Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:One stray ; burned a week... (Score 1) 268

My worst bug ever was a third order bug (A changes B, which later results in C being changed, which finally manifests as visible defect D).

This occurred four hours into a full bore system integration test.

This was using a Z8000 CPU We wound up having to put an ICE on the thing, but because of all the radio signals, the ICE cable had to go into the case, the gap sealed with foil, and the ICE cable also wrapped in foil. Then we recorded (using analog cassette tape) all the FSK radio signals, and play them back into the boxen.

The Z8000 compiler used jump tables and the CPIR (compare/increment/repeat) instruction to implement switch statements. I was the kernel guru, and the error appeared out of a kernel error message. We didn't have any memory protection.

What happened was that someone ignored a return value, and wound up indexing something by -1, which eventually wound up modifying a switch table...

Comment Told you so. (Score 1) 160

Don't computerize the simple mechanical parts of a car. Just DON'T. You're collective playlists aren't worth the inevitable police and attacker control and surveillance of our cars.

No, you and you, you can't outsmart them. You can't be God King of Koding and Do It Right. There is always a way, if you permit freaking Turning machines to control your vehicle, for someone to take control.

A machine, a successful, elegant device that occupies the lowest possible fail state, is one that has as few moving parts as possible. Any turing box, by which I mean a programmable computer, that connects in is a complete failure of design if it is not utterly necessary. Brakes, steering, locks. and acceleration have been mechanical systems for over a century and a half. No need to interface hundreds of computers, sensors, and telematic holes into something that already WORKS.

Security

Remote Control of a Car, With No Phone Or Network Connection Required 160

Albanach writes: Following on from this week's Wired report showing the remote control of a Jeep using a cell phone, security researchers claim to have achieved a similar result using just the car radio. Using off the shelf components to create a fake radio station, the researchers sent signals using the DAB digital radio standard used in Europe and the Asia Pacific region. After taking control of the car's entertainment system it was possible to gain control of vital car systems such as the brakes. In the wild, such an exploit could allow widespread simultaneous deployment of a hack affecting huge numbers of vehicles.

"The number of Unix installations has grown to 10, with more expected." -- The Unix Programmer's Manual, 2nd Edition, June, 1972

Working...