Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment iCloud Cost / Gb (Score 0) 332

Apple needs to change their pricing model for the iCloud to really take off. Why would I sync my 64 Gb iPhone, my 64 Gb iPad, & my Mac and Windows machine to the cloud when this would cost me so much that it is cost prohibitive. Current pricing is $100 / year for 50 Gb so it would take a MINIMUM of $300 / year to backup my iPhone and iPad not to mention my Mac and iTunes Library. Why would I pay that when for $100 (or less) I can get a local hard drive and just backup to my Mac/PC? Yes, there is the convenience factor, but not for that cost. They need to make it an order of magnitude bigger for the same price before I will be interested.

Comment Every support request/answer in writing / email (Score 1) 290

Make sure you answer all support requests via email CCing your new boss (and possibly his) so everyone knows how much time you are spending on the handover. Additionally, it also allows you to track duplicate and repeat questions and to just forward the old email, again including your new boss and possibly his. This is a STRONG encouragement for the new guy to truly take over and your support duties will diminish over time.

Comment Don't Violate the Agreement (Score 1) 582

Be aware you that are most probably bound by a usage agreement you signed when you entered university. If you violate this agreement, the University in question may a) suspend/expel you b) refuse to graduate you c) other retribution. Your choices are a) get another provider (3G/4G dongle) b) convince the university to change it's policy c) Live with it d) Leave the university (and presumably attend another with less draconian policies) e) start up your own company / provider to allow yourself and your fellow students access to unfiltered internet.

Note that his applies to work networks as well as more and more companies are locking things down tightly.

Comment Report them (Score 1) 298

I know that much of the world doesn't care but many of these attacks come from compromised servers. I scripted to automatically do a whois on the ip and construct an email to the abuse address with all pertinent log info included. this gets saved to a file and a report generated. I check the report once a month and run another script which sends the emails. I regularly get responses from companies like Amazon letting me know they are tracking them. usually it is a hosting service server and te client didn't lock down the machine, but i have had a few unnamed companies discover their own servers were compromised. you have to fight back people.

Comment Temperature measurements (Score 1) 810

If you are going to measure temperature, get many thermometers and place them in many places at the same time. Don't forget to put one outside as well. If you get a cold snap / temperature drop then you need to compare that to the outside temperature as it very well could be a breeze. Do the same for checking for sounds, and as stated before, get equipment that will "hear" outside the normal range of human hearing. Same for video equipment, get stuff that will "see" in infrared as well as the visible spectrum, many of the surveillance cameras will do this. As was stated before, remember that disproving ghosts is not possible so don't expect to convince anyone.

Comment Overwhelm the storage capacity... (Score 1) 286

Wouldn't it be relatively easy to diseminate a little program that ran in the background and just opened massive numbers of connections to random, or not so random, IP address constantly. If everyone did this, the volume of data collected would become such a burden to the ISPs that something would have to give. And then of course there are anonymizers outside your country of origin who are not bound by said laws.

Comment Re:Next please! (Score 1) 446

Yes, I upgrade my 3G to iOS4 and then rolled it back to 3.1.3 after about a week. Not difficult to do but meant I had to essentially reset the phone to factory defaults and return to a previous backup, not the most recent because that would include upgrading the phone to iOS4 again. Now that I am back on 3.1.3 I am going to stay there until I get a new phone... possibly the new X coming out as I am a bit tired of the lock in that apple has with the app store and also because I am tired of AT&T's poor network and restriction on Tethering.

Comment Re:How is this human to computer? (Score 1) 393

There is a perfect analogy in nature to this, it is called an asymptomatic carrier. Typhoid Mary is the classic case of this. The carrier is infected with a disease but are not themselves affected by it but they can pass it on to others. As to the "cross platform" nature of this example, A number of animal species can act as a vector of human disease. That said, this is a completely contrived example to show it is possible. Call it a Proof of Concept. I can see it being much more likely to happen in reverse, i.e. someone's implant gets infected by a computer virus. Therea are many people walking around today with computers implanted in their bodies performing very specialized tasks, pacemakers being the most common today. The latest models of these are designed to be accessible via wireless technologies to allow doctors to monitor and update them without having to perform surgery. There is a great deal of concern in the industry that these devices could be hacked (maliciously or otherwise) thus causing death.

Comment Spammers are spoofing Google Groups (Score 2, Interesting) 251

I manage a moderated google group and I have received spam "from the group" from someone who is not a member. This makes me think that they sent it directly to me and just spoofed the headers to make it appear to come from google to get past my local spam filter. I wonder if this is what is really happening?
Sci-Fi

Submission + - RIP: Barbara Bova dies - Ben Bova's Wife

farnsaw writes: Former Daily News columnist, Barbara Bova, dies from cancer.

Barbara Bova was the founder and president of a literary agency named after her. Barbara Bova was the wife of famed science fiction author Ben Bova, who also writes a weekly column for the Daily News.

Full story at: http://www.naplesnews.com/news/2009/sep/25/former-daily-news-columnist-dies-cancer/

Deepest Sympathies to Ben.

To honor Barbara, please send a donation to Avow Hospice..
Security

Vulnerability, Potential Exploit In Cisco WLAN APs 35

An anonymous reader writes "The AirMagnet Intrusion Research Team has uncovered a new wireless vulnerability and potential exploit associated with Cisco wireless LAN infrastructure. The vulnerability involves Cisco's Over-the-Air-Provisioning (OTAP) feature found in its wireless access points. The potential exploit, dubbed SkyJack by AirMagnet, creates a situation whereby control of a Cisco AP can be obtained, whether intentionally or unintentionally, to gain access to a customer's wireless LAN."

Slashdot Top Deals

And it should be the law: If you use the word `paradigm' without knowing what the dictionary says it means, you go to jail. No exceptions. -- David Jones

Working...