Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: PSTs / nightly backup (Score 1) 282

by Tuxedo Jack (#43316119) Attached to: Ask Slashdot: Best Way To Archive and Access Ancient Emails?

I use PSTs and nightly backup.

Sure, you can use GMail or the amorphous cloud for your purposes, but quite frankly, remember - if it's not in your possession, it's not as secure as it could be.

No, I don't have world-ending secrets in my possession, but yes, I do get paranoid about my data.

Comment: You might want to send something like this to them (Score 5, Informative) 216

by Tuxedo Jack (#38144642) Attached to: CarrierIQ Tries To Silence Security Researcher

Ms. Woods,

I possess and use an HTC EVO 3D smartphone in line with my daily duties for my employer and various clients. This phone contains your employer's software (CarrierIQ for Sprint), which was bundled with the device and zero disclosure that it was installed or of its capabilities.

My device contains HIPPA-protected data (specifically relating to EMR software and the data contained therein) as well as PCI-DSS related information for my company's various clients. As such, it is protected by all manner of privacy laws, the breach of which results in severe penalties under United States law.

After reading Trevor Eckhart's research and doing some of my own, I am curious as to specifically what data your organization is capturing on Sprint's behalf, as well as to what extent they have customized their build of your software, and what its capabilities with their modifications are.

If the software, either in its original form or modified, does indeed capture data from a phone, including the ability to take screenshots or access the contents of e-mail accounts or SMS messages, this could potentially be in violation of all manner of privacy acts, depending on what data is being harvested and whether your client has the option to turn such collection on or not.

Please note that, among other techniques, I will be disassembling the binaries that I possess on my device and will be comparing it against the original ROM image that HTC has issued for this device in order to differentiate what, if any, changes are pushed out through over-the-air updates in order to determine the capabilities of the software as best I can.

To the best of my knowledge, I have never accepted any license agreements or restrictions regarding the software on my device, and as such, I am not bound to refrain from analyzing the software as I see fit, nor from having the results peer-reviewed and published once completed.

If your department is unable to answer my questions, please relay this to someone else inside your organization as you see fit.

I remain,


Comment: Re:How do they tell? (Score 4, Informative) 286

by Tuxedo Jack (#37029978) Attached to: Verizon Cracks Down On Jailbreak Tethering

It depends on the device you're using.

In Android and Windows Mobile 6.5/6.1/5, your NAI (network access identifier) changes based upon the type of traffic you're pushing. Tethered traffic and DUN changes your NAI to yournumber@dun.vzw3g.com. Traffic from the phone itself is simply yournumber@vzw3g.com.

Verizon has poisoned EVERY phone with Gingerbread - they have modified the OS so that activating any hotspot app, even if the phone is rooted, to trigger the NAI change and show the phrase "Tethering or Hotspot Active." The only SAFE way to tether on a Verizon phone is to run Froyo, then use free-wifi-tether's 3.x version. Alternatively, install CyanogenMod and then you can tether.

For iOS? Hell, you're screwed any way you turn.


+ - Geocities is No More->

Submitted by Tuxedo Jack
Tuxedo Jack (648130) writes "After fifteen years of hosting sites, Geocities, a popular free web host, is shutting down its services today. Users may remember this site as being one of, if not the, largest webhosts during the late 1990s and early 2000s, and many will, no doubt, have had sites there at one time or another. Yahoo, owner of the service since 1999, is recommending that all users migrate to their paid hosting, though they are linking to free hosts for people who do not wish to pay. Goodbye, Geocities; though we'll miss the funeral, XKCD is holding its own memorial service."
Link to Original Source

+ - Tilera building a 100 core CPU->

Submitted by primesuspect
primesuspect (1661853) writes "Tilera is building a 10x10 mesh CPU capable of running Linux. The Tile-Gx100 uses an array of 10×10 cores linked with a mesh interconnect system dubbed “iMesh” and 256kb of L2 cache per core for a 26MB virtual L3 cache. The Tile-Gx100 processor will purportedly offer performance exceeding Intel’s forthcoming 8-core 16-thread Nehalem CPU “by a factor of four running Linux infrastructure workloads”."
Link to Original Source

Comment: Try Motion Computing. (Score 4, Informative) 176

by Tuxedo Jack (#29524719) Attached to: Best Tablet PC For Classroom Instruction?

They're slate PCs and they're damn good.

In my experience, Motion doesn't skimp on hardware, is reliable as hell, and the external batteries will LAST - my little brother's old LE1600 still gets six hours of battery life off the primary and secondary batteries with everything on and cranked up to full (and Win7 Professional).

No matter what manufacturer you go with, I strongly urge that you go to Windows 7 for this - the handwriting support is worlds better than in Vista, and that was a hell of a leap from XP Tablet.

They are kinda expensive, though.

Comment: It would be interesting... (Score 4, Interesting) 74

by Tuxedo Jack (#19330925) Attached to: P2P Networks Supplement Botnets
Think about it. Make a false request for a file - and then do TONS of requests for it from hundreds and thousands of other people. It's a classic DDoS attack.

However, this will rule out a lot of corporate machines from being used as bots in this fashion; most decent sysadmins filter P2P traffic.

"Success covers a multitude of blunders." -- George Bernard Shaw