Please create an account to participate in the Slashdot moderation system


Forgot your password?
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: Vodafone guilty as well (Score 2) 149 149

Vodafone here in Europe is also blocking TLS when sending emails through their broadband services. They do so only when port 25 is used; they don't in other cases. My theory is that they want to be able to scan the emails for viruses and/or spam, and block the connection/notify the customer to avoid unpleasant bill suprises. At least that's what my optimistic POV wants to see.

Comment: Bunker (Score 1) 310 310

Yes, inside a military bunker. Writing a program to interconnect 4 different batteries of a antiaircraft battalion, through RL-431 antennas. Part of it was being written during an actual full-scale military exercise; re-writting parts of it as the exercise went on for 5 days.

Comment: Thumbs up, Xinerama still broken! (Score 1) 169 169

I've been using nVidia cards on my Linux workstations for many years. Well, I recently found out the hard way that Xinerama is broken on any driver version after 319. Ouch. And has been for the last 9 months and with no response from nVdia. Double ouch. Thumbs down.

Comment: Re:No Cameras (Score 5, Informative) 162 162

Disclaimer: I am a Greek citizen.

Feel free to take cameras with you and take pictures of the beautiful scenery, monuments and people. When however, you go outside military facilities that have big "NO PHOTOGRAPHY ALLOWED" signs (in english and actual no camera icons in case you don't know english) and start taking detailed photographs with your DSLR and 70-300 lens, expect to be arrested if caught. The devs should absolutely have requested a license to do it, they didn't care to do it or got caught in the bureaucracy that is to be expected with these affairs, they got arrested for breaking the law. If they were caught doing that in the US (say, outside Nellis AFB), I wonder what would have happened to them.

Comment: Radar analysis (Score 5, Informative) 611 611

I worked on a modern SAM site for a couple of years as an operator (the guy who actually tracks the targets and pushes the fire button), so hear this.

Most SAM systems use a different radar to "identify" that a target exists in their missile engagement zone (you can identify these by their constantly rotating nature) and a different radar to actually track & lock a target. The tracking radar does not spin but rather follows the locked target as the target flies. Depending on the SAM system and technology, you CAN use multiple tracking radars for better triangulation and/or to combat ECM or other anti-tracking technologies. You can even use multiple fire batteries if they are spread far enough for even better than better triangulation. The caveat is that of all the fire batteries interconnected, only the Master battery can do this, the slaves can't. Additionally, the slave fire batteries must not be currently tracking and/or engaging other targets for this to work.

The importance of stealth technology is to remain unseen by the radar that identifies a valid signature in the sky and then passes the target to the tracking radar. If you are identified as an aircraft but can't be tracked by the tracking radar, then usually the target is assigned to airborne forces to intercept or ground small arms (including stinger missiles and manual tracking flak cannons). Remaining completely undetected is what stealth technology is all about.

We want to create puppets that pull their own strings. - Ann Marion