Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Comment Re:"what is necessary to be done" (Score 1) 461

Second, I checked the references to the times involved, and unless somebody really screwed up in a major way, then there is a genuine time discrepancy. In the government's own records, not just according to some bozo reporter out to make a name for herself.

But what does the time of death of two seal team members have to do with the time of death of a state department official?
Here are the facts. The assault in Benghazi began at 9:40pm local time on 9/11. Smith was known to have been dead by 11:40pm local time. From that we can assume he is likely the state department official mentioned by Ms. Clinton. An AP report quoting Ms. Clinton at 4:58am on 9/12 noting the death and discussing the attack would be perfectly normal as far as a timeline goes. The Seals were killed at about 5:15am on 9/12 during a second attack, not the first and it is unrelated to the AP story or Ms. Clinton's statements.

Comment Re:Hi (Score 3, Informative) 82

Where shall we send your NAL?

From the FAQ:
How do you suggest we ID? US regulations (CFR Sec 97.119) require amateur radio stations to identify themselves at the beginning and end of a transmission and at least once every 10 minutes. If you ID at the beginning of the first "dit" of the HI and at the end of the final one before you go QRT, you will meet the US requirements. Others should verify that this will meet your national requirements.

Comment Re:Needs to be an appliance.. (Score 1) 55

Monitoring is not the same thing as analyzing.. but I am quite certain I know where my packets are headed - at least when they're sent from my gateway. That's how the internet works.

But are you sure you know everything that is in those packets? Nothing extra in those DNS requests leaving your network?

Comment Re:Why? (Score 2) 527

from TFA: ....But Lavabit offered paying customers a secure email service that stores incoming messages encrypted to a key known only to that user. Lavabit itself did not have access.

If this is true, then how could Lavabit also have done the following?

Lavabit offered an alternative method to tap into the single user in question but ...

Either they could access the data or they couldn't.

Comment Some Issues (Score 4, Informative) 53

Before committing to anything you might want to read this follow up post.Apparently there are titles shown in the library that may not actually be available in your geolocation. In addition, you won't find out about that until you actually try to open the book. It's really quite disingenuous of them to show you books and let you add them to your library, when they clearly later know that those titles are not available to you for actual reading.

Comment Re:Marketing (Score 1) 168

On the other hand, please take a look at the history of differential cryptanalysis. The NSA was quite ahead of academia on that one. My own research back in those days demonstrated that the substitution boxes had been chosen with very specific characteristics. The same holds true for elliptic curves, where the curve chosen must have specific properties. Whether we know what all of those properties are though is still undecided, We know what makes a weak curve, but do we know what makes a strong one?

Comment Re:The next obvious step is to ... (Score 5, Insightful) 199

even software alone consist of so many layers ( from the spreadsheet software program that we use, to the device drivers, the OS, to the embedded firmwares residing inside the chips, to the myriad mix of software that keep the Net humming.

Don't forget the compilers and linkers that build the software. The source may look fine, but where did the compiler come from?

Comment Different Viewpoint (Score 2) 112

Chris Roberts, who created the well-known Wing Commander series in 1990, managed to raise millions of dollars on Kickstarter last fall for his upcoming Star Citizen, eventually collecting so much money from individual backers that he could return the budget he'd taken from "formal" investment firms. "Even nice investors, they want a return at some point. They have a slightly diff agenda than I do," Roberts told Slashdot. "My agenda is to build the coolest game possible."

Herein lies the difference. Kickstarter backers are not seen as actual investors in the project by the project owners, but rather as a way to informally fund games that the developers want to work on without feeling like there is any real obligation to those who funded it. To paraphrase what Chris Roberts stated, he couldn't care less if it ever makes any money as long as he gets to build the "coolest game possible". Without the incentive/pressure of investors looking for a return however, there will always be "just one or two more things" to finish up and the game will never actually get released.

Slashdot Top Deals

Can anyone remember when the times were not hard, and money not scarce?