Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: A Julian who didn't live in the basement (Score 2) 191

by quiet_guy (#49321859) Attached to: Your favorite Julian?
Julian Bethwaite. Aussie 18 foot skiff sailor and boat builder. His dad published a few books pushing the limits of hull design, drag calculations, and the theory and practice of high speed sailing. Julian did lots of the assist work and test drove many of the new designs - and is still willing to answer random questions from random people today. Pops up in various web fora to offer expertise.

+ - The internet-of-everything->

Submitted by quiet_guy
quiet_guy (681438) writes "Russian TV reporting that rogue wi-fi components have been found in everyday objects...irons, kettles, dashboard cameras... that actively look for unprotected wifi networks, connect to them and infiltrate the network.

Do you know what your iron really does?"

Link to Original Source

Comment: Re:Hold on - doubletake (Score 1) 331

by quiet_guy (#44133423) Attached to: U.S. Army Block Access To The Guardian's Website Over NSA Leaks
The ARMY (the fucking ARMY) can control access to the INTERNET on ARMY computers. Because they live behind an ARMY firewall. Hell, some of them even live behind other DoD firewalls.
Can't do a damn thing to control the overall INTERNET, shy of nuking from orbit (EMP would be spectacular.)

Comment: Missing the point (Score 1) 331

by quiet_guy (#44132237) Attached to: U.S. Army Block Access To The Guardian's Website Over NSA Leaks
The US military stance is that the documents are _still_ classified. Yes, they've been leaked - but were never actually declassified.
So if you hit a website that posts photos/scans/whatever of any of the leaked stuff (complete with classification markings), you are viewing classified material on an unclassified computer.
Which by definition, is "spillage." Unnatural acts are then required to sanitize your machine.

Comment: Re:So what (Score 1) 340

by quiet_guy (#42215531) Attached to: How Yucca Mountain Was Killed
The problem is Congressional mandate: Any storage cask must survive 10,000 years without leakage (yeah, citation needed, looking for it). Staying intact through train wrecks and 30 foot drops is trivial - can you build a device that will withstand 10,000 years of erosion/corrosion/whatever? And be recoverable/countable for the duration... There are lots of technically possible disposal methods - I personally like the "drop it into the deep ocean trench off SoCal." As the plates move (Farallon plate going into subduction), the waste just goes down into the bowels of the earth where it came from. Problem? Congress wants it countable - and once it goes down, you can't get it back.

Comment: Re:GPS transmitters can be faked/set up (Score 1) 279

by quiet_guy (#41894691) Attached to: New Technology May Cut Risk of Giving Syrian Rebels Stinger Missiles
Ah, not quite. You are describing Differential GPS, or DGPS. Your center-of-the-track receiver sits at a known location. It calculates a GPS posit based on satellite inputs, and figures out the error because it knows where it is. You then broadcast that error signal to any DGPS receiver within reach. The other receivers use their own calculated GPS posit + broadcast error signal to give greater precision. Just about every major port or waterway in the US does this.
Could you set up a fake posit? Maybe - if you can broadcast enough satellite-sounding signals to convince a reciever that it has a good lock. Most of them want at least 4+ to produce a position.

Comment: Unlocked or useful? (Score 2) 100

by quiet_guy (#41421301) Attached to: Verizon-Branded iPhone 5 Ships Unlocked, Works With Other Networks
TFA doesn't make sense. "Able to connect to any GSM network...." No kidding. That's what my unlocked gen 1 phone does. Connect and not be 'roaming' status - that's different.

They gloss over the real point, which is dropping a new SIM into it while traveling so you are always local.

Comment: Re:No redundancy (Score 1) 247

by quiet_guy (#41411117) Attached to: Three Mile Island Shuts Down After Pump Failure
Yes, normal = all four pumps running. In a PWR, your analyzed safety margins generally say "percent total flow through the core must be equal to or greater than total percent power."

So to get full output from the plant (100% power) you need 100% flow - all four running. One pump trips, and total flow goes to ~82% (hydraulics, pump heads, etc. Not a simple 75%.)

But power hasn't changed yet. 100% > 82%, automatic trips kick in and shut the plant down. You haven't damaged anything because the designed safety margins and trip responses take the transient into effect.

Can you run on three pumps? Sure, just not at full rated output. And since your job is to produce as much electricity as you can, the typical civilian plant is binary - either shut down or 100%.

Comment: Re:What does the US Navy use . . . ? (Score 1) 308

by quiet_guy (#32956684) Attached to: Internet Access While Sailing? (Revisited)
USN is quickly moving away from INMARSAT. Too slow for our needs today - at this point, only a few ship classes still use it (FFG, some amphibs). Everyone else is using an EHF/SHF link to the Defense Satellite Communications System (DSCS) - several geostationary birds parked over the equator that allow T-1+ access. We share that out based on who is in the area - the big guys (carriers, etc) stay close to T-1 bandwidth, fairly typical for a destroyer-size ship to have something like 512 or less. We have several networks that ride over that data path. But that does need a pair of big antennas under gyro stabilization....since the best setup is a pair of primary SHF with automatic failover to the EHF pair (aimed at a different bird).

Comment: Missing the point (Score 4, Interesting) 312

by quiet_guy (#32263368) Attached to: Critics Say US Antimissile Defense Flawed, Dangerous
Their real point is successful intercept of the entire missile body != intercept of the warhead, not that the intercept missed entirely. Of course, the SM-3 system has actually done an exo-atmospheric intercept (failing satellite over the Pacific).... (speaking as someone who actually used to run a ship capable of doing this.)

Comment: Re:If you have physical access to a machine... (Score 1) 233

by quiet_guy (#31839314) Attached to: NSA Develops USB Storage Device Detector
At the moment, this is being used as a defense-against-the-user, not against intruders. Problem came up when malware got loaded onto a clean network via a USB drive, unknown to the user. Many of the military networks are set up to protect against intrusion from the outside, with decent firewalls/etc between the internet and the 'inside' network. The USB used by a stupid user obviously jumps the firewall....now the worm/trojan/whatever is loose on the inside. Network policies already say "don't use the same drive at home and at work"...but if everyone followed the rules, we wouldn't have malware....can't easily kill the USB ports since most of the keyboards/mice/etc are USB-only. Essentially, all this thing does is provide a way to sweep the networks and check for compliance. File transfers between classified and unclassified systems are a completely different problem.

"You're a creature of the night, Michael. Wait'll Mom hears about this." -- from the movie "The Lost Boys"