Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 74 declined, 41 accepted (115 total, 35.65% accepted)

×

Submission + - Public libraries tinker with offering makerspaces (medium.com)

eggboard writes: Public libraries are starting to build temporary and permanent labs that let patrons experiment with new arts, crafts, and sciences, many of them associated with the maker movement. It's a way to bring this technology and training to those without the money or time to join makerspaces or buy gear themselves. It seems to extend the mission of libraries to educate, inform, and enrich, but is a seemingly rare move in the direction of teaching people to create for pleasure and professionally. Many libraries are experimenting with experimenting.

Submission + - Fixing broken links with the Internet Archive (medium.com)

eggboard writes: The Internet Archive has copies of Web pages corresponding to 378 billion URLs. It's working on several efforts, some of them quite recent, to help deter or assist with link rot, when links go bad. Through an API for developers, WordPress integration, a Chrome plug-in, and a JavaScript lookup, the Archive hopes to help people find at least the most recent copy of a missing or deleted page. More ambitiously, they instantly cache any link added to Wikipedia, and want to become integrated into browsers as a fallback rather than showing a 404 page.

Submission + - Rebutting Andreessen's Bitcoin Dreams (medium.com)

eggboard writes: Marc Andreessen wrote an essay in the New York Times that appeared today, in which he tried to make the case for Bitcoin going mainstream for payments, if not as a currency. After comparing Bitcoin to the rise of personal computers and the Internet, he tries to explain how it eliminates fraud and will solve global money transfers and the plight of the unbanked. I wrote a critique of these and other points in his essay:

Bitcoin doesn’t eliminate fraudulent transactions; it only eliminates counterfeit payments. This can, of course, save many tens or hundreds of billions of dollars a year globally and translate to more efficiency in commerce. But removing the intermediary also removes recourse outside of courts, and the cost and nature of that can’t be determined.

Submission + - Paging Dr. MacGyver: maker movement comes to medical gear (medium.com)

eggboard writes: The tools to make crafts, electronics prototypes, and cool stuff have started rapidly to turn to medical gear, especially in developing nations. The early results are quite marvelous, but there are a ton of concerns, too. The pace of change is incredibly fast:

[Many people] without any without any formal medical training—can take advantage of access to global supply chains, cutting-edge medical knowledge, and recent leaps in design and fabrication technology that have made the prototyping process faster, cheaper, and simpler than ever before. Even as concerns about safety and liability are only starting to be addressed, medical inventors and other technical tinkerers are already improving and saving lives—sometimes their own.


Submission + - Penny Arcade offers offensive, low-paying IT job with great benefits (medium.com)

eggboard writes: Penny Arcade wants to hire one IT person to do four jobs, and is looking for someone with a terrible work/life balance to be paid poorly because the company isn't money-focused. This isn't unusual for an IT job, of course, especially at a small company. But Penny Arcade rakes in millions from its webcomics, PAX conventions, games, and more, and says the job's benefits will outweigh the low salary. But did they mention you need to be able to work in an "offensive environment"? Yes, they did. Sounds perfect for the right person.

Submission + - NY Times Biffs Conference Wi-FAIL Story (wifinetnews.com)

eggboard writes: The New York Times ran a strange story that tried to explain why Wi-Fi fails when thousands of people gathered a tech event try to use a network set up by organizers. The story says Wi-Fi wasn't designed for that kind of use. I disagree, and explain why at length. The 1999 IEEE 802.11b spec might not have been designed for it, but 802.11g could handle mass numbers, and 802.11n is designed to deal with interference and large user bases.
Networking

Submission + - iPhone 4 May Have Wi-Fi Driver Fault (arstechnica.com) 1

eggboard writes: After examining the WWDC video and talking to two veteran Wi-Fi experts, it seems likely that the iPhone 4 has a Wi-Fi driver flaw that was part of the trouble in making a network connection during Steve Job's WWDC keynote. The other problem was the massive congestion caused by so many independent access points. (Congestion may have triggered the iPhone 4's troubles, too.) With mobile hotspots proliferating on phones and in portable devices like the MiFi, we're going to see more trouble in the future.
Networking

Submission + - Another Limited but Wi-Fi Exploit (wifinetnews.com)

eggboard writes: Martin Beck, who in 2008 co-wrote a paper describing a way to inject packets into a secured Wi-Fi system, is back with a more extensive exploit. His "Enhanced TKIP Michael Attacks" still doesn't allow extraction of a key, and is limited to TKIP (not AES-CCMP) WPA-protected networks. Still, he's figured out how to put in large payloads, and to extract data sent from an access point to a client--all without cracking the network key. The attack requires proximity to sniff and inject data, but it's another crack in the older key standard (TKIP) that no one with serious security interests should still use.
Wireless Networking

Submission + - Apple Slips in 450 Mbps Wi-Fi in Its Base Station (wifinetnews.com)

eggboard writes: Apple told a few reporters in briefings yesterday to look for significant changes in its two top-line base station models, which are noted in passing as "new" on the product pages: 50 percent throughput improvement and 25 percent distance bump. How did they do this? With Engadget's FCC tip about "3x3" models, I've determined that Apple now offers what seems to be the first mass-market 450 Mbps, three radio-chain Wi-Fi router. Virtually all other consumer routers max out at 300 Mbps.
Wireless Networking

Submission + - iPod Touch's 802.11n Chip for Networked Media Serv (tidbits.com)

eggboard writes: "iFixIt has discovered a Broadcom 802.11a/b/g/n chip in the latest iPod touch (32 GB and 64 GB) models that uses single-stream 802.11n. Single-stream doesn't get the full power of N, but boosts speed enough that--along with space-time block encoding, a feature coming soon to Wi-Fi access points with two or more radios--the iPod touch could be an effective networked media server, for streaming and transfer, possibly through the new iTunes Home Sharing feature."
Wireless Networking

Submission + - Latest Hype on Broken WPA Is Incorrect (wifinetnews.com)

Glenn Fleishman writes: "The hullabaloo about "WPA cracked in sixty seconds" that Slashdot linked to and that's all over the Internet is entirely incorrect, and it's not what the Japanese academics claim in the paper to which everyone links. The researchers found a way, using a physical man-in-the-middle relay, to speed up last year's exploit in the TKIP key method (in WPA and WPA2) that allows a falsified packet to be sent to a client when the packet is short and contains mostly known information. ARP packets are the example. The Japanese paper is very clever, and it reduces the time to break a key 37 percent of the time to one minute, but it requires a very specific physical insertion, and it doesn't provide key recovery of the TKIP key material. It only recovers a single per-packet key used in the MIC packet integrity checksum. The recommendation to move to AES-CCMP, available only in WPA2, is a good one. But TKIP is simply not broken, nor is "WPA" broken."
Security

Submission + - Advice on When Your Laptop Is Stolen (and Before) (tidbits.com)

Glenn Fleishman writes: "David Blatner shares his unfortunately hard-won advice about what he did when his laptop was stolen without any remote recovery software installed. He had backups, a month out of date, but also had CrashPlan running, which allowed him to recover most of his missing files. The computer was never returned, but he learned quite a lot about what he could do next time. (The police did knock on the door of the last-used IP address obtained via CrashPlan, but an open Wi-Fi access point was running there, eluding pinpointing the villains.)"
Books

Submission + - Amazon Releases Kindle for iPhone Software (tidbits.com)

Glenn Fleishman writes: "Amazon has released free Kindle software for the iPhone, which provides access to the Kindle catalog of books, and any books a Kindle owner might have already purchased. The simple software has good legibility, and automatically synchronizes the currently latest-read page among any devices synchronized with the owner's Amazon.com account. It's quite simple and nifty, and suddenly makes a huge quantity of contemporary fiction and non-fiction available to read on an iPhone. It must mean Apple has no similar plans on the content side, or they wouldn't have allowed Amazon to publish this application."
Security

Submission + - The real story on WPA's flaw (arstechnica.com)

Glenn Fleishman writes: "The reports earlier today on WPA's TKIP key type being cracked were incorrect. I spoke at length with Erik Tews, the joint author of the paper that discloses a checksum weakness in TKIP that allows individual short packets to be decrypted without revealing the TKIP key. I wrote this up for Ars Technica with quite a bit of background on WEP and WPA. Tews's paper, co-written with Martin Beck, who he gives credit to as discovering and implementing (in aircrack-ng as a module) a working crack, describes a way to use a backwards-compatible part of TKIP to exploit a weakness that remains from WEP. ARP packets and similarly short packets can be decoded. Longer packets are likely still safe, and TKIP hasn't been cracked. Don't believe the hype, but the exploit is still notable."
Security

Submission + - Apple's DNS clients still flawed after exploit fix (tidbits.com)

Glenn Fleishman writes: "Despite Apple releasing its security update yesterday that includes a fix for the underlying flaw in DNS resulting from insufficient port randomization, the SANS Institute notes in their blog that at least 10.5.4 Leopard client software continues to use sequential UDP ports, making them susceptible to DNS poisoning. While servers are most vulnerable, because a poisoned server cache affects hundreds to millions of clients, Dan Kaminsky's disclosure so far makes it clear that clients are equally vulnerable, just much higher-hanging fruit. With servers patched, attackers would likely see if they could mass target clients with popular Web sites, like Google and banking and ecommerce sites. I've written up the full explanation along with instructions on testing in a Mac, Unix, or Linux environment whether your DNS client is vulnerable."

Slashdot Top Deals

E = MC ** 2 +- 3db

Working...