Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:It's dead either way, why not try this? (Score 1) 371

The sad part about it is this - the Technician class license material is not at all difficult to learn.

I passed the Technician, General, and Advanced in one session, with an evening's study. There was more arbitrary material (frequencies and the old names for satellite modes) in Extra so I had to come back for that. And it took 90 days to get to where I could do 13 WPM reliably and pass the 20 WPM test by only writing down material after "is", but nobody has to do that any more.

Comment Re:packet radio? (Score 1) 371

We had a 5.29 repeater in the SF Bay area that took years to pull, but got pulled. It turned out the control operator had moved away! He said he'd left the repeater in someone else's care, but if that person existed they did not police the repeater.

If you care about this, start writing letters to FCC. They really do enforcement if pushed, the letter file is here.

Submission + - Want NSA Attention? Use Encrypted Communications (informationweek.com) 1

CowboyRobot writes: Bad news for fans of anonymizing Tor networks, PGP and other encryption services: If you're attempting to avoid the National Security Agency's digital dragnet, you may be making yourself a target, as well as legally allowing the agency to retain your communications indefinitely — and even use them to test the latest code-breaking tools. Those revelations come via leaked documents that detail the operating guidelines for secret NSA surveillance programs authorized by Congress in 2008. Those documents include a one-page memorandum from a U.S. Foreign Intelligence Surveillance Court (FISA) judge, saying that the guidelines don't violate Fourth Amendment protections against unreasonable searches.

Submission + - 51% of IT Pros Admit That Their Companies Are Being Pwned (carbonblack.com)

rmurph04 writes: According to identity management firm Cyber-Ark's Global Advanced Threat survey, 51 percent of business executives and IT professionals believe a cyber attacker is currently on their network or has been on their network during the last year. Another key finding from the report was that 80 percent of respondents believe cyber attacks are a greater threat to their countries than a physical attack.

Comment Re:packet radio? (Score 1) 371

It might make sense if governed properly, but the filer didn't propose any means of governance and didn't even know about HSMM-MESH when he wrote his proposal. He's a winlink node owner and his intent was to use GNUPG to encode text messages, and did not consider the abuses that could happen with TCP/IP. So, I am spending the whole day to write an FCC comment and hopefully fix this.

Comment Re:packet radio? (Score 1) 371

They get surplus business band radios, mostly. One reason is that the Federal Government has required several frequency, bandwidth, and mode changes of municipal radio users, so almost-new radios that were too wide or didn't run APCO-25 became available at low prices.

For the most part, commercial radios are really overpriced. It is not unusual for a police car transceiver to come in at $5000. FCC certified GMRS radios seem rather overpriced for their performance. There are cheap chinese radios for land-mobile which are not certified for GMRS, these are really just broad-banded ham radios.

Comment Re:packet radio? (Score 1) 371

Actually, it would be a simple matter to gateway https back to http. And since the rule prohibits encryption for the purpose of obscuring information, authentication through encryption is OK. Your password need not be transmitted in the clear. Just don't obscure the message traffic.

In general, though, the web doesn't belong on ham radio just because it's private use. There are lots of other services for private communications. There is also of course the fact that advertising isn't allowed on ham radio, because the rules prohibit commercial use.

Submission + - Citrix XenServer open sourced (paritynews.com)

hypnosec writes: Citrix has released XenServer 6.2 and with that has open sourced its product and made it available through a new website – XenServer.org. XenServer, which has been a mixture of proprietary tools from Citrix and open source components, comprises of Xen hypervisor running on a modified version of the CentOS Linux alongside specialized user tools. Citrix describes its latest move as a step to fend off the "confusion created amongst developers and users" of the product.

Slashdot Top Deals

For God's sake, stop researching for a while and begin to think!

Working...