Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Trap & Skeet (Score 1) 236

by RedLeg (#48917047) Attached to: White House Drone Incident Exposes Key Security Gap
Anyone who has ever watched a master trap or skeet shooter murder clay birds with a shotgun knows the answer to this problem, at least in the shortrun..... the WH grounds are already patrolled by armed secret service agents with radios. Train them to shoot skeet, and direct them to targets over the grounds via their radios.

Comment: Act like a business, not a consumer.... (Score 1) 405

by RedLeg (#48380383) Attached to: Ask Slashdot: How To Unblock Email From My Comcast-Hosted Server?
You are paying for business class service, demand it.

Make this Comcast's problem, as if things are as you describe, it obviously is. DEMAND (politely, through your business support channels) that they resolve it, and demand a resolution deadline. If they do not meet it, terminate (or threaten to) the service.

In the mean time, I suggest you investigate VPN services which support static IPs on their end. Use comcast as your last mile connection if you must, but poke out on the Internet somewhere more friendly. If you have to do this, reduce your IPs from comcast to one, make it dynamic, citing their failure to provide the service contracted. Your VPN provider should handle the rest, and your comcast bill should go down.

Hope this helps.....


Comment: Faraday Cage / Tempest (Score 4, Interesting) 142

by RedLeg (#48040989) Attached to: Boeing Told To Replace Cockpit Screens Affected By Wi-Fi
Seriously, at this point we are worried about EMI to individual avionics components / systems in the cockpit from wi-fi in the cabin?

First, I would hope that the avionics themselves were shielded and tested before deployment and use. I mean, we don't want the altimeter interfering with the artificial horizon, do we? (stupid, simple, but real example)

Second, the whole cockpit and supporting avionics and other fight critical systems are in an enclosed conductive vessel, ie the cockpit and support area. It's a Faraday cage within a larger Faraday cage (the aircraft), so Coulomb's law should apply and mitigate this theoretical threat. Wi-Fi (bluetooth and the rest) should not reach the cockpit and instruments from the cabin unless the cockpit door is open. We all know how often that happens these days....

Polite language: red herring

Otherwise: I call BullShite


Comment: I understand, but FTS (Score 2) 478

by RedLeg (#47967003) Attached to: Bioethicist At National Institutes of Health: "Why I Hope To Die At 75"
I have no desire to be a veggie, to feel my mental faculties drain away from me as I age. I can imagine nothing worse.

On the other hand, 75 is an arbitrary number. I'm 53, and will match wits with any of you. Both sides of my family have had folks live past 100, the most noteworthy being the oldest living graduate of the US Military academy. I will tell you that in his last days, he enjoyed playing poker one night of the week, drinking bourbon and branch, and hosting a weekly bridge game, all for gentlemen's stakes. I would not EVER have put money on the table and played against him, as he was sharp as a tack until the day that he died.

He, and the other members of his generation, lived to their 90s and beyond without the benefits of our modern understanding of health.

I fully expect, and am planning to enjoy my 100s.

75? Pfthhh!


Comment: Just Wrong (Score 1) 383

by RedLeg (#45840855) Attached to: Ask Slashdot: Command Line Interfaces -- What Is Out There?

Less useful but still useful are command shells.


You obviously do not get it if you do not understand the Jedi Power of a person who has mastered the shell. Pick a shell. When you think you have mastered the shell, experiment with other shells. Hell, change your shell to perl, I know a couple of perl junkies who run that way.

Sometime when you are bored, and have more that three brain cells on shift, from the command line (that would be a shell prompt) execute "man init" on your favorite Unix, and read the page. Then read the init scripts. {sarcasm}no, the shell is not useful{/sarcasm}

In a Unix Xwindows environment (or in MacOS X for that matter), the GUI is a tool, a nice place for multiple graphical proggies to play together, and an easy way to have multiple terminals open and visible at once. If you are an absolute luddite, get yourself an old VT101 terminal, learn how to plumb in a serial terminal to your machine, and explore the wonders of tmux.

Happy new year


Comment: Alternatives: (Score 1) 250

by RedLeg (#45590459) Attached to: Ask Slashdot: Recommendations For Beautiful Network Cable Trays?
OK, IF you have suspended acoustic ceilings, keep reading, otherwise forget the first suggestion and skip to the other option....

We started out with twist on attachments that mounted to the ceiling framework and provided a 1/4 inch stud, added a barrel nut and a bridle ring. All came from the local electrical contracting supply house, and were inexpensive, plus it all goes together with no tools other than a step ladder to reach the ceiling.

We we moving into a very large open space with a LOT of equipment to be interconnected. I managed the effort, and the one thing I was sure of was that the floorplan would not be what we imagined once we got used to the new space, and that it would be fluid over time. The bridle rings let us get the cables overhead and out of the way, but it's very easy to change things up, either by adding/removing cables, or rerouting them. If you need to go off in a different direction, it's a simple matter to add more rings. If a particular ring is no longer needed, simply remove it and the barrel nut, leaving the (unobtrusive) stud fixture in place for potential later use. They're cheap.

The intent was that as things stabilized over time, a "backbone" would emerge, and we would replace the bridle rings on the stable portions of the network with product from these guys: http://www.snaketray.com/ , with the idea that we could unscrew the bridle ring and barrel nut, and then hang the snake tray from the same attachment hanging from the suspended ceiling framework.

As it turned out, we never got around to that upgrade, as the bridle ring lashup worked very well for us. I no longer work there, but the approach I describe above worked for ~10 years.

The other option to explore is some variation of raised flooring. It does not have to be in the mode of the old machine room, 12 inches or so above the base flooring...... there are companies that sell what are basically interlocking floor mats with cable channels and removable carpeting tops. Looks like regular office flooring, but houses your cabling.

Hope this helps.....


Comment: Not new technology (Score 2) 107

by RedLeg (#45559915) Attached to: New Fujitsu Laptop Reads Your Palm, For Security
They demo'd this at CeBIT several years ago, and were spinning it at the time for high security applications, banking, etc. It did not get much traction IIRC, not sure how successful it was in Nippon.

One of its claimed advantages was (at least what they demo'd) that it used infrared to "see" the heat of your veins through the palm of your hand. Cut the hand off, it ain't gonna work, or so they claimed.

It will be interesting to see how this is accepted in the larger notebook market.


Comment: They're asking the wrong question... (Score 1) 114

by RedLeg (#45551837) Attached to: FOIA: NSA Contracts Stored In Paper Files, Unsearchable, Unindexed
What do all government contracts have in common? Payment of the contractor.

Ask whoever writes NSA's checks (probably DFAS, Defense Finance and Accounting Center) for all contract numbers between NSA and (list of interesting companies). Then ask NSA for copies of those specific contracts.

It would not surprise me at all to find out that whichever payment agency, and you may rest assured they are automated, also has copies of the contracts themselves, so while you are at it with the request above, ask for existant copies of the target contracts.

You could always start with asking NSA to tell you in detail who does their accounting, and more specifically, handles accounts payable for contracts.

Comment: Read the Certification Test rules, dumbass (Score 1) 328

by RedLeg (#45446593) Attached to: Ask Slashdot: Cheap Second Calculators For Tests?
RTFM, or in this case the rules governing the test. WE certainly have no idea what they are, since you neglected to mention which test you were standing.

I would be astounded to find, if they forbid certain models/features, that they do not have a whitelist of allowed models. THAT's where you should start your product research, not here, not with a vague, un-actionable question.

And Oh, By The Way, to echo another posters tongue in cheek remark, if you are in a scientific field, you really should know how to use a sliderule, even in these days. There ain't no batteries on a slide rule to run out, or be unavailable, nor are you ever likely to ever take a test where the use of one is forbidden.


Comment: It's Personal (Score 1) 330

by RedLeg (#45203063) Attached to: Ask Slashdot: Can Bruce Schneier Be Trusted?
If you've been in the security community for a while (oh, 15+ years in my case), you meet and work with people, and develop personal friendships and trust, based on personal interactions with colleagues, competitors, and other professionals.

I have competed with Bruce's companies (Counterpane, BT), met Bruce several times in professional settings. I've never worked with him personally, but I have plenty of other colleagues who have.

I trust Bruce.


Comment: Practical Advice, step by step (Score 3, Informative) 319

by RedLeg (#45109549) Attached to: Ask Slashdot: Mitigating DoS Attacks On Home Network?
You more than likely have something "phoning home" that the bad guys are tracing back to you.

SO, to track that down, do this in exactly this order:

1. Prepare to reconfigure your router for new IP / MAC, but do not reboot it, yet. Make sure the router is NOT registering with some dynamic DNS service, if it is, that's probably part of the problem. Your ISP may be doing that for you, if so, ask them to change your reverse lookup name.

2. Power down every other computing device on the network. I'm assuming you have a wireless router? If so, track down everything that it connected to it, and power those down too. Save your most trusted device (an iPad perhaps?) for monitoring / reconfiging your router. If necessary, borrow a device from someone you trust.

3. Press "go" to reconfig the router, and observe. Your DOS should go away. If it does not, either the reconfig was unsuccessful, your ISP is somehow part of the problem, the router is registering itself somehow, or the router itself is infested.

4. Assuming the DOS abated, one by one, power up the devices you previously disconnected and observe. If the DOS starts after powering up a particular device, that's the culprit. There may be more than one. Do this slowly, to make sure as you power up a device, it's not waiting some period of time before calling home.

It would not be a bad idea to get your ISP on the phone, explain what you think is going on, and ask them to observe your traffic as you go through the above steps. If something "phones home", and you miss it, they should be able to see the traffic on their segment of the wire.

If you are successful at tracking down a culprit system, enlist the help of the anti-malware vendor in isolating the offending bits. Do this BEFORE you re-image the system. They would probably appreciate a sample. Of course, this assumes you are running anti-malware software on your endpoints.....

Hope this helps.


Comment: School District Reality Check (Score 2) 682

by RedLeg (#44989503) Attached to: Ask Slashdot: Suitable Phone For a 4-Year Old?
OK, assuming you are a non-resident dad, or for whatever reason just can't get facetime with your offspring.

Tech is not going to -fix- this. It could help, but I would recommend a more structured approach, i.e. a schedule, and another adult facilitating the connection.

Now, as to having him be able to get in touch with you when needed, unless things have changed drastically, or are different where he lives, you will find that schools do not allow students to have phones on their persons during the school day. If you are lucky, they will permit it, powered off, in the locker, which is hardly of practical use in situations where he would NEED it, and my kids did not get lockers until grade 6 or 7. Set him up with a phone at age 4, the schools will deprive him of it at age 6 or so, defeating the purpose, and causing unneeded stress.

Short answer, bad idea, for a lot of reasons, not the least of which it's just impractical.


Comment: Random Comments (Score 1) 462

by RedLeg (#44703199) Attached to: Scottish Academic: Mining the Moon For Helium 3 Is Evil
This fucktard (yeah, I said it) is a Scot, and still obviously out of touch with the impact Scottish engineers have had in power generation, and the industrial revolution in general, but WTF, he's a philosopher, and not responsible for knowledge of the real, tangible world, much less modern history.

Oh, and it seems to me that this dude has:

  • Screened Iron Sky one too many times,
  • Confused Helium3 with Hydrogen3, and
  • Failed to realize that the flick is a work of fiction.

All in all, not too surprising. As to how this story wound up here, I write it off to a combination of it being a slow news day, and the topic being too funny NOT to post.


Comment: Think out of the Box, POS Printers (Score 1) 108

by RedLeg (#44569051) Attached to: Ask Slashdot: Printing Options For Low-Resource Environments?
I think your solution is probably dot matrix, but let's depart a little from traditional office automation.

I'd invite you look at receipt printers typically used in POS (Point of Sale) solutions. I'm betting you can find them that print on wider than traditional receipts, which would be better for medical records, but even the narrow format would work. I KNOW you can get multi-copy impact paper on rolls for them, the advantages being that you have the opportunity to color code the various copies, and best of all, if / when the ribbon dies, the IMPACT produced copies will still get "printed", even if the top copy does not.

Another thought is to include a dense 3d barcode (QR code?) on each printout. You can get an incredible amount of information into one using the right format, the dot matrix is certainly capable of printing graphics, and you can optically scan the encoded info in on the receiving end, or just read the paper record and transcribe manually. Win-Win.

Hope the helps.......


A language that doesn't affect the way you think about programming is not worth knowing.