Forgot your password?
typodupeerror

Comment: Re:I wonder how many times... (Score 1) 158

by cavefrog (#37040502) Attached to: DHS Creating Database of Secret Watchlists
Your freedom and privacy are secure. All you need to do is register for the DoNotWatchList and they are not allowed to watch you. I hear it's a $10,000 fine if you sign up for the do-not-watch-list and you catch them watching you anyway.

So... you mean they fine you $10,000 if you catch them watching you?

Comment: Re:I know it's usually thought of as old, but... (Score 1) 146

by cavefrog (#34948302) Attached to: NASA Seeks Ham Operators' Help To Test NanoSail-D
I've been licensed since 1993 and have enjoyed ham radio immensely. I've also enjoyed the growth of the Internet, the shrinking size of cellphones, and the ability to send mail via my computer. These technologies are NOT mutually exclusive, and I'm getting tired of people telling me ham radio is dying because the Internet made it superfluous, or that cellphones were the beginning of the end for this hobby/service.

Of course, if you hear something repeated enough times it starts to sound like the truth, so I decided to try and google some information. This is what I found:

http://kb6nu.com/ham-census/
http://www.ah0a.org/FCC/Licenses.html

I doesn't look to me like ham radio is dying at all. In fact it looks like it's growing - not as fast as the general US population, but it's not what I'd call dying, not by a long shot.

73 de KG8KS

Comment: Re:There is a reason... (Score 1) 466

by cavefrog (#32530346) Attached to: Google Introduces, Then Scraps, Bing-Style Background Images
Put it this way: today's experiment was New Coke. When you're the number 1 brand, it's stupid to make your product taste more like the number 2 brand. I'm baffled why Google even tried this.

So they could switch the sugar in their search page with high fructose corn syrup without anyone noticing?

Comment: Re:drinking the kool-aid much? (Score 1) 277

by mgblst (#32025250) Attached to: Facebook Is Transcoding Video For iPad

Apple's brilliance is in marketing.

Anyone who says this is ignorant of what Apple offers, and ignorant of marketing as well.

I guess it is their brilliant marketing strategy that has kept Mac from having any virus infections.

I guess it is their brilliant marketing strategy that means I never have to reboot my mac, unlike my Windows PC.

I guess it is their brilliant marketing strategy that means I don't have to disable all their eye candy, unlike the brand new Windows 7 machine I have at work, that looks ridiculous until I did.

I guess it is their brilliant marketing strategy that made the first usable smartphone, that every single other phone produce is now copying.

I guess it is their brilliant marketing strategy that produced the first ipod I actually wanted to buy (the iPod Touch), and had superior internet handling than any other device out there. And still does.

I could go on, but you are probably too stupid to concede these points.

Comment: Re:Good luck with that. (Score 2, Insightful) 743

by cavefrog (#26304447) Attached to: Volvo Introduces a Collision-Proof Car
Thanks for the constructive criticism. Maybe I should have been more clear. Here's an example: I had a guy cut out in front of me from a driveway. He was looking the other way, and I would have t-boned him had I not been alert. As it was, I couldn't react quick enough to use the horn, but I was quicker on the brakes. I stopped with a loud screech, just short of hitting him, and his head snapped around to look at me. I still remember the shocked look on his face, and I'm sure he'll remember to make sure traffic is clear in *both* directions before pulling out into the road next time.

That's when I realized that people honk their horns for many different reasons - they're irritated, they're trying to flag down a friend, and sometimes it's to indicate danger - but screeching tires almost always mean danger. Maybe the horn would have had nearly the same effect, but there's also the fact that fumbling with the horn would have made swerving more difficult, had I needed to. And it's nice to think that that guy maybe has a clearer memory of the incident than he would have had otherwise, and will remember to be more careful next time.

Comment: Re:Iconic... (Score 5, Funny) 356

by cavefrog (#26169167) Attached to: Majel Roddenberry Dies At 76
"My wife and I were just discussing her the other evening; while watching WALL-E. Feeling sad that pixar didn't cast her as the voice of the ship's computer. Instead we got a vague homage to Alien in Sigourney Weaver."

Hmm. And Sigourney Weaver played the part of Gwen DeMarco in Galaxy Quest - a person who's job it was to repeat what the computer was saying.
Privacy

Digital Credentials Offer Enhanced Privacy 49

Posted by kdawson
from the cypherpunks-write-code dept.
John Q Random writes "Stefan Brands's company credentica.com announced their U-Prove library and SDK implementing ID tokens — also known as digital credentials or private credentials. (Private Credentials are a cool PKI replacement and anonymous e-cash tech that allows you to prove certified attributes like age, credit rating, group membership, etc. without revealing who you are; to allow you to have a digital life without the digital dossier effect inherent in a central databases.) Following this announcement, Adam Back announced credlib, an open source implementation of Brands credentials (and the older more basic Chaum certificates). These developments relate to recent news from IBM's Zurich labs on their identity-mixer project (previously discussed on Slashdot) that is based on the less efficient Jan Camenisch and Anna Lysyanskaya credentials."
Security

+ - Google Maps used to locate phishing victims

Submitted by Damon Hastings
Damon Hastings (666) writes "http://www.techworld.com/security/news/index.cfm?n ewsID=8077

Okay, the story here is that it is once again possible to download a trojan merely by visiting a web page. All articles I've found have unfortunately focused on a single exploit of this vulnerability, and thus the articles are nearly irrelevant. The vulnerability is what matters. If it isn't patched soon, you could see millions of infections from more creative exploits in the very near future. If any hacker is able to smuggle the trojan onto even a single major website, he could net millions of victims.

Does anyone know which vulnerability is being used? Or what browser(s) are affected? Is it just Internet Explorer 6? IE7? How long has Microsoft known about this vulnerability, and when will they fix it (or have they already?) I can't find any useful articles on the net — they're all just clones of this one.

The Google maps bit is of course completely irrelevant — the ability to map IP addresses to physical locations has been widely and publicly available since before Google existed. Google has no culpability here, despite the misleading reporting done by the major news agencies."
PlayStation (Games)

+ - PS3 Firmware Version Check Circumvented

Submitted by
Chouonsoku
Chouonsoku writes "Before yesterday, PlayStation 3 owners had to be running the latest system firmware in order to access the PlayStation Network. The PlayStation Network allows users to play their games online, download demos, trailers and add-ons for their games. However, with a simple DNS request redirection, the firmware check becomes null and void, allowing users to access the PlayStation Network from any firmware, up-to-date or not."

You don't have to know how the computer works, just how to work the computer.

Working...