Now that my slashdot user name is also a NSA acronym I probably have to add a disclaimer to each post saying "This is just a text message, it is perfectly safe to parse this input". Then again some paranoid people might think that this is exactly what the NSA wants you think.
The russians are already using opposed piston diesel engines in some of their tanks: http://www.morozov.com.ua/eng/body/addmotor.php. That's a very good power to weight ratio compared to diesel engines in western tanks. Ok, I admit that it is a bit overkill for the average commuter...
So for a 25 dollar "insurance" fee I can match all the mp3s that I can find op my harddisk to songs in the itunes cloud and then those (legal) itunes songs will be downloaded to all my devices? That's an offer that I can't refuse.
And won't the music industry go apeshit over this?
A bit of competition is always good. That way nobody falls asleep and we will see regular updates with new features. The obvious problem is of-course feature bloat: I predict that in the year 2016 all browsers, Firefox 27, Chrome 27 and IE 32, will be so filled with useless junk that a lone, angry, nerd will create a new lean&mean browser, with just one feature: render standard compliant HTML7 pages with 100% accuracy.
According to Wikipedia a Phoenix can rise from the ashes again and again. The future will be the same as the past...
"This video contains content from EMI, who has blocked it in your country on copyright grounds."
Thanks for the notice EMI. Next time I want to buy audio/video content I will make sure to block you too. Just returning the favor...
Actually almost all process control vendors participate to some extent with National Lab. Nothing secret about it, go to the webpage and sign up for a 5 day red team/blue team session on how to hack scada equipment.: http://www.inl.gov/scada/training/index.shtml
If you are a process controller vendor and you haven't sent your security staff to Idaho then you are out of the game. Because the rest of the process control world will break into your systems while laughing their asses off.
And they store the on/off switch in a cookie, not with your normal google account settings. So each time cookies are cleared in a webbrowser you have to set it again. Very annoying.
It's a bit late in the thread to reply but anyway...
Stuxnet is special in the fact that it indeed does propagate to the Siemens PLC itself. It has specialized code that will run inside the PLC even if the Windows configuration host is cleaned. And even scarier: the code in the PLC seems to be well hidden so that even a experienced engineer will not see it.
All these neat day0 exploits wasted to get into an industrial control system. The numbers of those systems are only in the thousands, they could have taken control over millions of normal Windows PCs. Who-ever designed this must have been really determined to get data out of those Siemens controllers. Wouldn't it be easier just to bribe a local operator into getting the info?
Or did they want to create their own bot-net of Scada systems? Then you can brag that you can shutdown a country at the touch of a button.
That's on average less then 5MB per day. If I read a few 400 comment threads on slashdot or fark I already have to download that much html. What are these people doing with their phones?