1411471
story
MC68040 writes
"The guy at this site managed to build something together that's actually quite neat in the way he built it, all hand-crafted system that uses a linux box to unlock his door. Maybe not the coolest of solutions, but actually a pretty good idea as for security in my humble opinion."
Great (Score:3, Funny)
Re:Great (Score:4, Interesting)
Just wondering...
Re:Great (Score:2)
Still, I wonder how many people can have the `distinction' of having to call a locksmith when their Linux box crashes :)
Re:Great (Score:2, Informative)
RTFL
Re:Great (Score:4, Funny)
Re:Great (Score:2)
indoors to reboot it.
And to scan the barcodes (Score:2, Funny)
Re:And to scan the barcodes (Score:4, Funny)
CutCats are cool, I got a friend in the USA to send me one. Thought about hooking it up to a computer near my refridgerator to keep track of groceries and expiration dates.
Hmm, imagine using it for access entry. "Sorry, you have to carry a bottle of jolt to gain access here", or "what, a pepsi!? No access for you!"
The access nazi! (Score:2)
Re:And to scan the barcodes (Score:5, Funny)
] inventory
You are currently holding the following: a set of keys, a brass lantern, a case of Jolt Cola[tm], and no tea.
] look
You are in the Cubicle of the Mountain King, with passages in all directions.
A huge green fierce programmer bars your way!
] n
You can't get by the programmer!
You're in Cubicle of Mt. King.
A huge green fierce programmer bars your way!
] drop jolt
The programmer attacks the Jolt Cola[tm], and in an astounding fury rushes off to enter the International Obfuscated C Code Contest.
] n
You are in a low north/south hallway at a hole in the floor ....
Re:And to scan the barcodes (Score:2, Informative)
Funny, and I've implemented something similer with a CueCat, but he would have to slide the barcode if it was a CueCat. Also, barcodes for entry arn't very secure. If anyone gets ahold of your card for 10 seconds, they can make a photocopy and have your security level. A magnetic stripe would have been a better choice for REAL security however, because it takes more elaborate equipment to duplicate.
Re:And to scan the barcodes (Score:3, Funny)
Personally, I see this as an upgraded form of "security through obscurity": security through weirdness. People know where the average person puts their keys and where the average person puts plastic cards (which most magnetic strips are put on)... but a barcode? W(here)TF does someone keep their BARCODE? A potential invader or an unscrupulous friend will be stunned by it. You can't look for a Hide-A-Key. He's not keeping it on a key rack. He probably can't just throw it down on his desk when he gets home. Hell, for all they know, his spare could be tattooed to his left ass cheek.
It's not obscurity, which is what the Hide-A-Key is. It's just weird, and on an individual basis, that could work for security.
tattoo (Score:3, Interesting)
Re:tattoo (Score:3, Interesting)
yeah, but why does that remind me of soemthing in the Bible? seems kinda apocalyptic if you ask me, and if he personally brought the beginning of the end of the world, i'd kick his ass.....
will eat script kiddies for fun....
rainman
Re:tattoo (Score:2, Funny)
Of course, someone could hack your arm off and get in your place but at that point I'd think you'd have more worrisome things on your mind.
Re:tattoo (Score:2)
Unless you are Steven Wright, in which case your house starts up and you drive it around awhile.
Re:tattoo (Score:2)
It's kinda like using fingerprints for keys. You leave them everywhere you go, and you can't change the locks when somebody gets the 'key'.
Re:tattoo (Score:2)
If this worked, it wouldn't for long.
I've got my SSN tattooed as a barcode on my forearm. It's just for looks, since even if by some miracle the artist was able to make the lines as razor-straight as they need to be, the change in size of your muscles and skin over time would distort it enough to make it non-machine-readable.
The last time I went to the dentist, one of the assistants saw my tattoo and told me a long story about her son who was in the US special forces. Apparently they'd had some kind of plan to use them as replacements for dog tags, but ditched it in favour of implanted microchips like you can get for pets, since there's a lot less hassle involved. Obviously I can't confirm the truth of that though.
23 years ago... (Score:5, Interesting)
The final solution was to have no keyboard at all, but rather a computer whose motherboard was embedded in a 3-ring binder, with sheets.
On the sheets, were some barcodes, arranged in roughly the same layout the mark-sense cards were.
(For the geeks, the machine was MC6809-based, and had 56K CMOS RAM. The LCD display was always powered, but the computer shut down after it finished decoding a barcode and processing the "keystroke".)
Re:What A Beautiful Mind (Score:2, Funny)
First of all he said 23 years ago, which would be 1980 or more likely 1979 (since today is only the 11th day of the year).
Second, he's friends [slashdot.org] with gandalf_grey (93942), who is also a fan of his; so this Pig Hogger dude has got to be fairly up in years.
;-P
Hmm.. -2 years +1 friend = credibility? (Score:2)
I'd still like to know 2 things. I'm not sure how to make this sound "polite" because it will probably end up sounding more like a challenge, but that is NOT my intention.
I'd love to read a bit more about this project Pig Hogger did back in early 80's (when I was happy enough being able to figure out how to overlay credits onto a home video tape with a Tandy)...
And I'd love to hear what Pig Hogger is doing now days.
Re:What A Beautiful Mind (Score:2, Offtopic)
I'll be forty in two months
Are you expecting me to stop posting to /. in two months? Am I allowed to do cool shit anymore?
What is this place? Logan's run?
Re:What A Beautiful Mind (Score:3, Insightful)
The point is, whatever you're doing today seems like drudge work, but after a quarter-century, everyone forgets the boring bits and just recalles the sexy parts.
Re:What A Beautiful Mind (Score:3, Interesting)
Read properly. I said 23 years ago, so that's 1980. I was only 18 at the time, but I had experience in computer graphics programming plotters (I volunteered for a computer graphics art group - this was waaaaay before Postscript) so it was only natural that I'd be the one they turn to to generate the barcode sheets.
They were done on a HP-9847 graphics terminal (a company oddball that was lying in a corner 'cause no one had any use for it. I learned years later that it was a demo unit THAT HP FORGOT THERE!!!!) onto which you could load a (surprisingly good - compared to the usual Microsoft crap - yes, Microsoft used to do crap then) BASIC interpreter, all this driving a IEEE-488 plotter. But eventually, I found the setup so disgusting (can't stand BASIC) that I wrote a device driver for the mainframe and I reprogrammed the barcode sheet programs. All in PL-1. Needless to say, that pretty well annoyed the dinosaur tenders of the time that I'd be using THEIR big iron to make graphics... Not to mention asking them all sorts of technical information in order to hack this...
In that project, I eventually also programmed the database on the mainframe that received the data, as well as the mainframe-side communication program, after my bosses saw that I managed to write a plotter driver for the dinosaur...
Anyway, the project was eventually canned because there was to much high-management interference (this was for a Fortune-500 ** CANDY ** company!!!) which brought the progress to a crawl. Only 10 prototypes of the computer were built, and I believe some still exist to this day.
* * *
Nowadays, I manage the computer department for a design company which designs museums (we're currently doing a museum for the Smithsonian, amongst other things), and I have a tax-credit consulting sideline.
For fun, I troll on Slashdot and NANAE, and have plenty of sex.
Now, for those who imply that there is no life beyond 30 years, I say you're fucking bunch of peepsqueaks whippersnappers; first of all, my sex drive went waaaay up when I hit 32 (went from 5 screws/week to 3/day), and I don't have any problems to pick-up; heck, a few months ago, a 19 year old jumped on me, and whas subsequently duly fully fucked by myself (and this happenned in a city park).
Reading his E-Mail (Score:5, Funny)
Hum (Score:4, Insightful)
FSCK (Score:4, Funny)
Then, when the computer restarts when the power comes on (because he's using a linux box) he can say "I CANT OPEN THE FSCKING DOOR!!!!!!"
Re:Hum (Score:2)
Re:Hum (Score:2, Funny)
Door Self-Destruct Initiated, T-Minus .001 Seconds (Score:2)
Re:Hum (Score:2)
Not always the case.
Depends on if the locks a re fail safe or fail secure. Some Fire Regs in some states require locks that unlock by dropping power to the lock (depending on application).
Most locks allow a key override though, as you stated...
your house as a semi-permeable membrane (Score:5, Insightful)
With a system like this, you can provide time-bounded access -- the petsitter can come by while you're gone part of this week, but her code might not be on the approved list for, say, 1 a.m. next Saturday night. Not that it would stop a real burglar, but all security systems are a series of intentional nuisances to bad guys. This way, there's no "spare" key floating around to be lost and worried about.
Plus you can send someone who needs to come by when you're not there (that petsitter, or the neighbor you've asked to check up on things) to open the door a "key" as a JPG file; they print it out, and it's their open sesame, at least at the times you've set them as welcome.
Since I like to think of houses as cell walls (hey, metaphors are meant to be reversed and amplified!), this lock system really resonates with me.
timothy
Re:your house as a semi-permeable membrane (Score:2, Insightful)
If you used PNG and could guarantee that the receiver had a laser printer (or thermal, for that matter), then it would work. If you want to use JPG and inkjet, well, good luck.
Re:your house as a semi-permeable membrane (Score:2)
Re:your house as a semi-permeable membrane (Score:2, Informative)
It looks like an inkjet printer, but I could be wrong.
Re:your house as a semi-permeable membrane (Score:2)
Barcoding isn't a very demanding exercise.
Where I work, we've got a few barcodes taped to the counter. Thermal-printed, been there for years: the paper is turning brown, and the black is a somewhat-vague purple.
We scan these fairly frequently on a daily basis, without problem.
The USPS seems to be happy with uneven dot-matrix printed barcodes; look at the lower-right corner of the stuff that drops through your mailslot sometime. And this is for so-fast-it's-blurry mail-sort systems, on particularly-lumpy material.
I've noticed 2-dimensional UPS barcodes (the funky ~1" square you see on some shipping labels, with a circular target in thing in the middle) printed dot-matrix, too.
And I've seen no indication that either system is in any way flawed.
So. We've established that the scanners aren't very particular; let's talk about printers.
Laser printing isn't so hot. Bend it a feww times, and the toner begins flaking off.
Lexmark, and probably others, offer what they claim to be waterproof ink. This is probably at least as durable as laserprint in a typical wallet.
The Alps MD-1000 I have here prints using wax ribbons. It tends not to flake, it tends not to fade, and it's definately waterproof. Oh, and it was cheap.
Most laser printers top out at 1200dpi. 2400dpi inkjets are now commonplace.
UPC barcodes have only two line widths - features which, given the scalability of barcodes, are probably quite easily implemented with a 24-bit printer at reasonable size.
Coca-Cola uses very large, sprayed dot-matrix barcodes on their 24-can cases of 6-packs. They're very rough, and I imagine they work justfine.
Now that we've got printing out of the way, let's talk about the barcodes I carry in my wallet:
I've got an Ohio driver's license, dye-sub printed plus holographic lamination, made 2.5 years ago. The barcode is quite plain and obviously usable, as sharp as I remember it being when it was issued.
I've got a Blockbuster membership card. 24-pin dot-matrix printed, issued at least 5 years ago, and laminated: The barcoode is quite plain, and obviously usable.
I've got a Sam's Club membership, issued a few years ago, printing style unknown (but probably thermal). The barcode is wearing off, but is still quite usable.
Obviously, you don't want to take a crucial water-soluable barcode out in the rain and use it. However, I feel that you need to look around a bit more: There's a plethora of low-res, functional barcodes attached to items in the world around you which you are obviously oblivious to, many of which are expected to be exposed to the elements.
And remember: Anything can be laminated, usually at a shop within walking distance. Why might one expect to be able to print barcoded keys at home, while conventional machined brass keys require a trip downtown? One shouldn't, at this point: Let's take it one step at a time, starting with email delivery.
Oh. And JPEG, as a format, is fine. It can encode sharp lines with ease, as long as the encoder is aware of the requirements and/or the quality settings are set sanely (which is not a problem with standard libjpeg) -- efficiency, in this instance, is rather not relevent. PNG, as a purist ideal, would be somewhat better. But even monochromatic BMP (or XBM or PBM...or PCX for old-school PC users)-format barcodes would be quite sufficient for the task at hand. Not to mention GIF, which will be readable by everything for a really.long.time. You could probably even distribute barcodes as HTML tables with colored backgrounds without problems.
Thus, I find all of your presented points to be misleading, inaccurate FUD.
Think now, post later. K?
Re:your house as a semi-permeable membrane (Score:5, Interesting)
The 'sending a JPG' to the baby-sitter starts out as a very neat idea, but what happens when baby-sitter has a popular e-mail virus which sends her e-mail to 100 people in her address book? Instant house party? Naturally they would only have the same access time slice as the baby-sitter, but they could just wait until after he/she is alone in the house and walk on in.
but without the major hassles (specialized equipment to punch holes or re-stripe a card)
It also means any Joe with a printer can make themselves a valid access card. I thought for quite a while about putting a similar setup at my house, but I decided instead to go with an extremely similar method, except instead of bar-codes I use hand prints. A lot of the advantages (time slices for the maid and sitters) without being able to be so easily produced (until advanced cloning techniques allow people to commonly grow copies of my hand).
And w.r.t. the people who keep asking about 'power outages' for (1) ever heard of generators of batteries and (2) naturally a physical key still works in the lock, duh!
$10 and I'm in (Score:2, Interesting)
Re:$10 and I'm in (Score:3, Insightful)
That insecurity is indeed real. Although those systems which were compromised were single-finger systems, and my system uses 3 as well as hand shape. Being able to get 3 clear fingerprints and mimic hand shape is more difficult than simply picking the lock, anyway, so your efforts would be better served in investing a a few dollars worth of decent lock-picking tools instead of a set of hobbyist PCB boards and etchers.
Re:your house as a semi-permeable membrane (Score:2)
That highlights the real beauty of this system. The only access to your house is wanted access or forced access. If the sitter realizes that she has a virus or just thinks that someone else may have figured out your key, they can just call you on vacation and you can VNC into your Linux box or send an e-mail to it to change the code, then email them a new one or email one to someone else.
For as long as there have been door locks that you can buy in stores, people have been changing their locks because of stolen keys, angry family members or former lovers, and missing keys that may or may not been in someone else's hands. Under the current system, you have to buy new locks for every external door in your house if you want to change the key. Under this system, all you have to do is type up a command on a keyboard.
And yes, I'm aware that having door locks that can be controlled via the internet is insecure, but the point is that you can control it any way that you want. If you think you can set up a really good network that is unlikely to be hacked anyway, you can make it so it can be set through the internet. If you can't set up a really good network, you can just tell your sitter what to do over the phone.
Keypad (Score:2, Insightful)
Of course, you'd have to make the password sufficiently strong.
Re:Keypad (Score:5, Funny)
Re:Keypad (Score:2)
Not to mention picking locks.
Re:Keypad (Score:2)
Goddamned annoying to come home late at night from work and find him parked in my favorite chair, watching TV and drinking my brews.
But after I almost shot him once when I thought he was an intruder he decided to go bother other folks and drink *their* brew. Ah, the gun! Better discouragement than any lock.
Max
Re:Keypad (Score:4, Funny)
Hey, I might see if I can patent that one...
Re:Keypad (Score:2)
Barcodes (Score:5, Informative)
Check out This [howstuffworks.com] if you are interested.
Honestly, really (Score:4, Insightful)
Re:Honestly, really (Score:5, Interesting)
Slashdot really, truly, utterly needs to have a local cache of the
pages it references. It's getting to where Slashdotting is as bad as a
denial of service attack - and that's a terrible thing to inflict
on *anyone*.
Probably 50% of web sites referenced from main news items are down within
an hour of Slashdot mentioning them - and they stay down until a couple
of days have passed. That sucks.
They could easily implement some kind of opt-in thing where you put a META tag
in your web page telling Slashdot that you grant them explicit permission
to mirror the site for (say) a week after mentioning it - so Slashdot would
have no legal/copyright come-backs. At the end of the week the Slashdot
mirror could revert to become a redirect to the real site so you don't have
problems with people bookmarking the Slashdot cache instead of the real
site.
The whole process could be automated.
People who do cool things like this door lock would surely be aware that
they could get Slashdotted and prepare for the event in advance by
inserting the tag - and private individuals are the people who are
most likely to have their server die.
Companies that want to profit from their slashdotting by advertising from
their page or taking orders off of it could just leave off the META tag
and handle the traffic as now.
An opt-in cache mechanism is a win-win-win solution. Slashdot wins because
more people will use the service if it doesn't continually refer to dead
sites. Readers will win because less sites will be dead-on-arrival - and
web site operators will win (if they want to) by not having their site
die from Slashdotting.
Re:Honestly, really (Score:2)
No, Actually (Score:3, Informative)
Read the FAQ [slashdot.org]: They could easily implement some kind of opt-in thing where you put a META tag
in your web page telling Slashdot that you grant them explicit permission to mirror the site for (say) a week after mentioning it - so Slashdot would have no legal/copyright come-backs.
You're a genius! Oh...wait...no... You just haven't read the FAQ [slashdot.org]
People who put up websites should recognize that people are going to look at it. Sometimes, a lot of people might look at it, as a result of a link from Slashdot or any of hundreds of other sites. People who bitch and moan about being linked to from Slashdot remind me of the companies who whine when people link to "confidential" webpages -- guess what, if it's on the web, it's not confidential.
-Waldo Jaquith
Re:No, Actually (Score:2, Offtopic)
Who cares? For them to get noticed on Slashdot, the interesting bits will still appear in the cache. Also, having the content cached doesn't mean that a link to the original site couldn't still be provided.
Bullshit. If I want "breaking news", I go to CNN. I can't remember the last time I read a Slashdot article where the content of the article was time sensitive. It's just casual information to entertain and maybe educate the bored geek. Six hours is nothing. By the time Slashdot gets the news, it's already out in the open. It's not like they're going to get scooped.
So if the site doesn't have the magical opt-out tag or extra instruction tag, then fire up your e-mail client and get permission. Or just cache it and be done with it.
The point is that it would be a decent thing for Slashdot to provide some mechanism to minimize the inconvenience caused by having a site or page linked on the front page. The points listed in the FAQ are weak. The bottom line is that some sort of cacheing would benefit both the owners of the content being linked (it wouldn't nuke their site) and the readers of Slashdot (no more seeing a cool story on Slashdot only to have to wait to read it because the Slashdot effective is already underway).
Truth be told, there is already an informal Slashdot cache -- you often see kind users copying the meat of the page into a comment which always gets modded up to +5. Further proof that an official Slashdot cache would be well received.
The only real argument against a cache would be the load that it would place on the Slashdot servers. They are tuned to handle their current content, but I wonder if they would be able to handle the load of serving up all that extra content in addition to the stuff that they already do.
I don't buy it; use a caching proxy if nothing els (Score:5, Insightful)
At a very minimum, use a caching HTTP proxy to feed a "mirrors.slashdot.org" site. Links would be set up under their own, unique path on this site (e.g. mirrors.slashdot.org/some.site/path/document or even mirrors.slashdot.org/50449) and this would funnel into a caching HTTP proxy. So long as the other site set up reasonable cache headers, there is no reason why the sites would object to their pages being cached in this fashion. This is built into HTTP, for fuck's sake. Wherever they have advertising being done, they're probably doing that in an iframe with its own caching policy. HTTP would handle all of this perfectly fine. Set an artificially low max-age value (overriding the site's) if you're really worried about things getting stale, but even this is unnecessary.
This is all fairly trivial to do. Slashdot authors/programmers have just gotten lazy in the last few years. They don't innovate or improve, they just watch over the slashcode "open source" project and occasionally toss out a few minor releases.
From your quote of the FAQ:
I could try asking permission, but do you want to wait 6 hours for a cool breaking story while we wait for permission to link someone?
Why don't you use some fucking common sense, ask yourself, "Do I think this site will survive linking?" And if the answer is "probably not," then e-mail them or call them, give them a head's up, and only if you fail to get a response in a reasonable amount of time would I ever think it's OK to link to them anyway.
They do have the information posted online, so any link and any amount of traffic is fair, but at least have the goddamn courtesy to mitigate the amount of damage you're knowingly causing. That's all that's being asked for: courtesy. Slashdot authors are lazy, that's all there is to it.
Re:Honestly, really (Score:2, Offtopic)
However, if weren't possible to make it bandwidth friendly, Slashdot needs to take advantage of resources out there like their own server or SourceForge and work a deal to use temporary space upon request of the owner of the linked site. The owner could easily package up the relavent portion of the site and e-mail it over to be put up at the temporary location.
If nothing else it would at least eliminate all the stupid "hey look it's slashdotted" posts.
Currently, Slashdot is just a link site with commentary. If it's keeps killing all it's stories it's going to be a pretty irrelevent link site at that.
Ben
Video store barcode (Score:2, Insightful)
So i just have to work at his video store (or have a friend who works there), make myself a copy of his barcode, and i get free reign of his house? Sweet.
Re:Video store barcode (Score:2, Informative)
The exception to this is the "two D" barcode (like on a UPS package). If I remember correctly, they can hold ~256 characters (I haven't used them).
Not very secure (Score:5, Insightful)
To get into my house, you need to have my key, or a copy of my key. If I let you look at my key, you won't be able to copy it; you have to have my key in your possession to make a copy.
To get into this guy's house -- and please note that the pictures wouldn't load, so I'm going by the captions -- you need to have his barcode, or a copy of his barcode. If I look at his barcode, I can remember the information I need to copy it, even if I don't have his key when I make the copy!
It's a neat hack, and *maybe* it's more convenient than putting a key in a lock (but it's also more complex -- I picture him standing at the door in the rain during a power failure), but it's not secure. Even a PIN pad would be more secure, becaues you can memorize the PIN -- you *have* to write down the barcode.
Re:Not very secure (Score:2, Insightful)
Contradiction aside, most people, and especially common thieves, would have no idea how to make a barcode. I personally know you can do it with some software, but I'm not familiar with any of it and have never done it. I do know there are several types of bar codes so that throws another hardball at you; you have to get the right type.
In this case, also, if this person lost his bar code, it's his video rental card. It doesnt exactly scream "this is the key to my house." *No one* is going to think its the key to his house. That. Is. Cool. Of course, if he doesnt have a copy or cant get another copy of from the video store, he's also screwed, etc etc.
On the other hand, if a thief were to somehow get your pin, I bet he would be able to remember the pin long enough to write it down, and entering it into your numpad is trivial.
I think its at least more secure then you give it credit.
Re:Not very secure (Score:4, Insightful)
i use my drivers liscence to switch to root on my box.. its not nesecery, in fact its probly over kill and pointless. however. most importantly it makes me think for a second if im about to do something as root.
plus, its something neet to brag about, which is part of the geek world. because you dont like it doesnt mean that himself and his friends dont like it
Re:Not very secure (Score:2)
Re:Not very secure (Score:2)
Re:Not very secure (Score:3, Interesting)
Don't go betting all your wordly possessions on this. An experienced locksmith (or someone who knows what they are looking for) can come up with a reasonable facsimile of your key based on the key cuts and the type of lock (probably imprinted on your key as well) if given a chance to look at your key. Keys can be traced and/or photocopied as well. A good reason why you should never leave your house key on the key ring when you hand over your car keys to someone you don't know or trust (valet, mechanic, etc.)
Re:not neccessarily: cant copy key by looking (Score:2)
Power outages ? (Score:2)
web / security server? (Score:4, Funny)
Forget key impressions in soap... (Score:3, Insightful)
Re: Power outages? (Score:5, Informative)
Good Security (Score:5, Funny)
Unless you happen to have a 13oz can of Campbell's Cream of Mushroom soup lying around to pick the lock with....
The MS Response (Score:2)
<press release>
Coming in 2004 from Microsoft, the leader in enterprise security, Microsoft Home Security
Not only can you now keep track of your MSN (tm) Instant Messenger Buddies on your computer, they can instantly know when you get home too! And don't forget about exciting new features like Internet Explorer In The Bathroom (version 8.0!) and a free Tablet PC with every purchase! Now you can feel secure about your home knowing that Microsoft's Award Winning Security Task Force is on your side! Sign up today and get 10% off the already 100% marked-up price!
And coming soon, look for Microsoft's answer to Parking Lot security, Security Guard Who Looks Like A Drunk Bum Lying Near The Booth version 2.0! Hackers will never figure that one out!
</press release>
From the few pictures I saw... (Score:4, Funny)
That's mainly why I try to avoid "pimping out" my car. What's the point of a nice paint job and a fart pipe if the brakes are failing and the engine's falling apart?
PAINT YOUR HOUSE
Re:From the few pictures I saw... (Score:2)
That's mainly why I try to avoid "pimping out" my car. What's the point of a nice paint job and a fart pipe if the brakes are failing and the engine's falling apart?
Your post makes the perfect example of contradiction ;)
Re:From the few pictures I saw... (Score:2)
It's a two part system... (Score:2)
Custom Profiles. (Score:2)
Re:Custom Profiles. (Score:2)
Proposal (Score:4, Interesting)
It seems to me Slashdot could offer to mirror the content for a price, so that the linkee gets ad money, while slashdot carries the bandwidth burden.
Is there no way to:
1) Contact the website owner
2) Alert him of the amount of bandwidth he's going to need
3) Offer to mirror his pages such that ad referals still go to him
4) Everybody profits?
Re:Proposal (Score:2, Informative)
Obligatory quote... (Score:4, Funny)
HAL: I'm sorry Dave, I'm afraid I can't do that.
I see this as Important. (Score:2)
PS: History and naming may show more meanings for X10 and X11, however, it's the common usage that I am refering to.
Clarification pointing to relevance (Score:2)
Re:I see this as Important. (Score:2)
Self fulfilling prophecy?
Sorry, your confused... (Score:2)
The technology of X10 is very cool. It's a low speed protocol transmitted via standard home wireing, in duplicate to prevent errors, sent during the zero phase of the standard AC power curve. Quite cool, quite simple, quite elegent.
The ability to program you home lighting, broadcast home theater, lighting, temperature, security, and countless other bits of information over standard home wiring is defined by X10. It's there, unrestricted, and one could even argure it's BETTER than GPL, it's an EXPIRED patent, meaning there are NO rules on how to use it because it's an idea that can no longer be owned because it's past it's time limit for ownership.
What was your complaint again?
Site Text (Score:2, Informative)
The front of the house. The windows on the left are to my room.
In my window sits a cheap barcode reader. It's powered by a computer power supply I ripped from an old computer.
Anyone who wants to get into the house can scan a barcode that they carry. A video store gave me a little keychain barcode which I'm using here. The scanner has a CCD; I don't have to slide the barcode. The scanner actually has a beeper that I can control from the computer. You can hear it beep from outside the window.
Here's the driver circuit I slapped together for the barcode reader. It's just a MAX232 chip that converts CMOS/TTL levels to the RS232 spec. The output connects to the serial port of one of my Linux boxes. That box runs a trivial python program to read a packet from the serial port and send it via TCP/IP to another computer in the house.
The receiving computer is connected to this K8000 experimenter board. I2C chips on this board . If your barcode was on the list of allowed keys, I raise output 7 on this board for 6 seconds. Input 6 (the right-hand illuminated LED) shows that the door was closed when I took this picture. See below for how I sense if the door is opened or not.
Some successful reads.
When the K8000 board raises the right output signal, this driver circuit sends 24VDC to the door strike, shown below.
In this electric strike is a solenoid that relaxes the part of the strike that was holding the door closed. The door still functions as it did before, but now I have an additional way to allow the door to open.
This is the top of the door frame, where I have wedged a reed switch into the wood. There's a magnet on top of the door that closes the switch when the door is closed (hence the turned-on LED in the picture above).
Closeup of the reed switch in the wood.
###
-Mac Refugee, Paper MCSE, Linux Wanna-be
Current Page Text (Score:2, Offtopic)
This used to be an interesting page about the barcode scanner door entry system I built with Python and Linux. I posted this page because I'd like to share my project with others. I've answered emails giving people circuit diagrams, and I've had various online discussions about my design decisions.
Now MC68040 and michael@slashdot.org decide that it's time for me to go down. They didn't ask me if they could link; they didn't ask if I'd like to put up a mirror somewhere else. At least michael-the-slashdot-editor knew that I'd be down in minutes if he made a link.
I'd love to put this page back up, and maybe in several days I'll remember to do so. If you're interested in interfacing Linux with serial devices or electric door strikes, drop me an email at drewp@bigasterisk.com.
Bitter?
USB Keychains (Score:4, Insightful)
Instead of a barcode, why not use one of those USB-keychain things? Seems easier to rig under Linux -- just get the kernel to automount the device when it sees it and check some file on the device. Fit a USB socket into the wall and carry around your wee USB keychain.
Authentication is the least of concerns...just dump a gazillion random bits to the drive and compare them with the copy on the house. I imagine you could probably rig up some spiffo public-key crypto, but I don't really see the point. One-pads work fine here.
As usual, you've got the problem that if somebody steals your keychain, they can make a copy of it, but this is the same problem you have with regular keys or this barcode thing.
Another benefit is you can rewrite the key on the USB drive after every use. If $BAD_GUY steals your key without your knowledge but you manage to get back to the house first, his key is worthless.
The max # cycles isn't so hot on those flash drives, but I imagine you can get a few years worth of entry without any problems.
Plus, with a 64MB keychain, you've got enough space for as many keys as you could possibly every need (640k, anyone?)
Not very clear minded. (Score:2)
Now MC68040 and michael@slashdot.org decide that it's time for me to go down. They didn't ask me if they could link; they didn't ask if I'd like to put up a mirror somewhere else. Of the two of them, at least michael-the-slashdot-editor should have seen that I'd be down in minutes if he made a link.
I'd love to put this page back up, and maybe in several days I'll remember to do so. If you're interested in interfacing Linux with serial devices or electric door strikes, drop me an email at drewp@bigasterisk.com.
"I posted this page because I'd like to share my project with others."
"They didn't ask me if they could link; they didn't ask if I'd like to put up a mirror somewhere else."
Now, I've got a lot of respect for people who come up with new ideas and actually make them happen. I appreciate it when they tell the world how to do it. I think it kicks ass when Linux is their tool of choice. But what the hell is this guy thinking? "Stop looking at the information I want you to see!" It's pathetic when some stupid company wants to restrict linking, but it's inexplicable when a hacker does it.
My commends (Score:2, Informative)
Second of all, as for security.
I was not considering this as a high-level mumbo-jumbo super-secure system but I'm just of the opinion that it was pretty neat (atleast more neat that just sliding your magnetic stripe card throught a reader) and a easy way to provide users with time-limited access not for it to be a failsafe system =) It's just cool.
My 0,5 cents.
Re:Slashdot record? (Score:5, Funny)
Geek 1: Hey, guys, I got slashdotted!
Geek 2: Woah! No way!
Geek 1: Yep. *smug*
Chick: He's so dreamy...
Re:Slashdot record? (Score:2, Funny)
Re:Cache (Score:5, Informative)
Re:Slashdot effect (Score:2)
Re:Slashdot effect (Score:2, Insightful)
Are these the same editors that have time to post duplicate stories?
The sites that tend to be most quickly slashdotted are also the sites that are most likely not to be ad-supported. More, they're also the same sites that are most likely going to end up costing the owner an arm and a leg when their bandwidth allotment is completely smashed by a Slashdotting. In otherwords, they're not gaining any money by being linked to Slashdot, and are highly prone to actually losing money. Let's see what you'll do if you're faced with a $1000 bandwidth bill because your lego collection made it onto Slashdot.
What "rest"? Legal issues? The editors obviously should contact site owners (at the very least to warn them that Slashdot is about to launch a massive DDoS on their website). I'd much rather wait a day or two to see an interesting site than not be able to see it at all. If someone doesn't want Slashdot to cache their site, then they should at least be given the opportunity to not have the site posted to Slashdot.
For this kind of site? Not likely. I looked at the Google cache. The site has a lot of pictures of the guy's setup, and google doesn't cache images. Thus, the Google cache is nearly useless.
Re:Slashdot effect (the good, bad, and the FAQ) (Score:2, Offtopic)
Uh, they wait until they get a response? It's not as if Slashdot is going to get scooped on one of these. Heaven forbid that the editors, with all their journalistic rabidity, actually had to wait to post a story that was probably submitted a week ago.
I agree with the FAQ. Slashdot shouldn't have to mirror the sites, but for all their emphasis on being a community-oriented site, they sure aren't kind to small site owners. CNN, BBCi, C|Net, etc should all be able to handle the traffic. Some rinky-dink virtual site will never be able to handle it, and if the editors can't realize that, maybe they need to turn over their "community-oriented site" to someone more knowledgeable about the community.
Re:Slashdot effect (the good, bad, and the FAQ) (Score:2, Offtopic)
But however that goes, Slashdot really does need to be a little friendlier towards site operators when it's fairly clear up front that their site probably won't handle the traffic.
For the record, I've had news sites (e.g. MSNBC) do a story that involved some piece of content on my site, and generally, they ask my permission first, checking that I'm OK with it and that my servers can handle it. If they can take a few moments to do this, surely Slashdot can as well.
Re:Why not -1, Redundant? (Score:2, Offtopic)
"Opt out
Anyone with a
Re:Why not -1, Redundant? (Score:2)
Most sites are small. By small I mean someone has decided they want to set up a quick-and-easy web site, throws it up on some personal web server software, and lets people at it.
Do they "deserve" the flood of traffic Slashdot might generate to it? Perhaps. Is it "their own fault" that their network connection and/or server is brought to its knees by the visits generated by Slashdot? Perhaps.
That doesn't mean they can't be annoyed, frustrated and a little bitter at Slashdot. Wouldn't you be?
For your challenge that someone come up with a "legally sound" solution to the problem, keep in mind the responses in the FAQ are an utter joke. Slashdot programmers are lazy.
All someone needs to do is set up a mirroring front-end that just hooks into an HTTP caching back-end. An image is a static resource. Most web servers will specify a 'max-age' for that resource, or at the very least they express a Last-Modified header that a proxy can use to compute an acceptable expiration date before trying to revalidate it. This simple HTTP caching behavior could very simply drive a mirroring site.
Sites that have certain areas or iframes or images or whatever that they want to be requested for every visit or every request can express (and should already be expressing) these requirements through proper use of Expires or Cache-Control headers.
Caching HTTP proxies have been around for years. All they'd need to do is put a different face on one and this problem is solved.
Re:Interesting (Score:4, Insightful)
Frustrated, he pulls the content down in an attempt at restoring at least some semblence of service to the site.
Wouldn't you share his emotions? Sure, he "asked" for it and "deserved" it by posting that data online, but it's still annoying and frustrating that you can't make that information available due to its inflated popularity by being reported on by a site.
Slashdot needs to be a little more cautious with this type of thing. At the very least, use standard HTTP caching mechanisms to set up a form of mirror for those sites that do express a willingness to be cached through HTTP.
Re:He misses the point of the Web (Score:2)
I think you're reading too much into things.
He's annoyed and frustrated that his server was brought down due to the traffic created by this article. Wouldn't you be?
Most servers cannot handle the traffic Slashdot generates. This is an unfortunate fact, but it needs to be a fact that Slashdot admits to and tries to mitigate. They don't. The FAQ gives a few excuses that don't hold any water and that's the end of the discussion as far as they're concerned.
Re:Let's be frickin' realistic... (Score:5, Insightful)
I completely agree that people posting information to the web should not be surprised if that generates more activity than they would have wanted. In that respect, yes, it is "their own fault" and they "deserve" what they get.
But your comment suggesting that every web server and network be configured to survive a Slashdotting is idiotic. A "properly configured 333Mhz crap machine" most certainly will not survive any but the most mild Slashdotting, even assuming the network does. The fact that you make this statement shows me that you have no idea what you are talking about. Please post some numbers.
Your lack of sympathy for those people just trying to get something interesting/useful posted to the web astounds me. Someone that can afford to put information online for the benefit of all but cannot afford to do so using high-end hardware and high-capacity network links should not be punished for doing so. Not everyone is a professional web provider. Not everyone needs to be one. For most sites, with most content, Slashdot-levels of traffic will never happen. Why spend money building an environment that will handle it? In addition, some environments can handle it, so long as they have sufficient notice. What's wrong with a policy of giving people a few days notice before posting their link on Slashdot when it's clear their site probably won't survive it? Maybe the site owners can take some steps to ensure their site would stay up, or maybe temporarily mirror the content in question somewhere else? There's a lot that can be done here to prepare for a Slashdotting, but nobody has the decency to allow that to happen.
I agree that 'michael' can't be directly blamed for this, but Slashdot's policies on the matter most certainly can. It's just a matter of common sense and not being an ass. You're right: there's nothing requiring Slashdot to do this, and anything with a URL is fair game to be linked (with the traffic that that causes), but come on, there is a human factor here, and Slashdot could be a bit more courteous here.
As secure as a key is... (Score:2)
Admittedly, if you knew something about the system, you could bring along a book of preprinted barcodes to get in, but then you could also bring a lockpick set too. And the lockpick is probably faster to do.
Then again, I prefer the hard and fast brute force method.. A swift kick to the door to break the frame. Works most every time.