Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Somewhat impressive (Score 5, Interesting) 160

A friend of mine (who's 15) and myself (I'm 28 with a CS degree) have a nearly working programmable 8-bit computer in Minecraft. ALU is done, all 256 bytes of memory are done, the instruction tape (made out of sand and glass, much like a punchcard) is done, etc. Another 20 someodd hours and we'll have all of the components connected together and the whole CPU completely done. It actually isn't as hard or take as much time as it may sound.

The most impressive thing about this video is that he did all of the math in BCD rather than just running it on a CPU. I already have multiplication (Booth's algorithm) and other operations programmed on our instruction set (we wrote an assembler and emulator outside of Minecraft to work out the kinks). I'd rather do the complex operations in software rather than laying gates and logic in the hardware.

I don't see how he has enough room for displays of that size. You'd need NxM worth of latches to sustain the pistons that drive the pixels as well as the appropriate muxers to select which pixels are turned on. Our 256 byte memory array is bigger than his entire calculator so I'm a bit skeptical that he isn't using some addons.

Comment Re:Obligatory checklist (Score 2) 173

( ) You read the paper
(X) You did not read the paper

The paper specifically covers merchant relationships with acquiring banks and credit processing. Purchases were done to track the credit processing. It isn't possible to anonymously spoof that. Also, stopping the transactions is more legislative than market-based.

Comment Re:It's the business model, stupid (Score 4, Informative) 173

Yes it is the business model of these banks. However, they are processing through a credit network (Visa / Mastercard) and consumers credit cards are backed by an issuing bank (think Chase, Citibank, etc). Either the credit network or the issuing bank can prevent the transaction without the cooperation of the shady acquiring bank. In fact, there is a "Merchant Category Code" (food, entertainment, drug stores and pharmacies, etc) that the credit network requires be on each transaction and requires to be correct. The credit network or issuing banks don't have to stop all credit transactions to the offending acquiring banks, they can just stop drug stores and pharmacies transactions. You should read the paper.

Comment Good riddance (Score 1) 315

Am I the only person who actually WANTS these companies to go out of business? I don't want my mother to be able to get the news via paper because it allows her to continue to ignore technology. If I could snap my fingers, new papers, record labels, the POTs phone companies, etc would go out of business. Bring on the technological Darwinism (and give it a push in the right direction if you can).
Australia

Fine-Structure Constant Maybe Not So Constant 105

Kilrah_il writes "The fine-structure constant, a coupling constant characterizing the strength of the electromagnetic interaction, has been measured lately by scientists from the University of New South Wales in Sydney, Australia and has been found to change slightly in light sent from quasars in galaxies as far back as 12 billion years ago. Although the results look promising, caution is advised: 'This would be sensational if it were real, but I'm still not completely convinced that it's not simply systematic errors' in the data, comments cosmologist Max Tegmark of MIT. Craig Hogan of the University of Chicago and the Fermi National Accelerator Laboratory in Batavia, Ill., acknowledges that 'it's a competent team and a thorough analysis.' But because the work has such profound implications for physics and requires such a high level of precision measurements, 'it needs more proof before we'll believe it.'"
Moon

Decades-Old Soviet Reflector Spotted On the Moon 147

cremeglace writes "No one had seen a laser reflector that Soviet scientists had left on the moon almost 40 years ago, despite years of searching. Turns out searchers had been looking kilometers in the wrong direction. On 22 April, a team of physicists finally saw an incredibly faint flash from the reflector, which was ferried across the lunar surface by the Lunokhod 1 rover. The find comes thanks to NASA's Lunar Reconnaissance Orbiter, which last month imaged a large area where the rover was reported to have been left. Then the researchers, led by Tom Murphy of the University of California, San Diego, could search one football-field-size area at a time until they got a reflection."
Security

Submission + - Help Nmap by filling out the SecTools.org survey! (nmap.org)

An anonymous reader writes: Help Nmap and the security world in general by filling out the 2010 SecTools.org survey! Results from this survey help the security community discover new tools, improve old ones, and gives everyone a chance to have their say. Besides being a great venue to learn about lesser known tools, this survey has lead to many of the advanced Nmap features including the Nmap Scripting Engine (which currently has well over 100 user-contributed scripts), Ndiff for comparing scans, the Zenmap interface, and, my personal favourite, despite a lack of votes, a script to check the availability of California vanity plates. With the Summer of Code projects coming up fast, this is your chance to shape Nmap's future!
Security

Submission + - Detecting critical Apple vulnerability with Nmap (cqure.net) 1

iago-vL writes: Patrik Karlsson, an Nmap developer, released a script today to detect a vulnerability in the Apple Filing Protocol (afp), CVS-2010-0533. This vulnerability is trivial to exploit and allows users to view files outside of public shares. He describes this vulnerability, which he discovered inadvertently while working on the Nmap Scripting Engine (NSE), as "strikingly similar to the famous Windows SMB filesharing vulnerability from 1995." Instructions on how to detect vulnerable systems using Nmap can be found in the post linked above.
Networking

Nmap 5.20 Released 36

ruphus13 writes "Nmap has a new release out, and it's a major one. It includes a GUI front-end called Zenmap, and, according to the post, 'Network admins will no doubt be excited to learn that Nmap is now ready to identify Snow Leopard systems, Android Linux smartphones, and Chumbies, among other OSes that Nmap can now identify. This release also brings an additional 31 Nmap Scripting Engine scripts, bringing the total collection up to 80 pre-written scripts for Nmap. The scripts include X11 access checks to see if X.org on a system allows remote access, a script to retrieve and print an SSL certificate, and a script designed to see whether a host is serving malware. Nmap also comes with netcat and Ndiff. Source code and binaries are available from the Nmap site, including RPMs for x86 and x86_64 systems, and binaries for Windows and Mac OS X. '"

Comment Re:Modify the phase variance (Score 2, Insightful) 332

My fault. I searched the article for "phase" and decided it didn't have the information. Instead of phase, the article said:

...This, in effect, synchronizes power flows.

Sad that the media thinks the average American doesn't know what the term phase means. Even sadder is that they are probably right.

Comment Re:ncat (Score 1) 73

Yeah, even GNU NetCat isn't really a standard replacement. Ncat isn't likely to become one either. It's another tool, it has great features, if it's useful for you use it. I'd say Ncat's primary competitor is probably socat or cryptcat rather than vanilla nc.

Slashdot Top Deals

Get hold of portable property. -- Charles Dickens, "Great Expectations"

Working...