Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Would You Add Easter Eggs To Software Produced At Work? 747

Mr. Leinad writes "Do you add Easter Eggs to the software that is produced at the office? I mean, if you have complete control over the final product, do you spice it up with that little personal touch, which, as unlikely as it is that anyone will see, carries with it an 'I was here' signature? I've just finished the development of a large software product, and I have a couple of days left to try to add my own personal Easter Egg code, but given that the software is quite professional, I don't know if I should. What do you think? Should we developers sign our creations?"
Input Devices

Compromising Wired Keyboards 277

Flavien writes "A team from the Security and Cryptography Laboratory (LASEC) in Lausanne, Switzerland, found 4 different ways to fully or partially recover keystrokes from wired keyboards at a distance up to 20 meters, even through walls. They tested 11 different wired keyboard models bought between 2001 and 2008 (PS/2, USB and laptop). They are all vulnerable to at least one of the 4 attacks. While more information on these attacks will be published soon, a short description with 2 videos is available."

Comment Re:Notice the shock resistance (Score 2, Insightful) 269

Where does it mention any speeds???
It talks about accelerations!

If the impact only lasts for 1 msec and in this time it goes from 8.33 m/s to 0 m/s you already have your 850G. In normal gravity it picks up this speed in less than a second. So, pretty good for normal handling accidents (dropping a notebook on a carpet floor) but easy to exceed by throwing it out of a window on a concrete floor.

Slashdot Top Deals

To communicate is the beginning of understanding. -- AT&T