Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re:She should have her license revoked (Score 1) 259

Presumptions in law can be challenged by the introduction of facts to the contrary. Additionally a jury cannot be compelled to accept such a presumption (juries being the last defence of the common sense in the courtroom.) And speaking of law there is additionally case law. "A violation of this section is one offense, which may be proven in different ways. A person's breath alcohol concentration may be probative of impairment under subsection (1), as well as proof of a violation of this section based solely on breath alcohol concentration pursuant to subsection (3). State v. Kubik, 235 Neb. 612, 456 N.W.2d 487 (1990)" The text of the first section of the local DUI law reads "(a) While under the influence of alcoholic liquor or of any drug;" Gives good reason to believe the true meaning of the statute relates only to the influence of external substances.

Assuming the woman really has the condition she claims to have, driving on a flat may still be considered negligent or careless driving, and the condition itself may be grounds to revoke her drivers licences.

Submission + - PINE64 Promises to Be the World's First $15 Gaming Machine

prisoninmate writes: PINE64 is a versatile single-board computer, which is capable of running the latest versions of the Android mobile operating system, as well as any other modern GNU/Linux distribution on its open-source hardware, including Ubuntu Linux and OpenWrt. Among the technical specifications of PINE64, we can notice a Quad-Core 64-bit A53 processor running at 1.2Ghz, up to 1GB DDR3 RAM, a Dual-Core Mali 400-MP2 GPU with 4K HDMI output, up to Gigabit Ethernet, two I/O expansion slots, two USB 2.0 ports, Bluetooth 4.0, Wireless 801.11 b/g/n, as well as an expandable MicroSD slot.

Submission + - A Hackable IoT Device That Can Kill People: "Smart" Gas Detectors (softpedia.com)

An anonymous reader writes: According to a recent ICS-CERT advisory, the Midas and Midas Black gas detectors sold by US hardware firm Honeywell are vulnerable to remote cyber-attacks. There are two vulnerabilities. For the first issue, successful exploitation allows attackers to bypass the authentication process and make critical changes to the gas detector's settings. The second issue involves the improper encryption of authentication details, which are sent out in cleartext, and allows anyone to grab them if they are in range.

Submission + - Disease Threatens 99% of the Banana Market (washingtonpost.com)

An anonymous reader writes: In the 1950s, Panama Disease wiped out the dominant type of banana that was imported worldwide. Banana-growers had to switch to a different strain, the Cavendish banana, at great expense. Now, a new study finds that a more virulent strain of the disease is directly threatening the Cavendish banana. Banana plants are dying from it throughout Asia, Africa, the Middle East, and Australia. It hasn't reached Latin America yet, which is good — that's where the vast majority of the world's bananas are produced. But the researchers say it's just a matter of time. "The latest strain is likely to put the risks of monoculture on display once more. And while scientists might find or breed a better one in the mean time, the reality is that this time around we don't have a formidable replacement that's resistant to the new strain of Panama Disease. Once it reaches Latin America, as it is expected to, it could be only a matter of decades before the most popular banana on the planet once again disappears."

Comment Re:Zork (Score 1) 60

"The consequences of an error are too great and modern operating systems are too complex to be made reliable enough." No, that's not true. Linux, Windows NT, and Darwin/OS X are not reliable enough, but neither is DOS for current standards. You'd be looking at RTOS, QNX, L4 or similar embedded real-rime operating systems that were designed from the ground up for reliability. You could absolutely re-implement these control system and make them better than they were before. The issue is why spend the money to fix what ain't broken?

Submission + - Hackers Get Lazy, Build Trojan on Top of Android Rooting Utility (softpedia.com)

An anonymous reader writes: Instead of creating their own exploits, some lazy Chinese hackers took the Root Assistant Android rooting toolkit and remodeled it into a trojan, which they packed inside copies of legitimate apps (distributed via unofficial app stores). Until now, only seven apps were repackaged, and only 600 users infected. A weird thing: there's a XML file in the trojan that prevents it from infecting Chinese users.

Slashdot Top Deals

A meeting is an event at which the minutes are kept and the hours are lost.

Working...