smartphone? All the capabilities stated above could in theory be placed into a relatively small dedicated device that is only used for Authentication purposes. Hell, instead of even having an onboard battery, the device could have a cord that plugs into the POS device and transfers data while receiving power that way.

I personally want something more secure than the Swipe & PIN that my Debit Card uses with the protection that comes with Swipe and Sign that's the current method used by American Credit Card companies. Like I said, Chip and PIN is only mildly more secure than Swipe & PIN and I feel that my proposed method would bring security to a more comfortable level, at least for me.

Comment: Re:Moral (Score 2, Interesting) 124

by RavenLrD20k (#49688941) Attached to: Hackers Using Starbucks Gift Cards To Access Credit Cards

I still don't like Chip & PIN. It's better than swipe and sign of current credit cards, but it's not much more secure than using a Debit Card at the terminals now, which is Mag-stripe Swipe and PIN here. I'd rather have cards with 2FA. Sure, my idea requires a smartphone with data access, but a business needs some kind of data-line to process credit card transactions now anyway. For my Idea to work replace the card machines with a type that has a keypad and provides NFC or Bluetooth access, or uses a screen to display a QR code; similar to the parent's idea so far... Now the device doesn't even have to be a smartphone... just smartphone like. Smartphones now are capable of using fingerprint readers so a payment device only would need a Camera, NFC radio, Cell Radio (possibly optional, but would make SMS messaging viable), WiFi radio, Fingerprint reader, and a TFT (maybe GPS too...).

My idea goes something like this: POS has rung up all the customer's items and requests payment. POS Pay-Pad Pops up the total and a QR code on the screen and activates the NFC Radio. Customer can either use the NFC or Camera on their device to get the relevant information (Store Name/Number/Location, Total amount due, any other pertinent info), Device then uses whatever data connection it has available (POS NFC, POS Bluetooth, Wi-Fi hotspot, Cell Data, SMS...etc) to send the information to the requisite Authentication company (MC/V/AmEx/Dsc/Store Card Auth; possibly chosen from a menu on device), Authenticator application then requests fingerprint from user to authenticate with. Upon successful authentication a confirmation page would come up where the user can verify all the information received from the QR code / NFC transfer and make sure it's right (the information would not be what was stored from the initial read but received again from the AuthCo to ensure that the data wasn't corrupted in transfer). Re-authenticating by fingerprint confirms the info, hitting a physical button will cancel it. Upon successful second authentication, a one time use pin number would appear on the screen for the user to punch into the POS terminal keypad. When the POS receives the PIN and verifies it against information it just received from the Authentication Company, it accepts payment and marks the transaction complete. The only time this whole scenario would fail is during data outages, which could be mitigated by having a physical card as a backup for performing imprints and manual processing on, which the user can possibly log in their authenticator application.

This is just a thought, but I'm just a dreamer. I hope I'm not the only one.

+ - One of the Strongest, Lightest Metals Ever Made Is Less Dense Than Water

Submitted by Jason Koebler
Jason Koebler writes: A new class of magnesium-alloy syntactic foam, which is made out of hollow particles to lower its weight and density is one of the strongest metals for its weight and density ever developed, which makes it ideal for use in boats.
Developed by Nikhil Gupta at NYU Polytechnic University, the alloy is 44 percent stronger than similar, aluminum-based foams, and each individual sphere within the foam can withstand pressure of more than 25,000 pounds per square inch before breaking, which is roughly 100 times the pressure exerted by water coming out of a firehose. Gupta's foams are currently used by the Navy and he suspects this one will be ready for use in warships within three years.

+ - Why WinSCP Became An Open Source Classic

Submitted by Anonymous Coward
An anonymous reader writes: If you're a Windows user and you're connecting securely to remote machines, you've probably heard about WinSCP. This multi-functional open source tool has been around since 2000 and it's now considered a classic by a vast global user-base. WinSCP is the brainchild of a 36-year old Czech developer living in Prague, who's been refining it for 15 years. Learn more about this open source tool, the community and how the developer learned that you can pay your bills by giving software for free.

+ - European data protection warnings on home CCTV->

Submitted by kooky45
kooky45 writes: The UK's Information Commissioner is warning all British households with CCTV cameras that they could be breaking the Data Protection act if they are recording activity happening outside of their property, and they must register their use of cameras, warn neighbours and post notices about their coverage. This is in line with recent EU legal activity but it's likely to discourage wider adoption of domestic CCTV in Europe. And how does this affect webcams and dashcams which may also capture public activity?
Link to Original Source

It's not an optical illusion, it just looks like one. -- Phil White