Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
What's the story with these ads on Slashdot? Check out our new blog post to find out. ×

Comment Re:Teachers (Score 1) 240

Different AC here. ... P.P.S.: Fuck the last 5 years of UX "professionals" who think ... menu options should change depending on which options the software decides are more frequently used. Neither group knows anything of muscle memory because neither group has been in the industry long enough for it to matter.

Although, to be fair to UX "professionals" there is no muscle memory so powerful that it cannot be compromised with sufficient alcohol. Still getting 80wpm tonight. But somehow missed the post-anon button. Sometimes the UX "professional" doesn't have to move the clickbox. It's moving on my system, though!

Comment Re:Teachers (Score 1) 240

My touch typist teacher said RIGHT. Never considered the left.

Different AC here. Basic non-ergo Keytronic layout. I use left hand, not right hand, and I was taught touch typing (and can still do 100wpm) by a teacher who taught by the book that says "right-handed."

Even though the "6" is, properly speaking, in the "6/y/h/n" vertical row that "belongs" to the right hand, I just looked closely at my fingers on the actual physical keyboard on which I've typed for 10+ years, and its clones on which I've typed for at least 20+, it's because the "6" is closer to the left index finger than the right index finger. The pad of my hand (not the wrist, about halfway up the pad beneath my pinky finger) rests on the lower edge of my keyboard, and my thumbs rest so comfortably on the spacebar that the spacebar has a little worn spot on it.

Home exercise: Place fingers on home row. Touch right and left index fingers to "T", "Y", and "R". For my fingers and keyboard, "Y" is the most comfortable, almost dead-center. Repeat experiment with "5/6/7". For my fingers/keyboard, I can't reach "5" with right. I can't reach "7" with left, and "6" is reachable with either, but more easily reached with left finger. with left on "T" and right on "y" almost centered beneath "6", left is visually confirmed closer to "6."

(Side note: Both by size of wear spot and by observation while typing this post, I almost exclusively press the space bar with my *right* thumb. Maybe that contributes to using my left idex to hit th 6 key -- my left thumb is basically unused. I just typed this entire sentence with my left thumb crammed under the keyboard and it felt comfortable. Undoable with right thumb in equivalent positon.)

P.S; Our touch-typing teachers taught us the same way, but for me and my keyboard, we cheat on the "6". I've forgotten whether it's supposed to matter which thumb you use on the space bar, although I imagine I could have squeezed out a couple of extra wpm if I'd used both thumbs in high school.

P.P.S.: Fuck the last 5 years of UX "professionals" who think everything has to change every six months for the hell of it, or the last 15 years who think that menu options should change depending on which options the software decides are more frequently used. Neither group knows anything of muscle memory because neither group has been in the industry long enough for it to matter.

Submission + - Malvertising ads infest websites with 100++ million visitors->

An anonymous reader writes: Angler exploit's SSL malvertising campaign source and details from MalwareBytes https://blog.malwarebytes.org/... infesting sites like:

weather.com 121M visits per month
drudgereport.com 61.8M visits per month
wunderground.com 49.9M visits per month
findagrave.com 6M visits per month
webmaila.juno.com 3.6M visits per month
my.netzero.net 3.2M visits per month
sltrib.com 1.8M visits per month

Link to Original Source

Submission + - Windows 10's Privacy Policy: the New Normal?->

An anonymous reader writes: The launch of Windows 10 brought a lot of users kicking and screaming to the "connected desktop." "This is very useful, but obviously has privacy implications: the online service providers can track which devices are making which requests, which devices are near which Wi-Fi networks, and feasibly might be able to track how devices move around. The service providers will all claim that the data is anonymized, and that no persistent tracking is performed... but it almost certainly could be." There are privacy concerns, particularly for default settings. According to Peter Bright, for better or worse this is the new normal for mainstream operating systems. We're going to have to either get used to it, or get used to fighting with settings to turn it all off. "The days of mainstream operating systems that don't integrate cloud services, that don't exploit machine learning and big data, that don't let developers know which features are used and what problems occur, are behind us, and they're not coming back. This may cost us some amount of privacy, but we'll tend to get something in return: software that can do more things and that works better."
Link to Original Source

Submission + - Def Con: Hacker Shows How to "Kill" Anyone-> 1

wiredmikey writes: Hackers the Def Con gathering in Las Vegas on Friday got schooled in how to be online killers. A rush to go digital with the process of registering deaths has made it simple for maliciously minded folks to have someone who is alive declared dead by the authorities.

"This is a global problem," Australian computer security specialist Chris Rock said as he launched a presentation titled "I Will Kill You."

Link to Original Source

Submission + - No Immunity For Cops Who Sent A SWAT Team To A 68-Year-Old Woman's House->

An anonymous reader writes: Earlier this year, we covered the story of Louise Milan, a 68-year-old grandmother whose house was raided by a SWAT team (accompanied by a news crew) searching for someone who had made alleged threats against police officers over the internet. Part of the probable cause submitted for the warrant was Milan's IP address.

But the police made no attempt to verify whether any resident of Milan's house made the threats and ignored the fact that the IP address was linked to an open WiFi connection.

Link to Original Source

Comment Re:Please (Score 1) 371

Its like saying "Hey, Chevrolet, you know your customers like the radio station set to 101.9, why cant you engineer your cars to respect their choice instead of forcing your nefarious 101.5 agenda."

Yeah, but this is a Mozilla car analogy we're talking about here.

In the current 2015.7 model, release, the UX team has decided that a 5-button hamburger menu on an AM dial (and only from 1100Khz to 1150KHz in 10KHz increments) is all that's needed. Users who want to access a wider range of frequencies in the AM band are free to write an extension or purchase a third-party radio head unit.

To further improve the user experience, we remind prospective extension developers that in the Aurora channel for the 2016.1 model year, the about:config setting for frequency.megavskilohertz has been removed, along with the FM antenna. The UX team has made this recommendation based on telemetry that suggests that few drivers actually listen to FM radio, especially since the 2013.6 model, in which the AM/FM toggle switch was removed because the UX team for 2012.1 felt it was cluttering the dashboard.

Submission + - XKEYSCORE: NSA'S Google for the World's Private Communications->

Advocatus Diaboli writes: "The NSA’s ability to piggyback off of private companies’ tracking of their own users is a vital instrument that allows the agency to trace the data it collects to individual users. It makes no difference if visitors switch to public Wi-Fi networks or connect to VPNs to change their IP addresses: the tracking cookie will follow them around as long as they are using the same web browser and fail to clear their cookies. Apps that run on tablets and smartphones also use analytics services that uniquely track users. Almost every time a user sees an advertisement (in an app or in a web browser), the ad network is tracking users in the same way. A secret GCHQ and CSE program called BADASS, which is similar to XKEYSCORE but with a much narrower scope, mines as much valuable information from leaky smartphone apps as possible, including unique tracking identifiers that app developers use to track their own users."

also

"Other information gained via XKEYSCORE facilitates the remote exploitation of target computers. By extracting browser fingerprint and operating system versions from Internet traffic, the system allows analysts to quickly assess the exploitability of a target. Brossard, the security researcher, said that “NSA has built an impressively complete set of automated hacking tools for their analysts to use.” Given the breadth of information collected by XKEYSCORE, accessing and exploiting a target’s online activity is a matter of a few mouse clicks. Brossard explains: “The amount of work an analyst has to perform to actually break into remote computers over the Internet seems ridiculously reduced — we are talking minutes, if not seconds. Simple. As easy as typing a few words in Google.”

Link to Original Source

Submission + - Sourceforge staff takes over a user's account and wraps their software installer-> 11

An anonymous reader writes: Sourceforge staff took over the account of the GIMP-for-Windows maintainer claiming it was abandoned and used this opportunity to wrap the installer in crapware. Quoting Ars:

SourceForge, the code repository site owned by Slashdot Media, has apparently seized control of the account hosting GIMP for Windows on the service, according to e-mails and discussions amongst members of the GIMP community—locking out GIMP's lead Windows developer. And now anyone downloading the Windows version of the open source image editing tool from SourceForge gets the software wrapped in an installer replete with advertisements.


Link to Original Source

Comment Re:Spot-the-Nerd game (Score 1) 102

Look. He's just really proud of his nation. If you weren't American (like me. I'm pretty proud of my homeland i.e. Australia) then you'd be reminding everyone where you come from as well!

It's something us non-Americans (i.e. Australians, like me) do so we know whose opinion to actually pay attention to.

Comment No, they are categorically NOT doing that... (Score -1) 164

...and your comment represents the absolutely fundamental misunderstanding that pervades this discussion.

The truth no one wants to hear:

The distinction is no longer the technology or the place, but the person(s) using a capability: the target. In a free society based on the rule of law, it is not the technological capability to do a thing, but the law, that is paramount.

Gone are the days where the US targeted foreign communications on distant shores, or cracked codes used only by our enemies. No one would have questioned the legitimacy of the US and its allies breaking the German or Japanese codes or exploiting enemy communications equipment during WWII. The difference today is that US adversaries -- from terrorists to nation-states -- use many of the same systems, services, networks, operating systems, devices, software, hardware, cloud services, encryption standards, and so on, as Americans and much of the rest of the world. They use iPhones, Windows, Dell servers, Android tablets, Cisco routers, Netgear wireless access points, Twitter, Facebook, WhatsApp, Gmail, and so on.

US adversaries now often use the very same technologies we use. The fact that Americans or others also use them does not suddenly or magically mean that no element of the US Intelligence Community should ever target them. When a terrorist in Somalia is using Hotmail or an iPhone instead of a walkie-talkie, that cannot mean we pack our bags and go home. That means that, within clear and specific legal authorities and duly authorized statutory missions of the Intelligence Community, we aggressively pursue any and all possible avenues, within the law, that allow us to intercept and exploit the communications of foreign intelligence targets.

If they are using hand couriers, we target them. If they are using walkie-talkies, we target them. If they are using their own custom methods for protecting their communications, we target them. If they are using HF radios, VSATs, satellite phones, or smoke signals, we target them. If they are using Gmail, Windows, OS X, Facebook, iPhone, Android, SSL, web forums running on Amazon Web Services, etc., we target them -- within clear and specific legal frameworks that govern the way our intelligence agencies operate, including with regard to US Persons.

That doesn't mean it's always perfect; that doesn't mean things are not up for debate; that doesn't mean everyone will agree with every possible legal interpretation; that doesn't mean that some may not fundamentally disagree with the US approach to, e.g., counterterrorism. But the intelligence agencies do not make the rules, and while they may inform issues, they do not define national policy or priorities.

Without the authorities granted by the FISA Amendments Act of 2008 (FAA), the United States cannot target non-US Persons who are foreign intelligence targets if their communications enters, traverses, or otherwise touches the United States, a system within the United States, or, arguably, a system or network operated by a US corporation (i.e., a US Person) anywhere in the world. FAA in particular is almost exclusively focused on non-US Persons outside the US, who now exist in the same global web of digital communications as innocent Americans.

Without FAA, the very same Constitutional protections and warrant requirements reserved for US Persons would extend to foreign nations and foreign terrorists simply by using US networks and services â" whether intentionally or not. Without FAA, an individualized warrant would be required to collect on a foreign intelligence target using, say, Facebook, Gmail, or Yahoo!, or even exclusively foreign providers if their communications happens to enter the United States, as 70% of international internet traffic does. If you do not think there is a problem with this, there might be an even greater and more basic misunderstanding about how foreign SIGINT and cyber activities fundamentally must work.

If you believe NSA should not have these capabilities, what you are saying is that you do not believe the United States should be able to target foreign intelligence targets outside the United States who, by coincidence or by design, ever utilize or enter US systems and services. If you believe the solution is an individualized warrant every time the US wishes to target a foreign adversary using Gmail, then you are advocating the protection of foreign adversaries with the very same legal protections reserved for US citizens -- while turning foreign SIGINT, which is not and never has been subject to those restrictions, on its head.

These are the facts and realities of the situation. Any government capability is imperfect, and any government capability can be abused. But the United States is the only nation on earth which has jammed intelligence capabilities into as sophisticated and extensive a legal framework as we have. When the intelligence committees of both houses of Congress, multiple executive agencies under two diametrically opposite Presidential administrations, armies of lawyers within offices of general counsel and and inspectors general, and federal judges on the very court whose only purpose is to protect the rights of Americans under the law and the Constitution in the context of foreign intelligence collection are all in agreement, then you have the judgment of every mechanism of our free civil society.

Or we could just keep laying our intelligence sources, methods, techniques, and capabilities bare to our enemies.

âMany forms of Government have been tried and will be tried in this world of sin and woe. No one pretends that democracy is perfect or all-wise. Indeed, it has been said that democracy is the worst form of government except all those other forms that have been tried from time to time." - Winston Churchill (1874-1965), Speech in the House of Commons, November 11, 1947

"The necessity of procuring good Intelligence is apparent and need not be further urged â" all that remains for me to add, is, that you keep the whole matter as secret as possible. For upon Secrecy, Success depends in most Enterprises of the kind, and for want of it, they are generally defeated, however well planned and promising a favourable issue.â â" George Washington, our nation's first spymaster, in a letter to Colonel Elias Dayton, 26 July 1777

Submission + - How Silicon Valley got that way -- and why it will continue to rule.->

An anonymous reader writes: Lots of places want to be "the next Silicon Valley." But the Valley's top historian looks back (even talks to Steve Jobs about his respect for the past!) to explain why SV is unique. While there are threats to continued dominance, she thinks its just too hard for another region to challenge SV's supremacy.
Link to Original Source

Comment The ultimate "man made earthquake" (Score 3, Interesting) 166

Russian analyst urges nuclear attack on Yellowstone National Park and San Andreas fault line

A Russian geopolitical analyst says the best way to attack the United States is to detonate nuclear weapons to trigger a supervolcano at Yellowstone National Park or along the San Andreas fault line on California's coast.

The president of the Academy of Geopolitical Problems based in Moscow, Konstantin Sivkov said in an article for a Russian trade newspaper on Wednesday, VPK News, that Russia needed to increase its military weapons and strategies against the "West" which was "moving to the borders or Russia".

He has a conspiracy theory that NATO - a political and military alliance which counts the US, UK, Canada and many countries in western Europe as members - was amassing strength against Russia and the only way to combat that problem was to attack America's vulnerabilities to ensure a "complete destruction of the enemy".

"Geologists believe that the Yellowstone supervolcano could explode at any moment. There are signs of growing activity there. Therefore it suffices to push the relatively small, for example the impact of the munition megaton class to initiate an eruption. The consequences will be catastrophic for the United States - a country just disappears," he said.

"Another vulnerable area of the United States from the geophysical point of view, is the San Andreas fault - 1300 kilometers between the Pacific and North American plates ... a detonation of a nuclear weapon there can trigger catastrophic events like a coast-scale tsunami which can completely destroy the infrastructure of the United States."

Full story

As long as we're going to reinvent the wheel again, we might as well try making it round this time. - Mike Dennison

Working...