Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Automatic barriers (Score 1) 608

After the 1983 Beirut Barracks bombing that killed "241 American servicemen: 220 Marines, 18 sailors and three soldiers" Areas of high security have barriers put in place so you have to weave, no more straight shots.

But using Google Earth I get pillars that autos can't get between
http://www.panoramio.com/photo/82858047?source=wapi&referrer=kh.google.com

For a car to set them off defeats their purpose. Her cars front end wasn't damaged, even after the chase
her front end looks to be fully intact, and these pillars are seen as well in the pictures of the event.
http://www.dailymail.co.uk/news/article-2442703/Miriam-Carey-Woman-killed-outside-Capitol-Hill-trying-ram-gates-White-House.html

Yet they still refer to it as a ramming. "The Connecticut woman who rammed a White House barrier with her young daughter in the car before being gunned down by police was suffering from postpartum depression after giving birth last year, her mother has revealed."
http://www.dailymail.co.uk/news/article-2442703/Miriam-Carey-Woman-killed-outside-Capitol-Hill-trying-ram-gates-White-House.html

Beirut Barracks bombing:
The 19-ton Mercedes-Benz truck then passed between two sentry posts, passed through an open vehicle gate in the perimeter chain-link fence, crashed through a guard shack in front of the building and smashed into the lobby of the building serving as the barracks for the 1st Battalion 8th Marines (BLT). The sentries at the gate were operating under rules of engagement which made it very difficult to respond quickly to the truck. http://en.wikipedia.org/wiki/1983_Beirut_barracks_bombing

Comment Re:tragedy of errors? (Score 1) 608

Sounds like all the shooting was police or Secret Service. Car impact, female with babe in a car with out of state plates, chased, and shot ?

What if she was lost, confused and just made a wrong turn while talking on her cell phone, surprised by the barrier?

Perhaps the true price of paranoia.

Yes it was tragedy of errors and mayhaps bad timing on her part (being in the area).

Shots reported fired, a helicopter reported landing in front of the Capitol. The cop car that hit the barricade appears
to of hit it sliding sideways, he was at first reported as being injured by gunfire - and an "active shooter" scenario was called.

Submission + - Adobe hijacked, user information compromised (extremeta.com)

sfcrazy writes: Adobe switched its business model from license to subscription base, which wile make it more affordable for user also required access to critical information such as credit card which was not needed earlier. This critical user information has now fallen in the hands of cyber criminals (cracker and not hackers) who hijacked Adobe leaving behind 2.9 million affected customers.

Comment 1912 Diablo Canyon knocked offline, jellyfish like (Score 1) 123

A horde of jellyfish-like animals has forced the shutdown of a nuclear power plant in California.
The gelatinous creatures, 2 to 3 inches long, are called sea salp.
http://www.sanluisobispo.com/2012/04/24/2041453/diablo-canyon-nuclear-reactor.html

Sea salp can reproduce sexually and asexually, and "you can have millions in a couple of days," e
http://www.newser.com/story/144935/jellyfish-like-creatures-shut-down-nuclear-plant.html

Actually jelly fish took down a California reactor many years ago but 1912 (the above links) is all the shows.

Comment Re:Just like anything there garbage and there's go (Score 1) 168

I had a friend who managed the network for Bechtel, set my BBS up to pull in usenet that many said it wasn't possible; my setup was his proof.

What year? Didn't many BBSes do this with (non-UNIX) implementations of the UUCP protocol? I also thought some FidoNET systems had gateways to Usenet (I saw a brief mention on the wikipedia article but not sure how long back that went).

There were always gateways but at 10 a minute it was spendy, newsgroups weren't a priority for me
I was a chat board (8 lines). I did use PC prusuit for my personal files http://www.bbsdocumentary.com/library/CONCEPTS/SERVICES/PCPURSUIT/

I ran an AmigA 3000, Cnet software and was part of the FidoNet. Cnet was getting ready for the Internet; we had a cookie file
which was a text file of his wife's recipe for chocolate chip cookies, but a cookie file was required so he added one.
FidoNet does connect to the Usenet, but just as another group. From the Usenet you can read FidoNet, but not the other way around

I can't tell you how it was done as my friend set it up (UUCP protocol and all the supporting files for the Amiga and Cnet) which was easy for him.
His system was a Sparc workstation, we were worlds apart in computer systems

I pulled my messages from him who was pulling them from across the state. I'd pay him a bit for my feed (a couple Amiga text groups)
but his largest group was for the NeXTstation, so most likely around 1990-91.

Comment Re:Wow! What a vulnerability!! (Score 1) 77

Secondly, none of that has exactly dick to do with what's being discussed -- which is the use of motion sensors to capture vibration, which is then via a complex software application, recreates the keystrokes entered from a nearby keyboard.

Yep - I read the summery, replied to your reply, then read the article and thought damn ----------- missed it by that much.

Submission + - Saudi Cleric Pummeled On Twitter For Claiming Driving Damages Women's Ovaries (cnn.com) 2

An anonymous reader writes: CNN reports, "...Sheikh Saleh Al-Loheidan's widely derided remarks have gone viral ... "If a woman drives a car," Al-Loheidan told Saudi news website sabq.org ... "it could have a negative physiological impact ... it would automatically affect a woman's ovaries and that it pushes the pelvis upward." ... "We find that for women who continuously drive cars, their children are born with varying degrees of clinical problems." The controversial comments ... were widely interpreted throughout Saudi Arabia as an attempt to discourage women in the country from joining a popular online movement urging them to stage a demonstration by driving cars on October 26. "This is his answer to the campaign," Saudi women's rights activist Aziza Yousef told CNN. ... "He's making a fool of himself. He shouldn't touch this field at all ..." ... Al-Loheidan's words have been ridiculed mercilessly via social media ... An Arabic Twitter hashtag called "#WomensDrivingAffectsOvariesAndPelvises" was quickly created to make fun of Al-Loheidan — underscoring just how widely the call for Saudi women to defy the driving ban has resonated thus far. And while numerous conservative voices have supported Al-Loheidan, many Saudis believe this was an extremely clumsy way of trying to counter the popularity of the October 26 campaign."

Comment Re:Wow! What a vulnerability!! (Score 1) 77

First you need to download and install a neural network program in your smartphone, train it with loads and loads of data.

You know, the same smartass attitude was held by our government officials regarding the "hollywood" possibility of hackers gaining control over power grids, missile launch systems, water distribution systems, etc. And then Stuxnet showed up,

Not the same, Stuxnet and even .bat files are run by default on a MicroSoft OS. To this day I have to disable auto-run, the largest
most over looked backdoor into a system.
Auto-run being on by default is most likely because people would be inconvenienced or not having a clue what to do next.

This is a proof of concept; It demonstrates that such an attack is now possible.

Proof of concept of something I've known since the early 90's that a computer system gives off electromagnetic energy
and you can read that energy through a wall (apartment). They just made it smaller and moved it closer.

Comment Just like anything there garbage and there's gold (Score 2) 168

I had a friend who managed the network for Bechtel, set my BBS up to pull in usenet
that many said it wasn't possible; my setup was his proof. He ended up going to The University
of Colorado to study telecommunication; talking about getting in at the ground floor.

The local book store had a book "The Internet "Complete Reference"" 1994 by Osborne.
http://www.goodreads.com/book/show/2868340-the-internet-complete-reference
He kept pushed the book on me saying if I wanted to know about the Internet read that book, so I bought it.

It's 817 pages "The World Wide Web, shortened to the Web" takes up pages 495 to 512 (17) intro:
"Is an ambitious project whose goal is to offer simple, consistent interface to the vast resources of the Internet".

It covers everything at that time. Just like anything there garbage and there's gold, this Osborne book it top notch.
Such a keeper that obviously I have it in front of me for this post.

Submission + - Central New York nuclear plants struggle to avoid financial meltdown (syracuse.com) 2

mdsolar writes: As recently as four years ago, nuclear power companies were planning to spend billions of dollars to build a new reactor in Oswego County, alongside three existing nuclear plants.

Then the bottom fell out. Natural gas-burning power plants that benefit from a glut of cheap gas produced by hydrofracking cut wholesale electricity prices in half.

Now the outlook for nuclear power plants is so bleak that Wall Street analysts say one or more Upstate nuclear plants could go out of business if conditions don't change.

Two Upstate nukes in particular — the James A. FitzPatrick Nuclear Power Plant in Oswego County and the R.E. Ginna Nuclear Power Plant in nearby Wayne County — are high on the watch list of plants that industry experts say are at risk of closing for economic reasons.

Comment Re:Also it stands to reason (Score 1) 303

Strangely enough, nobody seems to be calling attention to the fact that this slideshow confirms TrueCrypt has been backdoored (second slide, page 15). Is it possible to get a degree in applied mathematics without meeting the NSA's recruiting arm?

I didn't read it as there being a backdoor for TrueCrypt -but one being available, and there is if you don't use it correctly.

I started using TrueCrypt and back doored it myself without knowing.

I encrypted one data partition to test it out; but if the OS partition isn't encrypted your not hiding anything,
especially Windows where everything you do is listed in multiple places. Thats just one of many precautions.

I found this after I dug a bit deeper into TrueCrypt (Read TFM). IMPORTANT: If you want to use TrueCrypt, you must follow the
security requirements and security precautions listed in this chapter. http://www.truecrypt.org/docs/security-requirements-and-precautions

The TrueCrypt FAQ http://www.truecrypt.org/faq links to Operation Satyagraha

http://yro.slashdot.org/story/10/06/26/1825204/fbi-failed-to-break-encryption-of-hard-drives
"the FBI has failed to decrypt files of a Brazilian banker accused of financial crimes by Brazilian law enforcement,
after a year of attempts" "Truecrypt and the other unnamed. 256-bit AES was used"

http://en.wikipedia.org/wiki/TrueCrypt#Operation_Satyagraha claims "They enlisted the help of the FBI, who used dictionary attacks"
-real high tech stuff.

Comment Re:Google announced this (Score 5, Informative) 233

Back in May, Google announced that they would be making changes to their SSL/TLS certificates in the coming months: http://googleonlinesecurity.blogspot.com/2013/05/changes-to-our-ssl-certificates.html

Oh No's!
"Even in less-than-obvious places to look for information, such as Google's Online Security Blog, are silent."

To a non-story
"Back in May, Google announced..."

Thanks for that.

Slashdot Top Deals

The one day you'd sell your soul for something, souls are a glut.

Working...