Forgot your password?
typodupeerror

Comment: all new scenario for the bad guys (Score 1) 646

by krayfx (#21965578) Attached to: GM Says Driverless Cars Will Be Ready By 2018
the Bad guys can:
* claim they dint hijack the car, or carry out kidnapping just by sending a car to the right place and right person at the right time, with only the bot/ AI/ firmware hacked or manipulated
* if the hacker is anonymous, it just takes the human element out of the crime, great situation! yu can get a guy into the car, lock the doors up and direct him to a secluded cliff, and drive him off it! fantastic, just waht gangster have been waiting for!
* arrange for a hacked car, the robbers rob the bank dump the loot in one car and drive in some other :) ... man, one too many situations to think of. imagine the central server hosted on a Windows Server 2018 and it has been compromised by WIN128/ Blaster-2018 virus, and all the auto-driven security cars directed outside of the city. and all the post and courier vans directed to dump all those 5000 mails into your lawn. that'd be spam for real!!!! :) just rolling the dice for some permutation and combinations! was sure fun though! there sure would be immobilizer and other technology. just supposing ....
Businesses

+ - Auctioning H-1B Visas Instead of Complaining

Submitted by
Chris Chiasson
Chris Chiasson writes "Every year, we hear about technology companies complaining that they can't find enough skilled workers in America to fill their open positions. Every year, we hear accusations that these companies just want to spend less on payroll by hiring foreign workers. So, my question to you is, instead of paying a flat fee for workers to acquire these visas, why not subject the visa slots to auctions? By tying the slots to auctions, I think we could be more sure that companies that really need the foreign workers they say they do — since they would likely be paying through the nose. Also, it could give a cost advantage to American workers. The government would probably like the proposal since it would result in more revenue. What do you think?"
Operating Systems

+ - SCO Group admits it may fold->

Submitted by
mytrip
mytrip writes "Having filed for Chapter 11 bankruptcy protection, SCO claims it may go under permanently, depending on how much the court decides it owes Novell.

The SCO Group may need to wind up its operations after its copyright case against Novell collapsed, prompting it to file for bankruptcy.

"As a result of both the court's August 10, 2007, ruling and our entry into Chapter 11, there is substantial doubt about our ability to continue as a going concern," read part of a filing with the U.S. Securities and Exchange Commission, made on Tuesday."

Link to Original Source
Windows

+ - Stealthy Windows update raises serious concerns

Submitted by UniversalVM
UniversalVM (666) writes "What is the single biggest issue that bothers open source advocates about proprietary software? It is probably the ability of the vendor to pull stunts like this. Windows has stealthily updated components of the operating system using its update service. The update will not be flagged even if you have set up your update to notify you and only execute if permitted.
The weak explanation seems to be a great exercise in circular logic "Had we failed to update the service automatically, users would not have been able to successfully check for updates and, in turn, users would not have had updates installed automatically or received expected notifications." News.com is reporting that all of the updated files on both XP and Vista appears to be in windows update itself. This is information that was independently uncovered by users and still not released by Microsoft.
More interestingly could this be construed as a hacking of Windows users' systems? Does the EULA specify that Microsoft has the right to silently break into my machine, change components of the operating system and ignore any settings that explicitly prohibit this sort of behavior? Seems like a good argument could be made for Microsoft breaking into a system without the users' permission."

Premature optimization is the root of all evil. -- D.E. Knuth

Working...