Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
What's the story with these ads on Slashdot? Check out our new blog post to find out. ×

Comment Re:they don't ban installation of open source (Score 1) 238

My Nokia N900 has a separate firmware blob for the WiFi chip (no idea if the wireless radio enforces any digital signature on that) and it figures out what regional settings (FCC etc) to use by obtaining the current country from the cellular network or if it cant do that, reading it directly from a write-once part of the file system.

I have seen routers out there that have separate chips to do the WiFi stuff as well. I see no reason you couldn't lock down the firmware for these separate CPUs (so they will only run digitally signed firmware, just like they do now for the CPUs used for cellular radios) and have a write-once memory area somewhere that chip can see where the correct region information is written at manufacture time. Physically impossible for the main CPU to talk to the radio in those cases since the radio/RF part is only connected to whatever CPU is running the WiFi firmware and not to the main CPU.

Comment Re:Older browsers (Score 3, Informative) 40

Assuming you aren't on a browser that is so old it doesn't support more secure algorithms (AES I believe is the one everyone should be using instead of RC4) then what will happen is that people still using RC4 certificates will switch to AES certificates and your browser will be more secure as a result.

Comment Re:No government role? (Score 1) 145

My guess is that Turkey has some sort of public prosecutors office that prosecutes criminal cases and it is that office that is the other side of the court case.

These offices are generally also independent from the government precisely to prevent political interference in the legal system. (at least they are in Australia)

Comment Re:How did this boondoggle happen? (Score 1) 491

Its all about funneling billions of dollars into the coffers of Lockheed Martin (and providing jobs building F-35s for a whole bunch of people who will then turn around and vote for the politicians who gave them those jobs)

The politicians dont care if the F-35 is a piece of crap aircraft, they just care that it gets built in the right congressional districts.

Comment Re:GPGPU (Score 1) 45

The plans Intel had for Larabee seemed like a good idea. Take an old Pentium core, add a bunch of fast special-purpose instructions specifically designed for doing the sorts of operations that 3D graphics require, stick a bunch of these cores on a single chip and add a few special blocks for certain operations (as well as stuff to actually display stuff on the screen)

It sounded like an interesting idea (and would have been a LOT more open than anything from AMD or NVIDIA) but Intel decided to cancel the project because they didn't think they could match AMD or NVIDIA on price.

Comment Stop using Flash for ads (Score 1) 259

If the ad networks stopped using Flash for ads and switched to only using HTML5, the amount of nasty stuff would drop dramatically. Are there exploits in browsers where a dodgy non-Flash ad could get in? Sure there are. But its much harder for malware to exploit those holes, especially if you keep your browser up-to-date (and aren't doing something stupid like connecting a browser that is no longer receiving security updates to the open internet)

At the very least, a non-Flash malware ad would need a bunch of different exploits for various different browsers (Firefox, Chrome, Internet Explorer at the very least) and different versions of those browsers (an explot that works on IE6 on Windows XP isn't going to work on IE11 on Windows 10 for example). Also, non-Flash ads will (by virtue of their HTML/JS source being visible) be easier for ad networks to vet and examine for dodgy stuff.

Comment This can only be good for security (Score 1) 221

I would be willing to bet that by far the vast majority of cases where advertizing networks are spewing out malware (either because they have been hacked or because they didn't properly review an ad that contained malware) are using exploits in Flash to get their malware installed on victims PCs. If more ad networks (especially the really big players like Yahoo, Google/DoubleClick, Microsoft etc) drop Flash and stop serving Flash ads, it will be much harder for malware authors to use dodgy Flash files as a vector for their attacks.

Yes browsers can have security holes in their HTML5 implementations but to exploit that a malware author would need to sniff the OS and browser versions and feed the correct malware to the user depending on which exploits they are potentially vulnerable (which is both harder for malware authors to do and easier for ad networks to detect)

Comment Re:Demand segmentation 101 (Score 1) 379

That doesn't happen here in Australia.
When I booked a return flight recently, I was shown all the possible flight choices for my outbound leg (and their costs) and all the possible flight choices for my return leg (and their costs). What flight I picked for my outbound leg had no effect on the costs offered for the return leg and vice versa.

Comment Computer lab in high scool (Score 1) 136

My first real experience of Linux was seeing other people installing Linux on a machine in the computer lab at school. (probably around Windows 3.x time frame and I think possibly some version of RedHat). I didn't actually get to use it though (I did spend a lot of time in those labs and got busted trying to pirate Visual Basic off the Windows machines :)

I also had experience with it at University with various courses that involved Linux in some way.

As for personal use, my first use of Linux was installing some version of Mandriva (exactly what hardware I ran it on I don't have a clue). After that I installed Gentoo on an old Pentium 4 box that a family member no longer needed (ironically it was a computer that used to be mine before I sold it to said family member as an upgrade to whatever they had at the time).

I used that Gentoo box for some brief development work for a Motorola Z6 linux phone (including kernel compilation). At some point something went bad in the system and I didn't do anything with it for a while.

Then after I took it to a repair shop who cleaned out all the dust and gunk, redid the thermal goop on the CPU and replaced the busted video card with a working card my system started working again and I used that system to do a lot of software work for my Nokia N900 linux phone (software work that has made a number of other N900 enthusiasts very happy).

That system lasted all the way until just before xmas 2013 when I moved to the other side of Australia and decided the old clunker of a PC wasn't worth moving (especially since I only had a really old really heavy CRT monitor that I was using with it).

Since then my use of Linux has been confined to my Nokia N900, a VMWare VM I set up for N900 development (which I haven't used since I bought an SSD and re-installed Windows) and various interactions of various sorts with computers I dont own out there in the cloud :)

Would love to get back into Gentoo again though but I dont have any hardware I can run it on (maybe if I ever get enough money I can upgrade this Core 2 Duo to a nice Core i7 or something and use the Core 2 Duo as a Gentoo box :)

Comment Re:It's patch-able in principle (Score 2) 87

The way this works is that when you start one of the cars with this security hardware in it a chip in your car key talks to a chip inside the cars computer using secrets stored in both chips. If the secrets match, the car will start.

What the researchers figured out was a way to start the car without having the correct key.

Even if they had chips that were 100% compatible in hardware and software but with a new more secure algorithm, the cost to replace all of the chips in every car and every key (and to program the cars and keys with the correct secrets so that the right keys will open the right cars) would be astronomical.

You are false data.

Working...