Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Nice to see them finally breaking (Score 1) 75

Part of the reason things have been crap lately is that the studios have been running smaller and smaller writer's rooms. Why hire eight writers when you can hire four, work the hell out of them, and then lay them off before production so they can't do any rewrites?

They're pushing quantity over quality.

Submission + - EASA Instructs A350 Operators To Install Cockpit Coffee Protection (simpleflying.com)

AmiMoJo writes: Airbus has developed a cover for key controls in the A350 cockpit, to protect them from liquid spillage. This important update comes after two incidents of engine shutdown in the past year, and EASA has instructed all A350 operators to install the new covers within 28 days. There have been two incidents of engine shutdown on A350 aircraft in 2019 and early 2020. Both of these have been attributed to liquid spills around the controls on the center pedestal of the cockpit. Airbus has been working to address this and has now released a cover to protect these controls from such spillages. The removable covers are designed to fit over the master levels, thumbwheels, and rotary knobs. The covers should be left fitted during the cruise, but removed for take-off and landing.
Security

Is Your Chip Card Secure? Much Depends on Where You Bank (krebsonsecurity.com) 38

A recent series of malware attacks on U.S.-based merchants suggest thieves are exploiting weaknesses in how certain financial institutions have implemented the technology in chip-based credit and debit cards to sidestep key security features and effectively create usable, counterfeit cards. Brian Krebs reports via Krebs on Security: Traditional payment cards encode cardholder account data in plain text on a magnetic stripe, which can be read and recorded by skimming devices or malicious software surreptitiously installed in payment terminals. That data can then be encoded onto anything else with a magnetic stripe and used to place fraudulent transactions. Newer, chip-based cards employ a technology known as EMV that encrypts the account data stored in the chip. The technology causes a unique encryption key -- referred to as a token or "cryptogram" -- to be generated each time the chip card interacts with a chip-capable payment terminal.

Virtually all chip-based cards still have much of the same data that's stored in the chip encoded on a magnetic stripe on the back of the card. This is largely for reasons of backward compatibility since many merchants -- particularly those in the United States -- still have not fully implemented chip card readers. This dual functionality also allows cardholders to swipe the stripe if for some reason the card's chip or a merchant's EMV-enabled terminal has malfunctioned. But there are important differences between the cardholder data stored on EMV chips versus magnetic stripes. One of those is a component in the chip known as an integrated circuit card verification value or "iCVV" for short -- also known as a "dynamic CVV." The iCVV differs from the card verification value (CVV) stored on the physical magnetic stripe, and protects against the copying of magnetic-stripe data from the chip and the use of that data to create counterfeit magnetic stripe cards. Both the iCVV and CVV values are unrelated to the three-digit security code that is visibly printed on the back of a card, which is used mainly for e-commerce transactions or for card verification over the phone. The appeal of the EMV approach is that even if a skimmer or malware manages to intercept the transaction information when a chip card is dipped, the data is only valid for that one transaction and should not allow thieves to conduct fraudulent payments with it going forward.

However, for EMV's security protections to work, the back-end systems deployed by card-issuing financial institutions are supposed to check that when a chip card is dipped into a chip reader, only the iCVV is presented; and conversely, that only the CVV is presented when the card is swiped. If somehow these do not align for a given transaction type, the financial institution is supposed to decline the transaction. More recently, researchers at Cyber R&D Labs published a paper detailing how they tested 11 chip card implementations from 10 different banks in Europe and the U.S. The researchers found they could harvest data from four of them and create cloned magnetic stripe cards that were successfully used to place transactions. There are now strong indications the same method detailed by Cyber R&D Labs is being used by point-of-sale (POS) malware to capture EMV transaction data that can then be resold and used to fabricate magnetic stripe copies of chip-based cards.

Comment Timothy Dexter. (Score 4, Funny) 38

> the interplanetary equivalent of sending coals to Newcastle

Famously, one man did this, Timothy Dexter. He was the world's worst businessman, but luck was with him every time.

Buy a buttload of worthless currency issued by a country destined to lose a war to the British? He was the one laughing when the British lost and the newly formed US government paid out. Ship bed-warmers to the West Indies? Well, turns out they make great ladles for molasses manufacture.

Same with the woolen mittens he sent there; His ship got there at the same time traders were leaving for what's now Siberia.

On to the coal. Someone suggested, as a joke or as an insult, that Dexter could make money shipping coal to Newcastle.

So he did.

His ship hit the harbor at Newcastle the same week the coal-miners went on strike and he was the only game in town.

Comment Re:Name? (Score 2) 388

One fellow did this to me three times in the same week. The first two times I merely changed the password and deactivated the account with a quickness. When it happened a third time, I figured I'd teach him a lesson. I let him add all his high-school friends, family and co-workers at the ice-cream parlor over the next week or two, then changed the password, Goatse'd his profile, and sent notices out to all of them. "If little Johnny Junior would like a Facebook account, tell him to get his own. This one is attached to my email address.". I let it sink in for a couple days before putting the kibosh on it.

Johnny's dad was amused and sent me an apology. It seems that Johnny Senior had signed up for a super-spammy dating site with my email address some years ago and I'd Goatse'd his profile in response.

Comment Re:Declared underweight? (Score 1) 361

They do operate on the honor system, basically.

When the port (or a railroad) accepts the container, it comes with a shipper certified weight attached to it in the computer. In rare cases the railroad or port will 'fudge' the weight closer to reality, reweigh it, or hold it for inspection. I'd say if you had a slightly overweight container you could get away with it 99.99% of the time.

Comment Scavenging.. (Score 2) 212

I had to support a manufacturing company 15 years ago that was using (at the time) 15-20 year old gear. I did it by scavenging and making it myself. Robot needs a new SSDD floppy drive? Flea market Commodore. RAM in the Soviet S100 clone going bad? Take apart a broken synth. Winchester drive controller going tits up? Drive around and look at all the junk bins of every computer shop in the county. Need to move a bit of kit but now the non-standard 45-pin cable is too short? Clip the ends off and Radio Shack them to RS-232. I also swapped a lot of gear around; The DOS machine that was used to program one robot was gradually upgraded from an 8088 machine to a 486 as I stole parts from it to keep the CP/M-86 one running.

The other thing I did a lot of was preventative maintenance. Blow out the dust, check the power supply, clean the disc drive, make sure everything is well seated. Switches got lubed, cables checked for faults, and media replaced.

Comment Re:Something It Isn't (Score 1) 775

I've done jobs that required me to carry a non-camera phone. Simply proving that the camera was non-functional was good enough to keep my shiny smart-phone. Remove the back panel, apply a bit of electrical tape between the camera module and the external cover and Bob's your uncle.

The worst I ever had to do was take apart the vendor firmware and replace the camera binary with another application, then fudge a checksum somewhere and document the entire process. That company was super paranoid, but it saved me carrying a WinCE PDA, Palm PDA, three cables and a dumb-phone, plus chargers for each of them.

Just wipe the camera APK in a provable way and tell them to shove off.

Slashdot Top Deals

"There is such a fine line between genius and stupidity." - David St. Hubbins, "Spinal Tap"

Working...