Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment: Two edged sword... (Score 1) 562

by kandresen (#48842907) Attached to: Obama: Gov't Shouldn't Be Hampered By Encrypted Communications
What always miss from these arguments is that such a tool is a two edged sword. If the government can do it, so can likely all other governments too, and it does not stop there. I know, you got nothing to hide for authorities, corrupted officials or not. Sooner or later you hear corrupt officials used their position to obtain and sell information such your vacation plan to criminals robbing homes, insurance companies about confidential information of your health, and so on...

Comment: Re:Legalities - should be confidential (Score 1) 301

by kandresen (#48374911) Attached to: Police Body Cam Privacy Exploitation

The work the police is doing does not automatically enter public domain, there is supposed to be clearence levels involved. Unrestricted, restricted and Confidential is the highest level. (Secret and Top secret only apply to army). When the police is to deal with special cases such as robbery, violence, etc, it is supposed to be a confidential case in mostly all cases.

Now the police face freedom of information requests, and the article is talking about the cost of evaluating what can be and cannot be relased - it is too expensive to go through and evaluate all the material, and they face a request to release ALL footage!

The most obvious policy should of course be
1) blanket requests cannot be made - all freedom request should be specific and for a purpose for the freedom request to be evaluated
2) the release should take into account who file the request. It is very different if a person unrelated with a case request the footage or if the person in the footage/his lawyer request the information. Confidential information may be given to the later two, whereas others only should get confidential information under specific conditions and all groups should likely sign confidentiality agreements if confidential infrormation is handed out. If the information is not viewed as confidential however, the information rules apply accordingly.

In other words, the way it is supposed to work we should track down and arrest someone who disclose confidential information obtained under a freedom of information request.

Comment: A much better method exist already and is even in (Score 2) 364

by kandresen (#46638761) Attached to: Your Car Will Tell You How To Hit the Next Green Light

Why have the car tell, when it is better to have the lightcross itself tell? The low tech solution is to simply show the countdown for when the light will change on the lightcross itself. You see a large counter sign the size of the traffic light triplet stating it will change in 37 seconds. You know it inmediately if you will reach it in time so no need to stress - you know it if you need to slightly increase the speed too, as well as you would know if you cannot make it.

I have already seen this system used extensively and it seem like a great success! The only reason you might not have heard is that the place it has been used for several years already is Havana, Cuba... I do not think they have the method patented, so go see and learn ;)

Comment: Re:But that's not the real problem. (Score 1) 1651

by kandresen (#41525171) Attached to: To Encourage Biking, Lose the Helmets

You are wrong here on both - requiring a helmet do absolutely discourage bicycling, and particularly the one mentioned here about sharing bikes in crowded places. Imagine you get to a stand and see there are a bike available - there is a 30 minutes walk, or 4 minutes ride on a bicycle to get to your destination, but did you bring a helmet? Or maybe you think they need to have every size helmets available on every stop?

And you want the negligence drivers away, not force the bicyclists to hold the responsibility in the event of accident, Do not give the car the excuses like - but you did not wear a helmet so its your fault - or something silly - the stronger is always responsible for the weaker, meaning:
- Drivers of motorized vehicles are responsible for pedestrians, bikers as well as motorbikes.
- Motorbikes are responsible for bikers and pedestrians.
- Bikers are responsible for walkers.

Just increase the penalty for the negligent drivers that cause accidents - imagine the threat of having your license revoked should you act negligent towards bikers and those walking. I bet it would change the awareness of the drivers at once!

Comment: Re:Here are a couple of ways, but... (Score 1) 440

by kandresen (#41205995) Attached to: Ask Slashdot: How Do I De-Dupe a System With 4.2 Million Files?

I did not pay attention to the files being on windows which most likely mean NTFS. Everything should still be possible using a linux livecd except for the last command to make hardlinks... I do not believe NTFS have anything like that, it is a feature of linux file systems such as ext2/ext3/ext4.

Comment: Here are a couple of ways, but... (Score 1) 440

by kandresen (#41205855) Attached to: Ask Slashdot: How Do I De-Dupe a System With 4.2 Million Files?

This gives an sha256sum list of all files assuming you are in linux and writing it to list.sha256 in the base of your home folder:

find /<folder_containing_data> -type f -print0 | xargs -0 sha256sum > ~/list.sha256

You may replace sha256sum with another checksum routine if you want, such as. sha512sum, md5sum, sha1sum, or other preference.

now sort the file:

sort ~/list.sha256 > ~/list.sha256.sorted

(notice, this create a sorted list according to the sha256 value but with the path to the file as well. Assuming you would want to manually check some lines, this might be helpful, but if you only want the machine to check there is really no need to include the file and path data in the output giving a much smaller duplicate list file. )
without paths the command could be something like

cat ~/list.sha256 | awk '{print $1}' | sort > ~/list.sha256.chksum.sorted

You could now find duplicates by doing one of the following:

uniq -c ~/list.sha256.chksum.sorted | while read count chksum; do if [ $count != 1 ]; then grep ^$chksum ~/list.sha256 >> ~/list.duplicates; fi ; done

or in the first case

cat ~/list.sha256.sorted | awk '{print $1}' | while read count chksum; do if [ $count != 1 ]; then grep ^ $chksum ~/list.sha256 >> ~/list.duplicates; fi ; done

Now with the list of duplicates come the important question... Does meta data of the files such as in which path it is, date and time, file permissions etc matter to you?

Regardless I would usually recommend doing a binary comparison of the files as well to fully ensure the files are the same, before merging...

The quick and dirty removal of duplicates would be

oldchecksum='' ; cat ~/list.duplicates | while read checksum currpath; do if [ "$oldchecksum" == "$checksum" ]; then rm "$currpath"; else oldchecksum = $checksum ; fi; done

If wanting to preserve meta data, then the best way might be to use hard links to the original maintaining setting the hardlink to date and time of duplicate.

oldchecksum='' ;oldpath=''; cat ~/list.duplicates | while read checksum currpath; do if [ "$oldchecksum" == "$checksum" ]; then mv "$currpath" "$currpath".dup; ln "$oldpath" "$currpath"; touch "$currpath" --reference="$currpath".dup ; chmod "$currpath" --reference="$currpath".dup ; chown "$currpath" --reference="$currpath".dup ; rm "$currpath".dup ; else oldchecksum = $checksum ; oldpath=$currpath; fi; done

Do note that I did not test any of these commands and I might have missed something that make these commands eat important data too... Check on something unimportant before trying!

Comment: Re:Of all the priorities... (Score 1) 328

by kandresen (#40920175) Attached to: Debian Changes Default Desktop From GNOME To XFCE

It believe it is a good priority...
The question is - is it good enough for most? - assuming it is, then advanced users who want more features can get it. The same happens with music players, software to read documents such as pdf files and so on all the time. Distros don't tend to install the most feature-rich version, but what is good enough for most, and let it be your choice to upgrade if you so desire something more.
It is much more irritating to replace a massive framework with a lighter one than the opposite.

I have not used Xfce since the time I used Gentoo now, but I used to like XFCE a lot! I am using Gnome2 now, and cant say I have decided yet what desktop I will go with going forward. There where some issues with Xfce when I used it years ago, Gnome2 has issues to - I would for example like to use menus on the left/right for more screen real-estate like I used to in Xfce, however I have found Gnome2 to handle side menus badly. I don't remember anymore what I did not like with Xfce anymore, but hopefully that has been fixed :)

I am a bit surprised Gnome3 is that heavy though as I understood it is more focused on plugins for adding functionality.

Btw. the Debian Net Install is usually what I use for servers, but for desktop I always use CD media - I NEVER use DVD media as it usually add tons of bloat I really prefer not have there.

Comment: Re:Shackles (Score 4, Interesting) 549

by kandresen (#40681237) Attached to: Richard Stallman Speaks About UEFI

It is even worse than that - if it is wont be possible to change the certificate on a machine and that certificate get compromized, then it means there is no security anymore neither... The device is now junk after maybe one month of owning it. You need a new device regardless. And dont tell me you have not heard of the certificates for BlueRay and so on being compromised...

The alternative - Microsoft can remotely update the certificate, but that also mean any remote attacker who break the key can change it... Again, no security... The only way to make it secure in the long run is to allow users change the key when needed.

Comment: Scandinadvia is less than 0.3% of the world... (Score 1) 786

by kandresen (#40616849) Attached to: Nature: Global Temperatures Are a Falling Trend

It is based only on Scandinavia which is less than 0.3% of the area of the world or 0.8% of all earths landmass...

It should be common knowledge that local weather cannot be extrapolated to world weather. To use this report to calculate global weather is for sure bad science, despite the finding for Scandinavia being interesting!

Before attempting to extrapolate to the world, we need to add samples from other regions too, it should not be difficult to get the same type of samples from trees from different placen in Canada, and countries of the former Soviet Union, but we do likely need samples from the southern hemispare and tropical areas too to be able to extrapolate the temprature for the world.

Comment: So doctors will not receive their fields updates, (Score 1) 170

by kandresen (#40481323) Attached to: UK Considering Automatic Web Filtering For Adult Content

I once worked for an ISP and we did try to help our clients with central filters against spam, however, general filters we found quick enough could not be applied as part of our recipients were employed in Pharmacies, were doctors, where system administrators who wanted updates about the latest threats, and the list goes on. Essentially whatever we tried to filter had legitimate use too! Sure we can say the hotel doctors/pharmacists need to find alternative ways to communicate, but they are not alone.

I think this type of legislation typically cause more problems than it is worth.

Comment: Re:get out the hot glue gun (Score 2) 177

by kandresen (#40302161) Attached to: Thunderbolt On Windows: Hardware and Performance Explored

IOMMU seems like a good solution for the Thunderbolt DMA problem!

Thanks to your post I am now aware Intel come with IOMMU when the hardware has VT-d support and that support is activated (in bios?). The same is true with AMD machines with HyperTransport. I assume HyperTransport just like VT-d must be activated in BIOS for protection to be active since a disadvantage of activating IOMMU is degradation of the DMA performance.

I must say I had eliminated any laptop with Thunderbolt from buying consideration up until finding this post, Thanks to this I will give it a second look!

Comment: Re:get out the hot glue gun (Score 1) 177

by kandresen (#40301819) Attached to: Thunderbolt On Windows: Hardware and Performance Explored

It seem like you live in dinasaur times beliving everyone only use desktops... I have not had any PCI-E card exposed at all on any of my recent laptops! Now I do not know if hot-plugging a card to PCI-E in fact can be done without a system crash, but you would need to open the case for this in a way that for sure would take some more serious action.

Now compare that with simply plugging a Thunderbolt cable to a machine - laptop or desktop...

Comment: Re:Can people actually tell the difference? (Score 1) 607

by kandresen (#39828409) Attached to: <em>Hobbit</em> Film Underwhelms At 48 Frames Per Second

I believe 24 frames at one point was believed to be the threashold but I cant other than believe that must be false: In Europe the TV framerate was always 30 frames and from the time I studied in the states and I could clearly see the difference!!! I have a hard time believing half the population of the world does not notice that difference. By all the people stating 48 fps is too realistic it kind of proves the point...

: is not an identifier

Working...