Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment How does he tell if the problem is his or Comcast' (Score 1) 154

Having had two consumer WiFi routers crap out in the last 4 years (start dropping packets like crazy), I wonder how he differentiates with issues on his network or on Comcast's when running this speed test. Even something as simple as the cat yanking on the network cable could affect the results.

Comment 1995 all over (Score 4, Funny) 312

I do recall, in the early days of slashdot that the GNU/Hurd enthusiasts were proclaiming how silly people were to be wasting time on Linux, when Hurd was just around the corner. I was in high school then. It's great to hear that audio works, maybe one of my grandchildren one day will be able to actually use it for video.

Comment Re:new dmca brickdown request... (Score 1) 299

Yes...this will be the best way to stop criminals...especially IP thieves and copyright violators. Just brick everyone in the bit torrent swarm by court order. The next step is to extend this to all computing devices...AMD and Intel and homeland security can come up with a bricking standard that runs in like ring negative three :)

Hey once the ability is there, why not?

Comment Re:Qualifications: thinker and visionary (Score 1) 107

It was 10 years-from-now technology in 1995, and it's still 10-years-from-now tech. I imagine that in 1000 years it will still be just 10 years away.

Hint: Investors aren't going to go for an outlandish idea if it won't pay back in their lifetimes or a reasonable period.. So the maximum window stated is always 10 years,

Comment nail stuff down (Score 1) 408

You know how they sometimes say burglars took everything that wasn't nailed down? Well, nail stuff down. Make it harder for the thief. For example, use laptop security cables on computers and monitors. Most TVs can be mounted to their stand for child safety ( anti-tip), so screw them to the stand. Got a pricey DSLR? Keep it out of sight, maybe put it in a locked drawer. But don't only lock one drawer...

There are devices like make soup cans you hide jewelry in.. Don't use them. Every thief knows you don't keep your soup on the bedroom.

Comment Re:Specific use cases (Score 3, Informative) 58

Maybe I've seen too many TV shows but if you have a pre-recorded text for 911, something like seven key strokes can send it silently whereas the standard voice call risks the attacker hearing you.

I wasn't impressed with the article. At a higher level there has to be some coding you can send that says "can't speak, puts my life in danger". I don'tr know what that would be, but it rises above the article's cheap promotion of voice calls.

Not only that, most phones emit a very load beep when making an emergency call.

Comment impartial accident assessment (Score 2) 325

I'm not too concerned about getting away with minor speeding. I'm more concerned about impartiality in accident reports, and excusing criminally negligent behavior. Is this happening? If so the solution, unfortunately, is 100% recording of traffic from the police vehicle point of view, and removal of all officer discretion.

Comment tip of the iceberg (Score 2) 128

I'm sure we will see more problems with the internet of things. Just wait until lulz kids figure out how to make smart smoke alarms beep continuously., so people disable the power, or turn the heat up to 100 and then down to 10 ( Fahrenheit). There's not shortage of psychos who like to screw with people (see: webcam hacks and 'slaves'). So it's a matter of time.

Critical life safety devices like Smoke detectors should be a local loop only. You can interconnect, but don't connect to the internet or phones.
If you want a smart one, make it redundant and in addition to the local only alarms. Hook it up to something outside or your alarm company.This is to call the fire department when no one is home. I.e. this is for saving your property.
And control devices like your thermostat should have a local override switch that disables, in hardware, all smart features and turns it into a dumb device

Comment Re:I've implemented something similar (Score 1) 90

There's another side to this too. You won't see this scheme implemented because encrypted data can not be de-duplicated, and can not be compressed. Effectively your solution increases the cost of doing business, both in terms of bandwidth and in infrastructure.

Encrypted data can be compressed...just you have to compress before encrypting.

Comment software faults, real world consquences (Score 1) 77

Any automated control should have a local override to disconnected it from the control loop. This is normal practice in process plants. That way when a hacker takes over your thermostat, you put it in override until the access problem is fixed.

Second, fires by software should not be possible. Protections should be baked into the hardware for home control things that can have e consequences to people.

Slashdot Top Deals

No man is an island if he's on at least one mailing list.

Working...