Forgot your password?
typodupeerror

+ - Conservatives Release New Video Proving Global Warming is a Hoax->

Submitted by Anonymous Coward
An anonymous reader writes "Conservative Louisiana House of Representative Lenar Whitney has released a new four minute video on Youtube proving once and for all that global warming is a hoax. In the heavily referenced and peer reviewed video, Whitney puts to rest global warming — something "any ten year-old can invalidate." She points out the important fact that our planet "has done nothing but get colder each year." The highly polished video with special effects clearly exhausted all of Whitney's cognitive powers in researching and backing up each point in her proof that global warming is the "greatest deception in the history of mankind." Fat cat scientists and their propaganda machines don't stand a chance with this hardworking former oilfield equipment company sales employee to set the record straight."
Link to Original Source

Comment: Over at Dice? (Score 4, Insightful) 311

by eldavojohn (#47560113) Attached to: Programming Languages You'll Need Next Year (and Beyond)

Over at Dice

But we are at Dice, sir:

[Querying whois.publicinterestregistry.net]
[whois.publicinterestregistry.net]
Domain Name:SLASHDOT.ORG
Domain ID: D2289308-LROR
Creation Date: 1997-10-05T04:00:00Z
Updated Date: 2014-03-14T22:12:11Z
Registry Expiry Date: 2015-10-04T04:00:00Z
Sponsoring Registrar:Tucows Inc. (R11-LROR)
Sponsoring Registrar IANA ID: 69
WHOIS Server:

Referral URL:
Domain Status: clientTransferProhibited
Domain Status: clientUpdateProhibited
Registrant ID:tuE8gFbzWFO9qSj2
Registrant Name:Host Master
Registrant Organization:Dice Holdings, Inc.
Registrant Street: 1040 Avenue of the Americas
Registrant City:New York
Registrant State/Province:NY
Registrant Postal Code:10018
Registrant Country:US
Registrant Phone:+1.8557527436
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email:hostmaster@slashdotmedia.com

Pros: Today's article has more content than the usual Dice front page linkage. Great article if you're not a programmer but feel stymied by the wide assortment of languages out there. Although instead of hemming and hawing before making your first project you're better off listening to Winston Churchill and sticking your feet in the mud: "The maxim 'Nothing avails but perfection' may be spelt shorter -- 'Paralysis."

Cons: It barely scratches the surface of an incredibly deep topic with unlimited facets. And when one is considering investing potential technical debt into a technology, this probably wouldn't even suffice as an introduction let alone table of contents. Words spent on anecdotes ("In 2004, a coworker of mine referred to it as a 'toy language.'" like, lol no way bro!) could have been better spent on things like Lambdas in Java 8. Most interesting on the list is Erlang? Seems to be more of a random addition that could just as easily been Scala, Ruby, Groovy, Clojure, Dart -- whatever the cool hip thing it is we're playing with today but doesn't seem to quite pan out on a massive scale ...

Comment: Quid Pro Quo (Score 1) 109

by El Jynx (#47522197) Attached to: Dutch Court Says Government Can Receive Bulk Data from NSA
And just what is our Dutch government giving back to the NSA? I'm pretty sure it's not fresh Dutch cabbages. The Dragnet is apparently global. How long until someone gets arrested just for blogging negatively about a politician? A banker? A NSA employee? This is an old, old cycle and marks the start of the end of an empire. Rome, Arabia and many others show this trend. Humans can and will conspire against each other in an ever growing bid for power until the masses once again have to overthrow the few. Only thing is, we can't win with pitchforks anymore, we need tanks and choppers. And they're decidedly harder to come by.
Technology

MIT Combines Carbon Foam and Graphite Flakes For Efficient Solar Steam Generati 110

Posted by timothy
from the science-fiction-future-awaits dept.
rtoz (2530056) writes Researchers at MIT have developed a new spongelike material structure which can use 85% of incoming solar energy for converting water into steam. This spongelike structure has a layer of graphite flakes and an underlying carbon foam. This structure has many small pores. It can float on the water, and it will act as an insulator for preventing heat from escaping to the underlying liquid. As sunlight hits the structure, it creates a hotspot in the graphite layer, generating a pressure gradient that draws water up through the carbon foam. As water seeps into the graphite layer, the heat concentrated in the graphite turns the water into steam. This structure works much like a sponge. It is a significant improvement over recent approaches to solar-powered steam generation. And, this setup loses very little heat in the process, and can produce steam at relatively low solar intensity. If scaled up, this setup will not require complex, costly systems to highly concentrate sunlight.

Comment: Re:in root? Am I missing something? (Score 2) 215

by benjymouse (#47335137) Attached to: Exploiting Wildcards On Linux/Unix

Er.. most of the exploits are only possible if one is root and/or the directory is writable for some other user (e.g. leon in this case).

Since one is root, one can do anything anyway so why bother with all this misdirection? If someone leaves world writable directories lying around (especially without the sticky bit set), then they deserve everything they get. Or is this some kind of "trap the (completely) unwary sysadmin" wake up call? If I see some strange named file (especially if I know I didn't put it there) I would investigate very, very carefully what is going on. I can't be alone in this - surely?

The point is that this can be used to trick a root user into issuing what he believes is a safe command. The combination of the text-reinterpreting shell and specially crafted file names combines into a seemingly innocent command ending up allowing the attacker (the creator of the specially crafted file) root access on the system.

It doesn't help that some (on the surface) idempotent commands like find packs a number of dangerous options that can be used to execute shell scripts, commands or remove files.

Comment: Some Public Records ... You Know ... Just in Case (Score 5, Informative) 448

by eldavojohn (#47304885) Attached to: $500k "Energy-Harvesting" Kickstarter Scam Unfolding Right Now
So a whois.net domain name lookup on their site yielded nothing. And there are suspiciously no patents mentioning "wetag" or "ifind" and the names they listed (Dr. Paul McArthur) are in patents but for cold fusion BS in California.

Surely, though, they must have registered the "iFind" trademark? And if you search on TESS we find:

Owner (APPLICANT) WeTag, Inc. CORPORATION TEXAS 3309 San Mateo Drive Plano TEXAS 75023

With an attorney listed as "Richard G. Eldredge" which corresponds to a local attorney. Before you deploy the door kickers to lynch somebody, that address is just somebody's $200,000 house and could possibly be a random address used by a jerk. Remember that it's entirely possible that this is all a front by some other actor and someone was paid western union/bitcoin to register this trademark through this attorney without realizing they were just being used by literally anyone in the world ... of course, kickstarter should have even better transaction details (hopefully).

Comment: It's not the worst idea (Score 1) 365

I actually did switch from a 2011 Macbook Air (the dual core 2GB RAM, 13" model) to a Surface Pro 1, a little while before the Surface Pro 2 came out. Why? Because, through gradual changes in my client base and their worlds, I found myself spending more and more time in powershell, Hyper-V management and other purely Microsoft centric tasks. So I ended up Bootcamping my MBA to Windows 8 (required for Hyper-V 2012+ management), so it was now basically a PC, anyway. Then, once a guy next to me got a DynaDock with his Surface Pro, I realised I could dock it to a couple of nice, big monitors and keyboard and mouse and it's frankly more powerful than my 2011 MBA was.

So I sold my MBA on eBay (at almost as much as I paid for it, amazingly - incredible resale value) and switched to the SP1, which I am still using. I have pre-ordered a SP3, in fact, because I have been so happy with it (we don't get the Surface Pro 3 in Australia until September). It's smaller, lighter, faster and better suited to my current working life. I also love the pen, as I now spend about 40% of my week in meetings.

So overall, I don't think this is a bad thing - I just don't expect it to get heavily taken up. I think most MBA and MBP users will prefer to stick with what they have. The trust is, I use my Surface Pro like a desktop or a notepad (a literal, paper notepad, not a laptop notepad). I basically never use it as an actual laptop unless I have no alternative but then again, I pretty much hate all laptops, compared to the desktop experience.

Comment: Re:Even more work for spies! (Score 1) 99

And to think that just the other day Microsoft were complaining that the NSA fallout was getting worse. Are they hoping to swamp them with simply too much data on Microsoft's servers?

So, would you expect Microsoft to hold it's breath while the lawmakers pull their collective behinds together to reign in the runamok NSA? Should they stop doing business while they wait for the political system?

Comment: Re:Is IPMI enabled? (Score 1) 62

by Gumbercules!! (#47193197) Attached to: IPMI Protocol Vulnerabilities Have Long Shelf Life
Oh sorry, forgot to say, yes, it's easy to find all IPMI devices on your network. Please take a look at: ftp://ftp.supermicro.com/utili... - you can download the IPMIView tool from there, which will find all IPMI devices on your LAN. The default password and username for all Supermicro IPMI is ADMIN and ADMIN, so, of course, super secure.

Comment: Re:Is IPMI enabled? (Score 1) 62

by Gumbercules!! (#47193191) Attached to: IPMI Protocol Vulnerabilities Have Long Shelf Life
The majority of IPMI would be enabled by default, yes - however the majority (not all, some are virtual IPMI) are on dedicated NICs - usually labelled management interface or port or something. They're not usable as a normal NIC (although as mentioned above, yes, some are virtual and share an onboard NIC). As such, you're best putting them in a different VLAN. We use differently coloured network cables for them, too, in our datacentre, so there's no confusion. They're in a different VLAN, on a different switch (makes sense to use a different switch as IPMI is usually 100mbit and not worth wasting space on expensive switches for) and only a handful of machines can see that network, which, frankly, if those machines got compromised, we'd be f*cked anyway (domain controllers, etc).

The default config for a Supermicro (which is what I use) is the IPMI is enabled and set to DHCP, so if you left it like that, yes, everyone on your network would probably be able to find it.

Comment: Re:Under the hood (Score 1) 187

by benjymouse (#47155313) Attached to: Windows 8.1 Finally Passes Windows 8 In Market Share

There's heaps of us who like Windows 8.x/2012, but Slashdot has its mind made up and every time there's a Windows 8 submission these idiots bring out their pitchforks while people like us just ignore it. So no, you're not the only one.

At this stage it looks like Microsoft could patch in a new Start Menu, throw in the option to use oh I don't know, KDE's menu or whatever your DE of choice is these days, put in a tool that converts fucking lead to gold, and donate 50% of their net profit to NASA, and people here would still hate it.

This.

The F-15 Eagle: If it's up, we'll shoot it down. If it's down, we'll blow it up. -- A McDonnel-Douglas ad from a few years ago

Working...