Forgot your password?
typodupeerror

Comment: Re:'Into space' (Score 3, Interesting) 425

by kj_in_ottawa (#42715577) Attached to: Iran Says It Sent Monkey Into Space and Back

Correct, an orbit is a lot harder than just achieving an altitude.

I do however, disagree with you about the conclusion you are trying to prove with your analogy.

If you have never built any sort of a vehicle before, evolving from the toy stage through many many many steps to a formula 1 car may actually be a logical process, and therefore is relevant.

Likewise, a progression from earthbound to an orbiting space station and beyond, may include a developmental step of placing a monkey in a missile.

Cheers
Kenny

Comment: Re:My Ass (Score 1) 633

by kj_in_ottawa (#42655715) Attached to: Student Expelled From Montreal College For Finding "Sloppy Coding"

IANAL
Canada indeed has a couple laws that would be relevant

Most relevant, The Criminal Code section 342 "Unauthorized use of Computer" http://www.efc.ca/pages/law/cc/cc.342.1.html.
This criminal code section is subject to colour of right, meaning if you have permission from the system owner to perform testing, this section and owning the tools to perform this section become OK. If however you do not have permission, the investigation into this breach could expose other CCofC violations probably section 430 "Mischief", Section 351 "Possession of Break-in instruments",. as well as something from sections 354-360 which are the possessions of proceeds of crime sections.

Side note, don't break-in using any technique that involves intercepting someones communications (eavesdropping, man-in-the-middle) as that falls under privacy laws (CCofC 183-196) which are much more strict and can't be waived by the system owner, only by the sender or recipient of the communication.

IANAL, but for this case I would say the first time he found the vulnerability, there was no intent to commit the crime, he stumbled across it. The second time he was checking the other system to see if the flaw was there which seems like an unauthorized use of computer system. If he had asked the system owner (or manufacturer I suppose) if he could perform tests to ensure the flaw in the system would not be made worse by his code or his system would not be affected by the flaw, he would have been on better legal footing.

and once more IANAL

Cheers
Kenny
CCofC = Criminal Code of Canada
IANAL = I Am Not A Lawyer

The Almighty Buck

EA Flip-Flops On Battlefield: Heroes Pricing, Fans Angry 221

Posted by Soulskill
from the put-your-money-where-your-gun-is dept.
An anonymous reader writes "Ben Kuchera from Ars Technica is reporting that EA/DICE has substantially changed the game model of Battlefield: Heroes, increasing the cost of weapons in Valor Points (the in-game currency that you earn by playing) to levels that even hardcore players cannot afford, and making them available in BattleFunds (the in-game currency that you buy with real money). Other consumables in the game, such as bandages to heal the players, suffered the same fate, turning the game into a subscription or pay-to-play model if players want to remain competitive. This goes against the creators' earlier stated objectives of not providing combat advantage to paying customers. Ben Cousins, from EA/DICE, argued, 'We also frankly wanted to make buying Battlefunds more appealing. We have wages to pay here in the Heroes team and in order to keep a team large enough to make new free content like maps and other game features we need to increase the amount of BF that people buy. Battlefield Heroes is a business at the end of the day and for a company like EA who recently laid off 16% of their workforce, we need to keep an eye on the accounts and make sure we are doing our bit for the company.' The official forums discussion thread is full of angry responses from upset users, who feel this change is a betrayal of the original stated objectives of the game."
Wireless Networking

+ - VoIP Over WiFi for Businesses

Submitted by
Michael Talbert
Michael Talbert writes "The convergence of data and voice networks in the business environment takes on a new twist with the emergence of wireless networking. The freedom of mobility offered to users in a wireless LAN has proven to provide a noticeable boost in productivity, efficiency, and employee morale. No longer is the work force tied to their desk when on the job. Workers can access company files and receive important communications from anywhere on the company campus that's in range of a wireless access point.

With voice communications thrown into the mix, mobile users can stay in touch while roaming the property inside or out, and even on the road. The acceptance of the fixed to mobile convergence concept by the telecommunications industry only promises to fuel the fire for the adoption of VoIP over WiFi networks.

The Challenges of Implementing VoIP over WiFi Networks

As with any emerging technology, there are challenges to overcome. The development of the converged network, i.e. data and voice on the same IP based LAN, while yet to be an established norm, is proving to be beneficial for businesses from both a cost and productivity perspective. Adding the prospect of VoIP over a wireless network brings up a whole new set of issues.

VoIP is a time sensitive technology. Calls must be set up and authenticated, and voice packets must arrive at their destination without interruption and on time. This requires a near continuous network stream, uninterrupted by less sensitive data transmissions. The implementation of Quality of Service techniques on wired LANs assure that these voice packets receive priority, and call quality issues such as latency, jitter, and packet loss have been sufficiently addressed.

Enter the standards based wireless network, a technology in an earlier stage of development, and more challenges occur. While today's wired network provides plenty of bandwidth for both voice and data to coexist, WLANs provide less bandwidth, and Quality of Service issues must be revisited. Security measures such as authentication and encryption must be implemented and can add to the problem by increasing the size of the voice packet. Additionally, users on the move will traverse wireless access points where handoffs must be quick and smooth.

The IEEE 802 standards governing wireless technology are evolving rapidly and promise to deal with a broad spectrum of WiFi issues (see sidebar). Increasing the bandwidth available, prioritizing voice packets for QoS, authentication and encryption protocols for security, and enhanced roaming techniques are all being addressed.

Also in development is the wireless technology commonly known as WiMax, providing for the implementation of high bandwidth wireless communications covering distances of up to 30 miles. The evolution of WiMax could prove of great consequence to developing countries, as well as Metropolitan LANs.

Security in a VoIP/WiFi Network

Companies wishing to implement wVoIP must take security issues into consideration from the start. As in any IP network, the dangers of hackers, denial of service, highjacking and spam, all lurk in the shadows.

Because a wireless network uses radio frequencies as its transmission media, the security normally provided by a firewall in a wired network is not sufficient, simply because of the physics. Whereas to break into a wired LAN requires hackers to either physically be inside the network or to hack in through the Internet, in a WLAN they can grab network transmissions from the air while parked across the street. The security issues that network managers must consider in a VoWLAN are the privacy of conversations, and the protection of the network infrastructure.

For WiFi networks, security has had a shaky start with the implementation of WEP as its security mechanism. WEP provides for authentication and encryption between the user and the access point, and was found to be easily hacked. The 802.11i standard, adopted as WPA2 (Wireless Protected Access), provides for more robust security by requiring two way authentication between the user and the network, and uses AES (Advanced Encryption Standard) as its encryption engine.

As network managers plan the rollout of a wireless VoIP network, the greatest security threat they face is improper implementation. Building security into the design of the initial deployment can, and should affect the network topology, as well as material costs. Failure to do so could lead to further expenses in loss of services and network redesigns in the event of compromise.

WiFi, VoIP, Fixed Lines, and the Cellular Networks

Manufacturers of cellular devices are incorporating WiFi radios into their handsets at an ever increasing rate. New versions of mobile operating systems are coming out complete with a built in VoIP stack, inviting carriers and manufacturers to add VoIP functionality to their devices. Dual and Quad band cell phones can choose between the strongest network available, cellular or WiFi, and place a call accordingly.

As cell phones become more like mobile offices, the benefits of a mobile work force become apparent. In the case of the road warrior, the ability to communicate via email, text messaging, video or voice, allows them to stay on the road longer without losing touch. In the age of instant information, mobile office applications allow files to be downloaded, edited, and uploaded, increasing the productivity of the traveler to the point where just about anything that can be done in the office can be done on the road.

A cell phone that can switch between cellular and WiFi networks can significantly reduce telecommunications costs at the corporate office. With WiFi hotspots popping up at hotels, cafes, and corporate LANs across the globe, mobile workers can stay in touch with office and family both on and off the job. With the addition of a VoIP service provider, cheaper VoIP calls can be made from any WiFi network at the push of a button.

Imagine if you will, a future where one phone, with one phone number, can seamlessly traverse cellular networks, WiFi networks, cable and PSTN landlines. Where roaming and switching between disparate networks occur without interruption or loss of call quality. Fixed Mobile Convergence (FMS) is the buzzword of the decade, and the IP Multimedia Subsystem (IMS) architecture is the standard that promises to get us there.

The goal of IMS is to provide all the services and applications that the Internet provides, both current, and as of yet unimagined. IP based services such as VoIP, Push to talk cellular (POC), videoconferencing, text messaging, community services, presence information and file sharing are just some of the possibilities. Designed to work with any fixed, mobile or wireless packet switched network, backwards compatibility for the legacy circuit switched phone system is provided through the use of gateways.

Although still in its infancy, IMS is already being implemented by AT&T as the platform in its newly acquired Cingular cellular network. Interest in investing in a new infrastructure by mobile and fixed operators has been up and down, as they weigh the costs and benefits of the new technology.


As the technology of VoIP over WiFi networks continues to develop, businesses of all sizes can reap the benefits of increased mobility, productivity, and significant cost savings. Standards committees are constantly working on ways to increase security and quality of service, and as fixed mobile convergence gains acceptance in the telecommunications industry, more choices in the services offered and the IP applications available to businesses are sure to follow.

What will also be interesting to watch, is how these very bandwidth intensive applications will be priced by the carrier networks, and how it will affect the neutrality of the Internet."

APL hackers do it in the quad.

Working...