Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Article got it wrong (Score 5, Informative) 101

by strredwolf (#47538297) Attached to: Private Data On iOS Devices Not So Private After All

Almost all the reports are getting the gist of the paper wrong -- any press summation that doesn't go into the paper to understand it will get it wrong. The paper goes into deep detail that Apple has several services that, while protected by several layers of security that could be bypassed, can transfer data in the clear. There are also several services that don't have any obvious connecting software.

It's a rather deep hacker-style dive into iOS.

A good video about this is by TWiT Network. At Security Now ep 465 has expert Steve Gibson explain the actual paper.

Comment: The commits are funny into themselves. (Score 4, Informative) 379

by strredwolf (#46798777) Attached to: OpenSSL Cleanup: Hundreds of Commits In a Week

A Tumblr site popped up a few days ago called OpenSSL Valhalla Rampage. The blogger there is going through all the commits and posting the juicy funny comments there. This includes killing... and rekilling... VMS support (which reminds me of Maxim 37: there is no such thing as overkill...), stripping out now-stupid abstractions and optimizations of the unoptimizables, and more.

Comment: Or, free Mathematica with $35 purchase of a Pi* (Score 2) 99

by strredwolf (#45486467) Attached to: Putting the Wolfram Language (and Mathematica) On Every Raspberry Pi

An offer of over $300 in value! Get yours now!

* Based on purchase of a Model B from direct authorized sellers. Does not include shipping or purchase at authorized resellers. Must be run from a Raspbery Pi computer board. Storage, display, keyboard, mouse, and power supply not included. Model A does not include Ethernet.

+ - Hyperloop's Math just doesn't add up->

Submitted by strredwolf
strredwolf (532) writes "Elon Musk's Hyperloop looks like a winner on the face of things... but if you get down to the details, you'll find that the math just doesn't add up in comparison to California's High Speed Rail. Hyperloop's only 10% capacity of HSR and can't run every 30 seconds safely... and the construction and location details leave much to be desired."
Link to Original Source

Comment: Multimedia's still damaged. (Score 1) 226

by strredwolf (#43487799) Attached to: Debian 7.0 ('Wheezy') Release Planned For 1st Weekend in May

LibAV's a badly forked version that's several revisions behind FFmpeg. Plus, this is Debian -- non-free codecs like H.264 are stripped out and are probably really supported by a seperate non-free repository.

I'd rather strip LibAV out and compile my own version of FFmpeg for faster encodes.

Comment: Excellent Service. (Score -1, Troll) 75

by fferret (#43326231) Attached to: Raspberry Pi Goes On Sale In US, Sells Out
I've purchased a RPi Model B via Allied. They have great customer service, and a friendly sales staff. After ordering online, I got a confirmation phone call from their CS department, confirming the order and wanting to know if they could help out with any issues. One issue: Order backlog is high, but they do keep you informed of ETS. +1, would order again.
Data Storage

+ - Ask Slashdot: Living Virtually?

Submitted by fferret
fferret (58662) writes "A lifelong Science Fiction fan, the concept of continuing to exist as a virtual copy post-mortem is familiar and desirable. I want to see what the future will be like. Mobile, sessile or otherwise, given the recent developments in brain imaging, understanding the structure of the brain, decoding signals, and the decreasing cost of the electronics involved, how far off are we from adding ourselves to our daily backup routine?"

Comment: Levels of escalation (Score 1) 247

1. Open up the compromizing email's headers. Locate the first ISP beyond yours -- 99% of the time it's not there's. Contact THAT company.
2. File a complaint with the FCC. They are getting more active against exploits.
3. Locate your Attorney General's office and ask if there are any state laws against spam. There is one in Maryland that is compatible with CAN SPAM, and has been tested in the courts. If you got one, lawyer up and sue the company -- some companies only respond by judicial inquiry.
4. Blacklist the company publicly.

Comment: There is a reason you are listed. (Score 5, Insightful) 279

by strredwolf (#42386685) Attached to: Ask Slashdot: Dealing With Anti-Spam Service Extortion?

There is a reason you are listed:

* You have spam originating from your system for too long of a time.
* You are unresponsive to reports.

So, your entire network range is listed. Everyone is bouncing emails. Everyone is complaining to you, and you've noticed. You've been forwarded the site, and you're contemplating just paying them off... except that it just won't work. You'll be relisted again, and with reason -- someone on your network spammed and nobody's listening.


* If you haven't done so, open up abuse@ and point it to somebody with the power to diagnose, disable, and close accounts.
* If the guy behind abuse@ doesn't have said above power, GIVE IT TO HIM.
* If the guy behind abuse@ does, but doesn't use it, FIRE HIM.
* If you haven't done so, disable outbound port 25 at your border router with the exception of an out-bound SMTP server.
* Put an outbound spam filter in place.

If you are unwilling to do the above, then there is one last thing you will eventually do: CLOSE SHOP.

One can't proceed from the informal to the formal by formal means.