Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Funny thing... (Score 1) 229

by multisync (#49218625) Attached to: Listen To a Microsoft Support Scam As It Happened

But what does it have to do with my phones capability to record a call?

If you can hear it, you can record it.

I record most of my calls. At work I use a Nexxtech telephone recorder similar to this this. I plug the 3.5 mm jack in to my Tascam DR-07 digital recorder. When I place or receive a call I just press record then log the call details along with the file name when it ends.

If a call comes in on my cell that I want to record I ask the caller to wait while I put them on speakerphone then use the Tascam's built in mics to record the conversation.

If you don't have a stand-alone recorder, a laptop with built-in mic and/or audio input and something like Audacity will do nicely as well.

If your phone lacks the ability to record conversations, either because it doesn't have speakerphone capabilities or can not work with a device like the one I linked to above, I would replace the phone. Cordless phones can be problematic as they emit rf that can be picked up by the recorder but a cordless with speakerphone either on the base station or handset should work with a digital recorder with built-in mics.

The biggest challenge with recording calls is keeping track of all them so you can find the relevant one in the future. I hacked together a simple PHP/MySQL application I host on my personal site that I use to log calls but a spreadsheet works well too. It's also helpful to begin recordings with whatever detail you can provide prior to dialling or answering. That way you just have to listen to the first few seconds of your recording to find out what the call is about.

If the laws where you live prevent you from recording a conversation you are participating in I would say you have significantly bigger problems than your phone's hardware capabilities.

I keep written notes of meetings, I keep my old notebooks, I keep a (semi) daily journal, I archive emails, appointment calendars and task lists as well as text messages and all other forms of written communications. I see no reason why I should not be able to record any conversation I am part of. If a person asks me to not share what was talked about with others, the existence of a recording has no relevance to that. If I can remember it, there is a record.

As far as calls with companies go, I can't remember the last time a call to or from a business or government agency didn't include the disclaimer that "for quality control and training purposes, this call may be monitored or recorded." I always reply that it most certainly is.

In general I don't record personal calls with friends or my wife, since it's unlikely I will need a record of those calls in the future. But they *are* being recorded, of that I have no doubt. All calls are recorded by various agencies and companies. I have no control over that. What I can do is keep my own record of my calls, just in case the need ever arises for me to know what exactly was said.

As long as you take reasonable precautions to safeguard these recordings - as you would your written communications - I can not see why there would be a problem with it.

+ - TurboTax sells access to your data->

Submitted by rcharbon
rcharbon (123915) writes "I had the apparently naive expectation that I’d retain some small scrap of privacy by using the TurboTax desktop app instead of the web version. However, their failure to keep a certificate revocation list up to date revealed that Intuit installs third-party cookies from Neustar, an ad service that “provides audience insights that increase online advertising relevancy through the power of verified offline consumer data.”"
Link to Original Source

Comment: Re:Why? (Score 1) 769

by multisync (#46397339) Attached to: The Next Keurig Will Make Your Coffee With a Dash of "DRM"

Downside : a normal coffee brew process generates 6-12 cups of Joe.

I guess we could all switch to a press ... but that's a bit messy and requires a stand alone heating method (I've not the space to keep a proper tea kettle on my office desk)

I've been using single cup coffee makers like this Black & Decker Brew 'n Go for years. No mess, no fuss, just pour a cup full of fresh water from your cup in to the reservoir, add a couple scoops of fresh ground coffee to the filter basket and hit the go button.

You get a fresh cup of coffee without the waste of those empty "pods," and no DRM to boot.

+ - SPAM: Looming Slashdot changes

Submitted by Anonymous Coward
An anonymous reader writes "Please post this to new articles if it hasn't been posted yet. (Copy-paste the html from here so links don't get mangled!)

On February 5, 2014, Slashdot announced through a javascript popup that they are starting to "move in to" the new Slashdot Beta design. Slashdot Beta is a trend-following attempt to give Slashdot a fresh look, an approach that has led to less space for text and an abandonment of the traditional Slashdot look. Much worse than that, Slashdot Beta fundamentally breaks the classic Slashdot discussion and moderation system.

If you haven't seen Slashdot Beta already, open this in a new tab. After seeing that, click here to return to classic Slashdot.

We should boycott stories and only discuss the abomination that is Slashdot Beta until Dice abandons the project.
We should boycott slashdot entirely during the week of Feb 10 to Feb 17 as part of the wider slashcott

Moderators — only spend mod points on comments that discuss Beta
Commentors — only discuss Beta
[spam URL stripped] — Vote up the Fuck Beta stories

Keep this up for a few days and we may finally get the PHBs attention. -----=====##### LINKS #####=====-----

Discussion of Beta: [spam URL stripped]
Discussion of where to go if Beta goes live: [spam URL stripped]
Alternative Slashdot: [spam URL stripped] (thanks Okian Warrior (537106))

Join IRC Freenode ##altslashdot"

Comment: Re:Oh (Score 1) 474

With the general definition of the PC market being something you can install Windows/DOS on or WinTel compatible

Where did you get that idea? A personal computer is just that, a small, affordable computer that is operated directly by the end user. Neither Windows or an Intel processor are required.

+ - Sniffing and decoding NRF24L01+ and Bluetooth LE packets for under $30->

Submitted by Anonymous Coward
An anonymous reader writes "I was able to decode NRF24L01+ and Bluetooth Low Energy protocols using RTL-SDR.
As far as I can see, this is the first time the NRF24L01+ is being decoded, especially considering the low entry price for the hardware. Given the extreme popularity of this transceiver, we are likely to see a wave of hackers attacking the security of many wireless gadgets, and they are likely to succeed as security is usually the last priority for hardware designers of such cheap gadgets.

A lot of work have been done to decode bluetooth using dedicated hardware and I am sure this software can be adapted to output the right format as input to the existing Bluetooth decoders such as Wireshark.
As far as I can see, this is also the first time BTLE can be decoded using a very cheap generic device."

Link to Original Source

+ - Tweets And Threats: Gangs Find New Home On The Net->

Submitted by cold fjord
cold fjord (826450) writes "Associated Press reports, "Social media has exploded among street gangs ... They're turning to Twitter, Facebook, YouTube and Instagram to flaunt guns and wads of cash, threaten rivals, intimidate informants ... sell weapons, drugs — even plot murder. "What's taking place online is what's taking place in the streets," says David Pyrooz, an assistant professor at Sam Houston State University ... "The Internet does more for a gang's brand or a gang member's identity than word-of-mouth could ever do. It really gives the gang a wide platform to promote their reputations. ... On the crime-fighting side ... this activity ... is transforming how police and prosecutors pursue gangs. Along with traditional investigative techniques, police monitor gangs online ... a Cincinnati police officer who trains other law enforcement about social media, says by the time gang members appear in court, authorities have a dossier of their words and videos online that challenge how they want to portray themselves. "If a guy goes in and says, `I'm a good person. I've never held a gun,' we can say, `Look at what he puts out about himself on social media. Here he is with a gun.' ..." ... police say monitoring social media is time-consuming and frustrating.""
Link to Original Source

+ - How Chris Christie Could Use the NSA Playbook to Defend Himself over Bridgegate

Submitted by Hugh Pickens DOT Com
Hugh Pickens DOT Com (2995471) writes "Conor Friedersdorf has written a tongue-in-cheek article in The Atlantic advising New Jersey Governor Chris Christie how he can use the NSA playbook to successfully defend himself of the charges that a senior member of his staff was involved in shutting down George Washington Bridge traffic, a stunt meant to punish the mayor of an affected town for opposing his reelection. Christie's NSA-inspired explanation would include the following points: There are almost 9 million people in New Jersey, and only one was targeted for retribution, an impressively tiny error rate lower than .001 percent; The bridge closure was vital to national security because [redacted]; Since the George Washington Bridge is a potential terrorist target, everything that may or may not have happened near it is a state secret; Going after a political rival is wrong but it's important to put this event in context; Fort Lee Mayor Mark Sokolich was the only target of non-compliant behavior. No other Fort Lee resident was ever targeted for retribution, and any delays that any Fort Lee resident experienced were totally inadvertent and incidental; Finally a panel will be formed to figure out how to restore the public's faith in Chris Christie. "To some readers, these talking points may seem absurd or deliberately misleading," concludes Friedersdorf, "but there isn't any denying that so far they're working okay for the NSA.""

"Pull the trigger and you're garbage." -- Lady Blue