Forgot your password?

Comment: Is this a troll article? (Score 1) 121

by dsoodak (#47234131) Attached to: The Computer Security Threat From Ultrasonic Networks
As one person commented when the last version of this went around, the sound card hardware or driver would have to have something like a TCP/IP stack built in to the microphone input. In other words, the only way a computer would be vulnerable is if it already has an ultrasonic communication feature installed. The only way I can see this happening is possibly at the behest of a certain agency which has a history of covertly installing security vulnerabilities, but they would probably just put it in the WiFi.

Comment: Simple solution: 1 second increments (Score 1) 246

Have the servers record all trading requests for the last 1000ms in encrypted form, then do all the trades at once. There are almost no real-world economic factors (ie sales, storms, new patents, employees hired/fired, etc.) that happen even this fast, so the only people who would complain are those who make money specifically from high speed trading games.

Comment: how can they use the stolen username (Score 1) 448

by dsoodak (#46105223) Attached to: Developer Loses Single-Letter Twitter Handle Through Extortion
Maybe I just don't know enough about how law works in this area, but it seems like everyone now knows that "@N" is stolen. What can the hacker do except post "hey, I'm the anonymous person who stole this account"? Is it legal to buy a stolen Twitter account? Can't he just contact the company and get it back? If regular identity theft worked this way then you'd get police saying "sorry sir, but he has your name, SS, and DOB, so he can now use your identity in any way he wants"

Comment: he does have a point, but maybe goes too far (Score 1) 312

by dsoodak (#45970627) Attached to: Why Standard Deviation Should Be Retired From Scientific Use
I agree that mathematicians may become imprinted on standard deviation and forget that it is only used because it is easier to work with than average absolute deviation (ex: the derivative of x^2 is continuous, unlike abs(x)), and that less technically inclined readers might not realize there is a difference. However, they ARE usually pretty close (I don't have a reference, but I once ran a simulation comparing the 2 using random data with a Gaussian distribution and the curves matched exactly), and its harder to find exact solutions with average absolute deviation. On the other hand, it wouldn't hurt to use "MAD" occasionally on a data set to make sure that the standard deviation gives results that are meaningful as a measure of "deviation".

Comment: Using labview compiler for FPGA (Score 1) 365

by dsoodak (#45903161) Attached to: Ask Slashdot: How Many (Electronics) Gates Is That Software Algorithm?
Haven't done this myself, but you can evidently run Labview programs ("virtual instruments") on some FPGA chips. You'd have a good estimate (plus an actual digital circuit) if you translated your code to labview (I believe the actual language is called "G") and found a copy of the add-on which turns this into verilog. -- Dustin

Comment: RTOS on the chip that controls wireless, etc. (Score 3, Interesting) 118

by dsoodak (#45647075) Attached to: CyanogenMod Integrates Text Message Encryption
There was an article posted on either slashdot or boingboing which linked to the following: Summary: the (usually) proprietary firmware on the chip that controls real-time functions such as wireless communication (which requires so many different standards to be adhered to that it ends up being a real mess and rarely rewritten) is surprisingly easy to hack. I believe there was a quote that you could get remote code execution after sending it a string of less than 100 bytes. It also mentioned that the chip with the main OS is often a slave to the one with the RTOS. Just curious if anyone knows if CyanogenMod accounts for this particular type of security vulnerability.

Comment: real reason people are afraid of life extension (Score 1) 625

by dsoodak (#44611793) Attached to: Aging Is a Disease; Treat It Like One
Exponential population growth is still happening regardless of lifespans, and genetic evolution will continue as soon as someone figures out how to use something like a retrovirus to make changes to an adult's DNA. I suspect that one of the main psychological reasons for resistance to life extension technology is the fear that you will be expected to stay alive after you are bored with life. Dustin p.s. and there is always the attachment to traditional personality traits/programs which are generally optimized to give short-term competitive advantage at the expense of safety and long term physical and mental health.

Your mode of life will be changed to EBCDIC.