Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Slashdot Deals: Cyber Monday Sale Extended! Courses ranging from coding to project management - all eLearning deals 20% off with coupon code "CYBERMONDAY20". ×

Comment Re:Any possibility that sunscreen causes cancer? (Score 1) 210

I've had this discussion with people in the past, and personally, I feel that there's a big difference between an increase in cases of autism (or anything, for that matter), and an increase in DIAGNOSED cases of autism. In the past 10 years (or so), our understanding of the signs of autism has greatly increased, which would then lead to a increase in the number of cases. Does that mean we're doing something to cause that increase? Not at all, it just means that we have a name now for what's "wrong" with those kids that 15-20 years ago were just labeled as "weird" or worse.

Comment Re:When The Lunatics Take Over The Asylum (Score 1) 456

Speaking from experience, restless leg syndrome shouldn't be on your list....I'd never had an issue with what is commonly known as RLS in the past, but after being put on a new medication, I developed symptoms of it....when the medication was changed, the symptoms went away.

Comment Re:Is LO catching up with MS Office? (Score 1) 254

Unless they changed something that I haven't read about yet, they haven't moved to a subscription-only model for Office quite yet. They do offer it as an option, but it's still an option to go out and buy a physical copy of Office 2013 (the last "official" release for Windows) as well.

Comment Re:Seriously! (Score 2) 147

I didn't read the actual article, but from some other comments on here, it sounds like this is doing a bit more than a traditional safe: Counting the funds inserted and Transmitting this deposit to the bank to name just a couple things. This means: - Network/Internet access to some degree, including all the necessary security features (SSL, etc) - Peripheral access (bill reader) - Some sort of confirmation on the safe that the deposit was completed Considering this has been described by some as an "ATM in reverse", it probably makes sense to use the same code base as an ATM, which in many cases means XP embedded (or its newer versions).

Comment Re:The. ignorance is strong in this one. (Score 4, Informative) 294

If I had to guess, this isn't a case of "government tapping into my bank account", but rather a case of having previously given them payment information tied to this account, and as a "courtesy", they auto-renewed the registration when it was due. Heck, an "auto-renew" setting may have even been turned on and forgotten about...

Comment Re:Not Exactly.... (Score 1) 487

Fair enough....I haven't tested the "other side" of this (using a shared key to access a network) because I don't use FB, Skype, or Outlook, but I would hope that the option I mentioned earlier (that "share this network with my contacts" switch) isn't an option for networks that you got the key for through Wifi Share. Maybe someone who's actually used the new feature can weigh in on that part of it

Comment Not Exactly.... (Score 5, Informative) 487

I've been running pretty much every build of Win10 since the preview first came out, and this isn't accurate at all....Yes, the Wi-Fi sense option is there, but when you connect to a new network, there's a "share with my contacts" checkbox that you have to turn ON for this network to be shared. The Wi-Fi Sense "master switch" may be on by default, but you have to specifically allow each individual network to be shared.

Comment Re:That's stupid (Score 3, Interesting) 104

HTC actually has come up with a good way to handle this. They've moved many of their "factory" apps into the Play Store, so they can push updates that way independent of the carriers. I've even received lock screen and Sense (their "home screen" for those unfamiliar with it) updates though this method. The only thing they can't push is updates to Android itself this way.

Comment Re:Cellphones without GPS (Score 1) 39

I believe that all phones are required to have at least a basic GPS receiver (even the so-called "dumb phones") for E911 purposes, basically so that if you do call 911 from your phone, and you're not sure of your location, they can still find you.

Phase II E911 rules require wireless service providers to provide more precise location information to PSAPs; specifically, the latitude and longitude of the caller. This information must be accurate to within 50 to 300 meters depending upon the type of location technology used.

From: http://www.fcc.gov/guides/wire...

Comment Re:not limiting attempts (Score 3, Insightful) 93

If the login delay is implemented based on the user ID and not the IP address, it wouldn't matter how many threads/machines you had attacking.

On a completely random note, I think the amount of time to do this attack, even with the current setup, would make it nonrealistic. Someone above listed the steps to break into a Tesla using this vulnerability (how accurate they were, I don't really know - or care for that matter). There's one big factor that is being overlooked, however. With relatively few Tesla cars on the road right now (I don't know the exact numbers at the moment, but compared to all other cars on the road, I think we can agree that "relatively few" is a safe estimate), this particular attack isn't one that could be done with the "normal" way that I imagine stealing a car goes:

"Hey that's a nice car...lets steal it!"

For this attack to work, it would have to be done one of two ways:

1. Break into "random" Tesla accounts until you found one in your area
2. Exploit this attack to steal the car


1. Find a Tesla parked somewhere.
2. Somehow figure out that car's account
3. Break into that account
4. Use exploit to steal car

Basically, the time it takes to break into one Tesla account is irrelevant. The goal is to break into the RIGHT Tesla account, which I imagine, unless you already knew a lot about the owner of a particular car, would take a lot longer than this 69 year number being thrown around for breaking into a single Tesla account by brute force.

Comment No Comparison (Score 3, Insightful) 101

I have as much of a mixed environment as anyone (2 Android Tablets, 1 android phone, 1 win8 desktop, 1 win8 laptop, 1 win7 tablet, 1 linux desktop), so I really have no preference one way or the other. However, the "funny" moderation of your post aside, as a developer, I think it's a bit unfair to categorize MS developers this way. After all, they were only writing what management told them to.

Artificial intelligence has the same relation to intelligence as artificial flowers have to flowers. -- David Parnas