Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment: Back to fundamentals (Score 1) 694

1. Use gold for money.
2. Shut down the Federal reserve and ban fractional reserve banking practices.
3. Shut down IRS and eliminate income tax.
4. Reduce the military to a maximum size no greater than the next largest military on the planet and station it inside US borders never to leave.
5. Reform Copyright limits to it's original timeframe (eliminate MM laws).
6. Reform patents to it's original requirements (you must build a working physical device that represents the patent).
7. Eliminate any laws governing the behavior and rights of corporations. Specifically remove any law that deems the rights of a corporation equivalent to an individual.
8. Ban campaign contributions. Allow campaigns for public office to occur for two days and only the two days before the election. Candidates pay for their own campaigns out of their own pocket.
8. Implement a term limit for _all_ public servants, elected officials and government employees to no greater than 6 years.

Good luck with anything less. You'll just be another re-branded statist party and you might as well run for office as a republican or democrat (either will work for you).

Security

+ - Malicious QR Codes On Traffic-Heavy Locations->

Submitted by
Orome1
Orome1 writes "QR codes are very handy for directing users to specific sites by simply scanning them with their smartphones. But the ease with which this technology works has made it also a favorite of malware peddlers and online crooks, which have taken to including QR codes that lead to malicious sites in spam emails. They have also begun using the same tactic in the physical world, by printing out the malicious QR codes on stickers and affixing them on prominent places in locations where there is a lot of foot traffic. According to Symantec Hosted Services director Warren Sealey, these locations include airports and city centers, where the crooks stick them over genuine QR codes included in advertisements and notices, and most likely anywhere a person might look and be tempted to scan them."
Link to Original Source

Comment: IL - Nothing to write home about (Score 1) 821

by wirehead_rick (#41901019) Attached to: U.S. Election Day In Progress: What's Been Your Experience?

Only one other voter voting. I guess everyone know Obama will win his home state so low turnout.

All I had to do is sign. They compared my signature with one on file. No ID required.

Only voted for president and against every govt. program. Most local positions had only one candidate running (WTF?) so they didn't need my vote anyways.

Yawn. Nothing to report from Ill Annoy . . .

Comment: Simple fix (Score 1) 98

by wirehead_rick (#40770357) Attached to: Reverse-Engineered Irises Fool Eye-Scanners

All biometrics can be fooled if the biometric sensor system alone is all you are using for the security.

Biometrics only uniquely identifies a person. You still need another person (security guard, for example) or technology (detect a live human being and/or a real eye) to verify it is a person that provides the biometric input. This is to prove an actual person is there.

Until someone switches eyes out (improbable) or finds a way to implant the iris image of another individuals eye within their own eye (improbable) a security person can verify an eye is actually being scanned by the biometric scanner. Add an independent security feature (ID, password, etc.) and it's a pretty darn good security system.

Comment: One Word . . . . (Score 4, Interesting) 157

by wirehead_rick (#39155033) Attached to: RIM Trying To Woo Customers With Porn, Gambling Apps?

Genius.

It seems the power of porn and technology has been underestimated over and over.

Porn drove the Video Cassette business and is probably responsible for VHS defeating the superior Beta format.

It is also probably responsible for the huge early popularity of the Internet.

Barring backlash from prudish regulators this move can't be underestimated . . .

Comment: Credibility and Individual Responsibility (Score 1) 361

by wirehead_rick (#38483046) Attached to: What Do We Do When the Internet Mob Is Wrong?

Journal organizations need to practice credibility. Credibility is built over time with trustworthy news reporting. The problem is most organizations have fallen to the dark side of profit and tabloidism and can never come back. Their credibility is lost for good.

Individuals need to practice skepticism and critical thought. Then they can identify credible news sources by paying attention. Alternatively, by recognizing logical fallacies an individual can read between the lines and extract newsworthy data embedded in the half truths and agenda driven news we see today.

There is no legal solution to this problem. Principled individuals have to stand up and decide to make things better.

Only through hard work and perseverance can one truly suffer.

Working...