Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Re:One way people could mess with this... (Score 1) 292

Says the one who thinks assuming things about others is actually a logical rebuttal to compensate for the inability to consider the fact that different building densities, and atmospheric conditions affect how a sound is perceived.. I actually have been shooting, at ranges - don't get to do it often, but it is a lot of fun. I go with my brother, he shoots a pistol, I stick to a .22 caliber rifle. I'd have to be literally deaf to not know what a gunshot sounds like. When I did what I did in the story, the sound echoed like crazy, scared the crap out of people (inadvertently, of course) - even this crackhead who was sitting on the steps to the subway, who had previously been cursing off everybody walking near her, shut up. 0_0

Comment One way people could mess with this... (Score -1, Troll) 292

Take a brown paper bag, the tall ones you get at liquor stores, blow em up as much as you can, then pop - in the right conditions, in a city, sounds like a fucking gunshot going off. I learned this the hard way when I decided to pop such a bag to scare the crap out of my sister once... XD

Comment Re:Grumpy old man moment: (Score 1) 125

They don't really care about experiencing the concert.

Wouldn't that, however, assume there being only one way to "experience" a concert, or other event? Considering how little work it takes to use certain recording mediums, you can just aim, while focusing your eyes on the show, and listening/looking at the visuals, so even if there were one way of "experiencing" it, you could still theoretically do it. (ALL strictly IMO, of course).

Comment Re: as usual, piracy fears are nonsense. (Score 1) 178

No, you've failed to account for theft of intellectual property.

You mean a crime that doesn't yet, to my knowledge, actually exist, and seems to only be used by the misinformed, and the intellectually lazy instead of copyright infringement? Where are the people who have been prosecuted for this "theft of IP" law that supposedly exists, versus copyright/patent/trademark infringement, etc? Surely, you can demonstrate it, since you're so sure it exists as a legal tort and/or crime, and is more appropriate than the IP laws that exist in application.
That "law?"
Ha. When people are prosecuted for that exact crime, and not another being mislabeled, OK, but until then, IMO this is BS.

Comment Very disappointing (Score 1) 240

I had heard, last year, about efforts to take what little of RadioShack was left, and try to craft it into something resembling its old self (in so far as being focused on the electronics hobbyist, providing reasonably priced components, kits, and tools again). Looks like that isn't happening... bummer, as that would have been so cool to see rise again.

Comment The problem is this retroactive application of it. (Score 1) 174

Whoever thought that was a good idea is a moron, full stop.
Different archive copies from when the site was under different ownership should retain their own policies - whether it is fully restricted, not restricted at all, or in between. Yes, that will take up space, holding on different copies of robots.txt files, linking them to websites, etc, but it is better than some archives not being available because of their current policy.
Power

Smart Electricity Meters Can Be Dangerously Insecure, Warns Expert (theguardian.com) 163

An anonymous reader quotes a report from The Guardian: Smart electricity meters, of which there are more than 100 million installed around the world, are frequently "dangerously insecure," a security expert has said. The lack of security in the smart utilities raises the prospect of a single line of malicious code cutting power to a home or even causing a catastrophic overload leading to exploding meters or house fires, according to Netanel Rubin, co-founder of the security firm Vaultra. If a hacker took control of a smart meter they would be able to know "exactly when and how much electricity you're using," Rubin told the 33rd Chaos Communications Congress in Hamburg. An attacker could also see whether a home had any expensive electronics. "He can do billing fraud, setting your bill to whatever he likes [...] The scary thing is if you think about the power they have over your electricity. He will have power over all of your smart devices connected to the electricity. This will have more severe consequences: imagine you woke up to find you'd been robbed by a burglar who didn't have to break in. "But even if you don't have smart devices, you are still at risk. An attacker who controls the meter also controls the meter's software, allowing him to cause it to literally explode." The problems at the heart of the insecurity stem from outdated protocols, half-hearted implementations and weak design principles. To communicate with the utility company, most smart meters use GSM, the 2G mobile standard. That has a fairly well-known weakness whereby an attacker with a fake mobile tower can cause devices to "hand over" to the fake version from the real tower, simply by providing a strong signal. In GSM, devices have to authenticate with towers, but not the other way round, allowing the fake mast to send its own commands to the meter. Worse still, said Rubin, all the meters from one utility used the same hardcoded credentials. "If an attacker gains access to one meter, it gains access to them all. It is the one key to rule them all."

Slashdot Top Deals

Advertising is the rattling of a stick inside a swill bucket. -- George Orwell

Working...