Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Hmmm (Score 3, Funny) 851

Cloak: faireware.com. High quality cloaks, hooded robes, etc. Kate's stuff stands up to all sorts of abuse.
Altar: You need a stone block, try your local masonry supply store.
Goat: Goats are pretty easy to get, some varieties are sold as pets. Finding a livestock dealer can be the hardest bit here.

For actually getting a phone to talk to a PC, it's generally not very hard. Root, flash custom ROM if needed to enable tethering, plug in USB cable. Some phones support "wifi hotspot" functionality, at which point you just turn it on, then connect your PC to the phone via wifi. Depending on carrier you may need to pay to tether, rooting may get around this but some carriers try to detect tetherers.

Comment Sometimes it saves money and frustration (Score 5, Interesting) 851

I had a choice: Buy a $200 bagpipe tuner (the cheap chromatic tuners are all equal tempered, and thus don't work for just-tempered instruments like the great highland bagpipe), and a ~$100 GPS and a $100 ipod and a $20 metronome... or buy one android phone, install gStrings, mobile metronome and PowerAmp (under $10 total) and get more total functionality for the same overall price. That's ignoring the phone aspect, obviously. And the camera. And the e-mail. And the text messaging with a full dvorak keyboard. And the mobile web browser...

Comment Re:No (Score 1) 405

I have an Android phone (Samsung Vibrant) and I both over and under clock it. SetCPU profiles underclock when battery gets low/temp gets high, overclock a bit when under load, and a lot when plugged in and under load.

Comment Re:Amazing time to be a physicist (Score 2) 164

Not just biological.
Take the top quark, discovered at Fermilab in 1995, 22 years after it was theorized. Why did it take so long? Because it's very massive, and thus very unstable. 172.9±1.5 GeV/c2 is enormous for an elementary particle, and takes a very powerful accelerator to create. That is, it takes a bunch of energy.
Energy is not free, even in a post-singularity civilization energy will have a cost. Energy used for a particle accelerator can't be used elsewhere. The LHC shuts down in the winter partly because the generating capacity of france/switzerland would not be enough to heat homes and run the LHC.
And there certainly seem to be fundamental limits on generating capacity. Those pesky laws of thermodynamics get in the way. Modern physics just takes lots of power, so until there's a surplus large enough to drive costs towards 0 it will stay expensive.

Comment The main goal of the NSA is to defeat this. (Score 1) 601

Consider the main goal of the NSA: To have access to all communications everywhere, and to analyze them for any threats to US power.
From their mission statement: "Collect (including through clandestine means), process, analyze, produce, and disseminate signals intelligence information and data for foreign intelligence and counterintelligence purposes to support national and departmental missions." "This Agency also enables Network Warfare operations to defeat terrorists and their organizations at home and abroad" (Emphasis mine.)
You assume that they do not have backdoors in any of the vulnerable components of your computer, that nowhere in the software, the OS, or the hardware of the processor did the best-funded security agency in the world succeed in creating a backdoor. You assume that this same agency can't break PGP/AES/whatever cipher you have. And you assume they're not interested enough in what you are sending to make their capabilities public by your arrest.
Only the last assumption is reasonable. To assume that not one Intel engineer is an NSA plant, that not one Microsoft programmer hid some code, that not a single implementation weakness or side-channel attack is present in your encryption app is a very big assumption. Far safer to assume the NSA/China/etc know what you're writing, and keep major stuff off of computers.

Comment Re:Why so complicated? (Score 1) 62

Wrong. MITM attacks are possible with DNS poisoning. You need both authentication and encryption.
That said, the two should not be one mechanism. Encryption should be separated from authentication, and should be always on. Reducing the number of attackers with the resources to complete an attack is adding security.

Comment Re:Security? (Score 1) 373

That's why the only site I allow ads on is krebsonsecurity.com. Brian Krebs reviews every ad that runs on his site. When some criminals tried to sneak in a 'malvertising' ad he saw it, stopped it (actually the ad network flagged it first) and posted about what had happened.
If it's not too much work for one man to do, then any big site should be able to put in the effort. Anyone who won't gets blocked.

Comment Re:Trying to read Principia was hard enough (Score 2) 92

Even the devotion to alchemy. It was the chemistry of his day, and promised the best understanding of chemical interactions available. That it was based on an impossible goal (transmutation of elements via chemical reactions) doesn't mean there was nothing worth studying. Quite a few of the elements were discovered by alchemists, and modern chemistry came from alchemy.

Slashdot Top Deals

"No matter where you go, there you are..." -- Buckaroo Banzai

Working...