Become a fan of Slashdot on Facebook


Forgot your password?

Comment Here's How I would Do It (Score 1) 126

I would boil water over a fire to create steam, I would feed the steam through a turbine that would turn a rotor in an magnetic field, and then that would charge some caps and other charge storing circuitry and ultimately feed to a VR circuit that feeds the battery. Probably could be done for less than $5. Disclaimer: I'm not an EE

Comment Wrong Story Focus (Score 2) 286

The problem is not that they renewed all these contracts at the EOY, the problem is that while the asshats in washington are bitching about spending on things like social programs and health care (not saying they are good or bad programs) the asshats at the Pentagon are spending money like a /.er at Frys and no one is discussing that.

I would love the discussion to be about whether or not we need to make these purchases given the state of our government budget and the global military situation.

Do we need to bribe France to buy war machines from American defence companies? Especially when we are sending home kids in Head-Start?

Submission + - Silk Road shut down, founder arrested (

u38cg writes: Ross William Ulbricht, known as "Dread Pirate Roberts," was arrested in San Francisco yesterday and has been charged with one count each of narcotics trafficking conspiracy, computer hacking conspiracy and money laundering conspiracy, according to a court filing. Silk Road has been shut down and some $3.6m in Bitcoin seized.

The question is — how?

Submission + - Online "revenge porn" gets a smack-down. More on the way? (

coondoggie writes: Call it a modern day love story: Boy meets girl; they "like" each other; they privately sext naked pics of each other to celebrate; girl loses interest, breaks it off; guy responds by posting previously private pics to Internet site specializing in revenge; girl has little recourse, suffers much humiliation, ridicule.

There is a lot of pressure to change the outcome of such wretched stories — which seem to be pervasive these days. And some relief is on the way the way, at least in California where this week the governor signed one of the nation's first laws making so called "revenge porn" illegal. Specifically the bill prevents people from "electronically distributing or post naked pictures of ex-romantic partners after a break-up with designs shaming the person publically."

Submission + - Pentagon Spent $5 Billion for Weapons on Day Before Shutdown 2

Hugh Pickens DOT Com writes: Foreign Policy reports that the Pentagon awarded 94 contracts Monday evening on its annual end-of-the-fiscal-year spending spree, spending more than five billion dollars on everything from robot submarines to Finnish hand grenades and a radar base mounted on an offshore oil platform. To put things in perspective, the Pentagon gave out only 14 contracts on September 3, the first workday of the month. Some of the more interesting purchases from Monday's dollar-dump include the $2.5 billion award the Defense Logistics Agency gave to aircraft engine-maker Pratt & Whitney for "various weapons system spare parts" used by the Army, Navy, Air Force and Marines, $65 million for military helmets from BAE Systems, $24 million for "traveling wave tubes" to amplify radio signals from Thales, $17 million for liquid nitrogen, $15 million for helium and $19 million on cots. The Air Force, traditionally DOD's biggest spender, was relatively restrained; it dished out only 17 contracts including $49 million to help France buy 16 MQ-9 Reaper drones, $64 million to Lockheed for help operating spy satellites that are equipped with infrared cameras, and $9 million to URS Corp. for maintenance work on the Air National Guard's fleet of RC-26B spyplanes that help domestic law enforcement agencies catch drug dealers. The air service also spent $9 million on a new gym at the Air Force Academy that includes areas for CrossFit training, space for the academy's Triathlon Club and a "television studio." It just goes to show says Reed that "even when the federal government is shutdown and the military has temporarily lost half its civilian workforce, the Pentagon can spend money like almost no one else."

Submission + - Connections Between Personality Types and Phishing

An anonymous reader writes: New insights from researchers at the Polytechnic Institute of New York University point to two factors that may boost the likelihood that a computer user will fall prey: being female and having a neurotic personality. In a preliminary study, the researchers sampled 100 students from an undergraduate psychology class, most of whom were science or engineering majors. Participants completed a questionnaire about their online habits and beliefs, including details about the type and volume of information they share on Facebook. They were also asked to rate the likelihood of negative things happening to them personally online, such as having an Internet password stolen. Finally, participants answered the short version of a widely used multidimensional personality assessment survey.

Submission + - Zero Days Are Not the Bugs You're Looking For (

msm1267 writes: The use of exploits against zero days, or unpatched vulnerabilities, is nothing new. Attackers have been looking for and using new bugs for as long as there has been software to exploit. What’s changed in recent years is the scale of zero day exploit use and the kind of attackers using them. It used to be mainly individual attackers and some high-end cybercrime groups. But now, zero days are being used by governments, intelligence agencies and state-sponsored attack teams. In the hands of these groups, zero days represent a major threat to the targeted organizations, most of whom can’t keep pace with the patches coming out for known bugs, let alone defend against attacks on zero days.
“There’s no red button you can push to make this go away. This is going to go on and on and on,” Andreas Lindh of I Secure n Sweden said in a talk at Virus Bulletin 2013 here Wednesday. “We need to get our priorities straight. What I’m suggesting is that we get back to basics rather than buying more tools. The tools we have work pretty well when you use them correctly. We actually have really good tools. We need to start focusing on what matters, what really matters.”

Lindh said that the old concept of defense in depth, which has been ridiculed in some corners in recent years, still holds up in most cases if organizations implement their technology correctly and don’t sit back and expect miracles. One key to succeeding more often than not against high-level attackers, he said, is to harden the software we all depend on through the use of technologies such as ASLR and DEP, which prevent many common memory corruption attacks. The number of ways that attackers can get into systems has decreased in the last few years, Lindh said.

Submission + - New Threat to Seaside Nuclear Plants, Datacenters: Jellyfish (

Nerval's Lobster writes: One of the largest nuclear-power plants in the world was forced to shut down temporarily Sept. 29, after pipes that bring Baltic Sea water in to cool the plant’s turbines became clogged with tons of jellyfish. The sudden influx of common moon jellyfish overwhelmed the screens and filters that keep flotsam and most sea life out of the Oskarshamn nuclear plant in southeastern Sweden. The plant was forced to shut down its No. 3 reactor – the largest boiling-water reactor in the world, which generates 1,400 megawatts of electricity when it is jellyfish-free and running at full power. The reactor stayed down until early Oct. 1, after the jellyfish had been cleared out and engineers approved the cooling system as invertebrate-free. It’s not easy to overwhelm the cooling system for a nuclear power plant, but Oskarshamn’s is unusually resilient. There is a separate intake- and cooling system for each reactor, all of which were designed for the brackish, polluted water in that area of the Baltic Sea. Most datacenters are too far inland to worry about jellyfish in their cooling water, though green-IT-promoters Vertatique estimated that a 5,000-sq.-ft. datacenter would consume almost 9 million gallons of water for cooling. That means ocean-side datacenters that use sea water for cooling (such as Google's datacenter in Hamina, Finland — also on the Baltic Sea) are just as susceptible to jellyfish attacks as nuclear power plants.

Comment Who defines "secure" (Score 1) 90

Who defines "secure". Who performed the audit to ensure the security? How often will audits be performed to ensure that Azure stays secure? What happens what Microsoft goes bankrupt?

Call me cynical, but I have no confidence that anyone who has the credentials and capabilities to ensure that Azure is secure actually did so for the Government. Sure there are really bright people at the DoD but I'm sure more bureaucrats were involved than engineers.

Also, what's the plan for when Microsoft goes bankrupt? It sounds far fetched but on a 20 to 30 year time frame Microsoft's continued existence seems questionable.

Comment Re:Different Profile (Score 1) 78

that's trivial, don't connect with any recruiter/headhunter choads. You do have your search-engine friendly resume online on your own website right? with "No Recruiters" at the top?

That's been working for me for 15 years, to hell with recruiters.

Not connecting to "choads" is not a solution because the whole idea of the site is that your profile is visible and that people not connected to you can see it.

How *I* use or don't use the site is irrelevant, I was just pointing out that she's probably going to be playing whack-a-mole with fake accounts: block one and another pops up. If someone want's to stalk you, linked in is pretty much the perfect place.

Slashdot Top Deals

"Gort, klaatu nikto barada." -- The Day the Earth Stood Still