Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment log in with telephone number and password... (Score 4, Interesting) 88

hmmm... is this the password that by default if you've never set it is set to the 1st 4 digits of your Social Security Number, like it is for Bell South? and how many retries are you allowed on the login? it's not 9,999 is it? and what are the first 3 digits of a SSN? why that'll be the area you were born, which probably closely match with the area code of the telephone number. that just leaves 2 digits left to guess...

Comment origins of linux (Score 2, Funny) 407

there's a story i heard about the origins of linux, which was told to me a few years ago at a ukuug conference by a self-employed journalist called richard. he was present at a meeting in a secure facility where the effects of "The Unix Wars" were being exploited by Microsoft to good effect. the people at the meeting could clearly see the writing on the wall - that the apx-$10,000s cost of Unixen vs the appx-$100s of windows would be seriously, seriously hard to combat from a security perspective. their primary concern was that the [expensive] Unixen at least came with source: microsoft was utterly proprietary, uncontrolled, out of control, yet would obviously be extremely hard to justify *not* being deployed in sensitive government departments based on cost alone. ... so the decision was made to *engineer* a free version of Unix. one of the people at the meeting was tasked with finding a suitable PhD student to "groom" and encourage. he found linux torvalds: the rest is history.

now we have SE/Linux - designed and maintained primarily by the NSA.

the bottom line is that the chances of this speculation being true - that the NSA has placed back-doors in GNU/Linux or its compiler toolchain - are extremely remote. you have to bear in mind that the NSA is indirectly responsible for securing its nation's infrastructure. adding in backdoors would be extremely foolish.

Comment Re:Nice Idea (Score 1) 121

the problem with the proposal that you've created is that if the phone is hacked then any number of one-off closed accounts can be created and transferred from your "actual bank account". what this tells us is that the actual problem is the concept of trying to use a general-purpose processor which is capable of running unverifiably-complex general-purpose software as a method of payment. it.... just.... doesn't.... add... up.

Comment what's the next article? (Score 1) 121

what's the very next article right here on slashdot? an article about how the inventor of PGP cannot properly implement ZRTP, a security application for smart phones. clinkle - starting from scratch - on a payment system for smart phones, making it a high-profile target. this is going to end well.

Comment awesome (Score 2) 336

the PDP-11 is awesome. i believe its instruction set was the inspiration for the 6800 (http://en.wikipedia.org/wiki/Motorola_6800#MC6800_microprocessor_design yes it was) which then resulted in the 68000 all the way up to the 68040, processors which both commodore and amiga used to great effect up until the early 90's. at imperial college we didn't write a compiler for 68000 or even x86, we wrote a compiler for the PDP-11 instruction set.

the other thing is: if they're still running PDP-11's in large geometries (.35 micron or even bigger) then chances are it'll be much more robust and less prone to random radiation hits/changes. the kind of thing you really really REALLY want to be still working and under computer control is the "emergency shutdown" procedures in the event of a radiation leak. the LAST thing you want is one of the bits changing a floodgate to "open" instead of "shut" due to a random gamma ray flipping a bit somewhere.

Comment gittorrent (Score 1) 165

it depends on what you're concerned about. if you're concerned about server presence in general because you're developing software that you absolutely do not want the NSA to be able to either track or take down, then you don't want a server - at all. that's when you should consider funding gittorrent, which is a TRULY peer-to-peer distributed git system. git is "considered" to be "peer-to-peer" because it is possible to *manually* distribute the git repository. each git repository - a peer - is completely free and independent of every other git repository - a peer - and it is possible to use HTTP, SSH and even email or carrier pigeon to transfer commits between one of those "peers" and another "peer". what is missing - what the concept of gittorrent brings to the table - is the means to AUTOMATICALLY transfer commits between previously UNKNOWN (i.e. DHT-discoverable) peers in an effectively unkillable, decentralised and secureable fashion.

if on the other hand you merely want a place to push and pull from then there are plenty of options, but the one that i've found to be absolutely superb is gitolite. from a management perspective the fact that you can control read/write access on not only a per-repository basis but also a per-branch basis is something that's amazingly useful, but it also simplifies both user and management usage because there is only one user: gitolite. the trick is in the use of ssh commands and the creation of a special authorized_keys file (which is created and managed via a git commit hook). as a result, there is no need to create multiple POSIX users: just one [gitolite], and the users only need one git clone username: gitolite. if you need a web interface you can always point gitweb at it.

Comment Commodore Pet 3032 (Score 1) 623

yep - started with a commodore pet 3032 at school, aged i think it was 8. very unusual that a school actually had a computer. i watched someone type in a program:

10 FOR I = 1 to 40
20 PRINT TAB(I), I
30 NEXT I
40 GOTO 10

and the number scrolled 123455bababababa in a diagonal line, and i went, "ah that's obvious".

from there, i went on to work out how to read the keyboard (GET), we typed in a "would you like a cup of tea?" program (if N goto 10) which explained all about how you needed to make tea. from there i began to write games after someone else brought in an Apple IIe (as a personal computer!) and it had "castle vulfenstein" where you shot german soldiers all very politically correct.

the games i wrote were much simpler (40x25 screen, go figure) and usually involved drawing and moving of dots as "bullets", which could be stopped by on-screen ASCII characters if you were lucky. we set up 3 sets of keys so that 3 of us could play (wasx and z for fire, tghb and okl,) and soon discovered something called "keyboard matrix scanning limitations" whereby one player could hold down keys that cause the other players' controls to be non-functional.

by age 11 we'd moved to skelmersdale, where several neighbours had weird machines like superbrains, jupiter aces, tangerines and one guy even had a Z80 that he clocked by hand with LEDs on the outputs just to see what it did. he actually took notes when i explained what i'd been doing with keyboard input (interactive no less!) and things like screens.

after wrecking my eyes borrowing a neighbour's ZX80 with a ZX81 ROM upgrade, and playing chess in 1k of RAM (unbelievable) and typing in 1-line BASIC programs that would scroll binary across the screen, my parents bought me a ZX Spectrum (and a thermal printer, wow!). and a 16k RAM pack eventually. after several months of typing in games and programs, and playing jet-pac and lemmings, i actually bought my first computer software: a BASIC compiler. it could do 26 variables (A to Z) as integers, no floats, and no strings. cost me 30 quid.

by school aged 13 to 18 i'd moved to BBC Micros - the school had 6 of them, all connected via Econet. memorable times there included writing a program which sent notes to each computer on the network so that tunes with more than 3 notes could be played across all 6 computers; writing networked games and creating something similar to "Risk" which was stolen by one of the kids, hidden under carpet where feet destroyed the 5.25in floppies irretrievably. the lab also had one of those digital programming interfaces, with GPIO, ADCs and DACs, which i used on a BEEB to do strange experiments out-of-hours.

so, naturally, when it came to a choice of university and a choice of degree, perhaps unsurprisingly i picked Theory of Computing at Imperial College. there we had a Gould Terminal system that could connect and route over 2,000 VT100 terminals to a configureable array of servers (micro-vaxes, SunOS 4.1.3 and so on). that started to get interesting, especially when someone did "cat /bin/csh | lpr" by mistake. if you're familiar with line printers, you'll now how bloody fast they are and how much of a racket they make. "cat /bin/csh | lpr" churns out 600 pages *real* fast.

all good fun...

Comment "Assault by Lawyer" (Score 1) 192

it's more than that: it's actually a criminal offense, known in the U.S. as "Assault by Lawyer". if you repeatedly sue someone, for example, such that they are made bankrupt by the legal fees of doing nothing more than defending themselves, it's actually a criminal offense. could someone please get word to this guy's legal team about this please?

Submission + - Amazon causes much concern for Goodreads users after acquisition (goodreads.com)

pinkushun writes: Goodreads announced at the end of March Amazon's acquisition of the social network for book lovers and reviewer. This raised major concern with Goodreads users, as is evident by the 50-page comments of the announcement thread, which is still going. From first post the users are worried about ownership of their comments, particularly in the way Amazon deleted user reviews, and how authors can't review other books within the same genre. As user Chris commented:

"After all the hours put in by librarians and staff to cut the database sourcing with Amazon, now they'll own it again? Does that mean that all our work will go away and then Amazon info will be downloaded back to GR?"

Goodreads addressed these concerns in this FAQ which leaves you unsatisfied.

Submission + - QiMod / Rhombus Tech A10 EOMA-68 CPU Card running Debian 7 (armhf) (rhombus-tech.net)

lkcl writes: With much appreciated community assistance, the first EOMA-68 CPU Card in the series, based on an Allwinner A10 processor, is now running Debian 7 (armhf variant). Two demo videos have been made. Included in the two demos: fvwm2, midori web browser, a patched version of VLC running full-screen 1080p, HDMI output, powering and booting from Micro-HDMI, and connecting to a 4-port USB Hub. Also shown is the 1st revision PCB for the upcoming KDE Flying Squirrel 7in tablet.

The next phase is to get the next iteration of test / engineering samples out to interested free software developers, as well as large clients, which puts the goal of having Free Software Engineers involved with the development of mass-volume products within reach.

Comment mother theresa (Score 1) 273

my brother worked for mother theresa's hospice in india, 25 years ago. it wasn't what you'd think. they had a number of people come in from different outside organisations who tried to order people around: this being india they of course didn't listen, because why should they listen to foreigners?

so my brother stayed there and worked with them for six months before advising them to build a brick out-house for effluent, to change the sheets on the beds when somebody died, and to wash the needles in between injecting one patient and the next.

it also didn't help that as mother theresa got older, she began to lose her memory and would wander off, go to sleep, taking the key to the medicine cupboard with her so that nobody could get access to it for an entire day.

ghandi on the other hand is a far better choice for discussion, here. i love the story where he was asked by a mother to tell her son to stop eating sweets: he told her to come back in 2 weeks. when they came back, he said, "stop eating sweets!" and the son went "yes yes mr ghandi!!". the mother, perplexed, asked "why didn't you do that 2 weeks ago??" and he said "because i had to first give up sweets myself".

now *that's* inspiring, and it tells you something that we can learn from this fuss over 3D printing. there's no point asking "what would ghandi do with a 3D printer" because it's the principles that ghandi applied in his life *whenever he met someone* that are the key. it's never about the technology: it's about the people and what they face.

the point is: asking this question is silly. what you need is just to have the 3D printer, and go wander around the world, meeting people. you'll soon find problems that can be solved with it.

Comment how to get rid of NFC on a passport or credit card (Score 1) 193

there are two ways. my favourite is the first.

1) put passport / credit card on a plate
2) put small amount of water on top of NFC chip
3) put plate into microwave oven
4) set for 3 seconds on HIGH
5) press button and watch pretty sparks
6) open door VERY QUICKLY and put out anything that's smoking or on fire
7) smile and relax, knowing that you are secure from being phished.

the other way is perhaps less risky:

1) obtain a 50,000 volt electrocution device aka "stun gun"....

Slashdot Top Deals

"If I do not want others to quote me, I do not speak." -- Phil Wayne

Working...