Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
Last Chance - Get 15% off sitewide on Slashdot Deals with coupon code "BLACKFRIDAY" (some exclusions apply)". ×

Comment Facepalm (Score 1) 151

I was out camping with a larger group. You know, all those friends of friends who say the darndest things. As topics bounced around I was reminded of this device and mentioned it, saying "it was basically an explosive finding dowsing rod" and one of the people pipes up
"Well nothing wrong with that then, dowsing rods work just fine"

What do you even say?

Comment Better idea (Score 3, Interesting) 130

We already have "did this package get dropped" sensors. So take that to the next level.

Vacume seal an interior bag. Place a module inside the bag with:
1. Internal Battery
2. Sensor package including light and air pressure/composition sensors
3. A small amount of memory
4. A running program which will erase the memory if any of the sensors detect a change
5. a small transmitter, capable of answering a challenge.

Customer/Cisco generate a key using a key exchange protocol, key is loaded into box gaurdian module. Box is shipped. Customer uses an RF device to query the package to see if it has been tampered with, customer informs cisco for an immediate RMA, but accepts delivery, so as to be sure the box can be returned in tact for analysis.

Comment Re:The hilarity it keeps growing. (Score 1) 259

Thing is....its not even new.

I first became aware of encryption back when it was still being pointed out that ITAR regulations are stupid when the encryption they block from export already exists, and some of it was even patented, outside the US. There were, quite literally, two versions of the same library based on whether you were in the US or outside the US....same routines, same capabilities.

And this was the mid 1990. How ridiculous is it to be threatening people with prison time for "exporting" something that was already out there?

Yes blame the tools....the same tools which have been available to the entire fucking world for 3+ decades.

Terrorists capable of using freely downloadable software that does math....yes.... big news story. Be afraid, they can do math. Somehow they can build bombs but its still shocking they can download freely available software.

In the end its all just fearmongering, whatever people will buy and sounds scary.

Comment Completely Agree (Score 3, Funny) 342

Absolutely. I don't block ads, but ads get blocked, because my browser security package (noscript+requestpolicy) just doesn't load anything from a 3rd party site unless I approve it, and then doesn't run javascript unless I approve it.

Its generally a bit annoying but.... I put up with it for the same reason I wouldn't have sex with someone I just met without condoms. However, that isn't really even an apt comparison....because sex with a random person is, mostly a pretty rare event, even if you are trying.

Browsing the web is like.... if we replaced the social custom of saying "hello" with anal sex, and browsing a website is like going to a dinner party with your friend, and 20 of his friends that he brought along; and they are all anxious to greet you, and quite offended that you even brought up the word condom.

Comment Re:News At Eleven (Score 1) 108

So how is paying someone else to do something different from doing it yourself anyway?

They are acting... on your request. You are using them, as a tool, to perform the action, and using department funds to compensate them. Acting via a proxy is still acting.

In fact, its involving them in a criminal conspiracy, as conspiracy to commit a criminal act is, itself, a crime. Everyone involved should be facing felony charges.

Comment Fear? (Score 1) 118

I don't understand this word "fear"? How can they "Fear" anything? Does a single one of them actually risk prosecution? Does any one of them think that, if they were prosecuted, the provisions of the Westfall act which allow the Government itself to stand for the defendant would not be invoked?

They have nothing to fear but reassignment at worst.

Comment Re:but its working (Score 2) 118

No. There really is no market for murder. Even in the rare instance where someone seriously seeks out such a market, they end up talking to the police, or finding some unstable fool. The only market for murder is the military contracting one, and you need a lot of dough and connections to use that.

Comment Re:I'm 8 hours in (Score 1) 367

I never played a mute in fallout. I don't need a voice actor to give my own character a voice.

Personally, I am not bothered as much, but I do prefer games that don't do that. Actually, I prefer the game not even "phrase" my responses for me. I think one of the better systems was the old shadowrun game for the NES where dialog options were made by using keywords to select topics....leaving your side of the conversation entirely up to your own head-cannon.

Comment Re:Just to note... (Score 1) 163

> You have to go back a bit further, with PGP in 91, or even further back with InfoZip's encryption, IIRC. I'm sure I haven't gone to the beginning.

Very true, and I probably wasn't even the first person to compile decent encryption routines on an apple 2 either, hell, by that time someone had already developed a TCP/IP stack and gno existed.

> lightning connectors finally addressed one of the biggest annoyances - keyed connectors.

I guess that was never one of my biggest annoyances. In fact, connector wise, the real huge pain was always DIN style connectors with thin wires that had to push into individual holes in a female socket. Original USB and SATA, as basically edge card connectors that slide together, already solved 95% of the real pain.

What really gets me is the complexity. Its a connectior. Being keyed is a SMALL price to pay for lacking the complexity of specialized hardware in the cable for no other purpose than switching the pins around so you can plug it in either way. To me, it seems such a level of complexity for such a miniscule problem points far more at a desire to enforce user lock-in and freeze out aftermarket parts.....both of which I put in the category of "Screwing your own customers".

Comment Re:Just to note... (Score 1) 163

> But you already did.

I said "will not" not "never have". However, I could have said never have with the caveat of being a customer and rather than consumer. The GS was a gift from my parents and while I did personally buy one, it was at a flea market years later (and it was an original "Woz Edition" GS).

If you want me to clarify, I have not purchased an apple product, except possibly an Ipod as a gift for someone else who wanted one, since the Apple ][ was on the market, and Apple has, quite consistently, made decisions which have reinforced that decision since then.

Comment Re:Just to note... (Score 0) 163

Begrudged Apple hater here (][ Forever motherfucker.... jobs didn't get cancer, he WAS cancer! and don't even start me on lightning connectors and walled gardens....grrrrr fuck apple)

Anyway, totally agree. Any general purpose computing device can perform these basic functions if programmed to. That encryption and original file deletion and network access were all available on the Mac is quite uninteresting.

If these are the standards, then i claim prior art as one of the earliest people to have "proven" this when I compiled the RSA libraries on my Apple ][GS in 1996. Either I was 20 years ahead of myself, or this is bullshit....thinking bullshit.

and I still hate apple and wont buy any of their products.

Comment Re:Yes? (Score 2) 367

This is an important point, but there is also honesty with yourself. Games share a property with relationships, its often not about how good it is, because good times are easy. Its really more about which negatives you can deal with.

I really love "Zero Punctuation" reviews for ripping apart a game comically because I find the jabs are full of truth. Even when I love a game that is being shredded, I find myself agreeing with its criticism, he is usually right, we just have different priorities. Its like dishes in the sink.

Its like if someone says "hey this girl is really nice, and I think you would get along, but she leaves dishes in the sink all the time". Well.... guess what.... for some people that right there, if they were being honest with themselves, is a deal breaker; possibly more so than infidelity, but, good luck finding many people who will admit that, even to themselves.

OTOH some people are like "Whats wrong with dishes in the sink? Are you that fucking uptight?". Well.... not a deal breaker for them.

Comment Re:I'm 8 hours in (Score 2) 367

I decided to wait until I get home from work..... which, I am not sure how I ended up saying I would come into the office for the first time in 2 months today. I meant to take today off, how that turned into "sure, I can come in next tuesday.....)

Anyway, woke up this morning to find my wife already on and playing. I haven't even heard the "War never changes" speech yet.

she has been way more excited about this than I have, but also way more pissed. The whole "protagonist has a voice" thing is some serious frosty piss in her cheerios.

Money is better than poverty, if only for financial reasons.