Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
United States

+ - Forensics Expert says Al-Qaeda Images Altered

Submitted by WerewolfOfVulcan
WerewolfOfVulcan (320426) writes "Wired reports that researcher Neal Krawetz revealed some veeeeeery interesting things about the Al-Qaeda images that our government loves to show off.

From the article: "Krawetz was also able to determine that the writing on the banner behind al-Zawahiri's head was added to the image afterward. In the second picture above showing the results of the error level analysis, the light clusters on the image indicate areas of the image that were added or changed. The subtitles and logos in the upper right and lower left corners (IntelCenter is an organization that monitors terrorist activity and As-Sahab is the video production branch of al Qaeda) were all added at the same time, while the banner writing was added at a different time, likely around the same time that al-Zawahiri was added, Krawetz says." Why would Al-Qaeda add an IntelCenter logo to their video? Why would IntelCenter add an Al-Qaeda logo? Methinks we have bigger fish to fry than Gonzo and his fired attorneys... }:-) The article contains links to Krawetz's presentation and the source code he used to analyze the photos."
Programming

+ - Don't overlook command line processing

Submitted by Anonymous Coward
An anonymous reader writes "Command-line processing is historically one of the most ignored areas in software development. Just about any relatively complicated software has dozens of available command-line options. The GNU tool gperf is a "perfect" hash function that, for a given set of user-provided strings, generates C/C++ code for a hash table, a hash function, and a lookup function. This article provides a reference for a good discussion on how to use gperf for effective command-line processing, and on command-line processing techniques in general."

Professional wrestling: ballet for the common man.

Working...