Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment quality of research vs. patents? (Score 2, Interesting) 38


I am wondering if this has more to do with the quality of the research being done, as opposed to the patent process itself. While India's CSIR-Tech may have failed, Australia's equivalent entity, CSIRO, seems to have done quite well for Australian taxpayers, such as generating income on from Wi-Fi (some essential component of 802.11n, as I recall).


Aryeh Goretsky

Comment This is not a big deal and is easily turned off. (Score 1, Informative) 498


I guess it was a slow day at CBS Interactive's CNet web site, or perhaps they are not very familiar with using Windows. This behavior can easily be disabled by a simple registry tweak. Here's a .REG file which does exactly that:

Windows Registry Editor Version 5.00

If you would rather script it using a .CMD file, that's easy enough, too. You can even do it in one line:

REG ADD HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /t REG_DWORD /d 1

Or, for the PowerShell-inclined, here's a three-line version:

New-Item HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
New-Item HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
Set-ItemProperty HKLM:\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU -Name "NoAutoRebootWithLoggedOnUsers" -Value 1 -Type DWord

As always, you are responsible for your computer and should make a backup before making any changes to it.

Yes, Windows can be difficult to use at times, and the learning curve can be quite high. But these days that's pretty true of any operating system if you're coming to it for the first time. You can find the answers to a lot of questions by searching the web, and in case you can't (or you still have questions), you can go to a web site with an active Windows user forum like BleepingComputer. GeeksToGo, Neowin, Scot's Newsletter,Sysnative, WindowsForums or even Microsoft's own Microsoft Answers forum and someone will help you. Those are just a few off the top of my head, there are plenty of others, although you should probably avoid CBS Interactive's own CNet forums.


Aryeh Goretsky

Comment Incorrect. KB3201845 contains a fix/workaround (Score 2, Interesting) 191


This issue has been going on for more than two days. Reports of it date almost a month:


Although reports of it in Microsoft's support forum are more recent:

The December 9th patch - - might contain some kind of fix or workaround, although I don't see anything mentioned on the page which maps to the issue.

Microsoft is keeping customers up to date with a page on its support forum. Here's Microsoft's short link to the page:


Aryeh Goretsky

Comment Uhm... no, it doesn't work that way (Score 3, Insightful) 30


Intel had been investigating selling Intel Security (nee McAfee) for well over a year, so this is hardly a recent development on their part. And regardless of what the Slashdot crowd things of the products' quality, they do have massive amounts of brand recognition in both the consumer and enterprise spaces.

Mr. McAfee had given up the rights to his name when preparing McAfee Associates' IPO and did quite well in terms of how he was compensated. Even back in 1995 he was already trying to get his name back from Bill Larson (then President, CEO and Chairman of McAfee Associates) and having no luck. As much as Bill hated the McAfee name, he realized there was so much money to be made in it, and took the company from $20-30M in revenue to billions of dollars in valuation .

Mr. McAfee's one of the smartest business people I know, and his ability to rapidly absorb data, synthesize it and come up with all sorts of ideas for products is pretty darn amazing, and frankly, with all of the time and effort he's put into being in front of the media, trying to get his name back at this point is a waste of time and shareholder's money spent on lawyers: Due to his recent high-profile activities, there's enough interest in Mr. McAfee that he doesn't need to capitalize on his name, anymore. He could name a company "Spicy Lemon" and still generate media attention because of his involvement with it, just as he's done with all the products he's taken on since returning to the U.S. after fleeing Belize.


Aryeh Goretsky

Comment But satellite phone are easy to target (Score 1) 197


The funny thing is that equipping a target with a satellite phone improves the ability to identify them. In the case of a journalist and photographer team operating in Syria a few years ago, it was their satellite phone that allowed their location to be triangulated and subsequently attacked.

I would think it would not be too difficult to come up with some interesting usage patterns of DMs (sending messages in languages commonly used by ISIS, using certain phrases common to ISIS, geoIP location, access only from Tor nodes, proxies, VPN connections and so forth as selection criteria for further intelligence collection. Frankly, using DMs sounds like a great way to be targeted by state security services.


Aryeh Goretsky

Comment Bug bounty program? (Score 1) 61


I did not see any mention of a bug bounty program. Is there one? If the federal government would like to not just have its open sourced software reviewed but actually receive reports of bugs, they should consider adding a bug bounty program to encourage programmers to report any errors they find to the federal government, instead of selling it to an adversary.


Aryeh Goretsky

Comment here is the Lenovo Solution Center download (Score 4, Informative) 43


Since neither the original poster or the article provided it, here's a link to the page where the latest version of the Lenovo Solution Center can be downloaded from:

Note that the downloads are listed at the bottom of the page.


Aryeh Goretsky

Comment three questions (Score 1) 133

Hello Col. Hypponen,

I have three questions for you:

1. Do you think it is still possible to secure embedded systems (aka the Internet of Things), or is that an impossibility now, practically speaking?

2. If there was one thing you could every average computer user to do to improve their security, what would it be?

3. If you were a person of interest in the murder of your neighbor in a tiny Central American country, what would your strategy be for clearing your name?

Thank you for taking the time to read this. I look forward to your answers.


Aryeh Goretsky

Submission + - John McAfee denied Libertarian Party nomination for President (

SonicSpike writes: In a decisive rout for pragmatism over purity, the Libertarian Party has nominated former New Mexico Republican Governor and 2012 nominee Gary Johnson for president. Johnson came within an eyelash of winning on the first ballot, pulling 49.5 percent of the vote, just short of the required majority. (Libertarian activist Austin Petersen and software magnate John McAfee came in second and third, respectively, with 21.3 percent and 14.1 percent.) With sixth-place finisher Kevin McCormick (and his 0.973 percent of the vote) booted from the second ballot, Johnson sailed through with 55.8 percent.

Submission + - Metal foam obliterates bullets – and that's just the beginning ( 1

schwit1 writes: Composite metal foams (CMFs) are tough enough to turn an armor-piercing bullet into dust on impact. Given that these foams are also lighter than metal plating, the material has obvious implications for creating new types of body and vehicle armor – and that’s just the beginning of its potential uses.

Afsaneh Rabiei, a professor of mechanical and aerospace engineering at NC State, has spent years developing CMFs and investigating their unusual properties. The video seen here shows a composite armor made out of her composite metal foams. The bullet in the video is a 7.62 x 63 millimeter M2 armor piercing projectile, which was fired according to the standard testing procedures established by the National Institute of Justice (NIJ). And the results were dramatic.

“We could stop the bullet at a total thickness of less than an inch, while the indentation on the back was less than 8 millimeters,” Rabiei says. “To put that in context, the NIJ standard allows up to 44 millimeters indentation in the back of an armor.” The results of that study were published in 2015.

But there are many applications that require a material to be more than just incredibly light and strong. For example, applications from space exploration to shipping nuclear waste require a material to be not only light and strong, but also capable of withstanding extremely high temperatures and blocking radiation.

Last year, with support from the Department of Energy’s Office of Nuclear Energy, Rabiei showed that CMFs are very effective at shielding X-rays, gamma rays and neutron radiation. And earlier this year, Rabiei published work demonstrating that these metal foams handle fire and heat twice as well as the plain metals they are made of.

Submission + - LEOs Raid Another Tor Exit Node - They Still Believes an IP Address is a Person (

schwit1 writes: An IP address is not a person, even less so if said IP address traces back to a Tor exit relay. But that's not going to stop the "authorities" from subjecting people with no knowledge at all of alleged criminal activity from being subjected to raids and searches.

It happened in Austria. Local police seized a bunch of computer equipment from a residence hosting a Tor exit node. ICE — boldly moving forward with nothing more than an IP address — seized six hard drives from Nolan King, who was also running a Tor exit relay.

ICE wasn't involved in the latest raid predicated on nothing more than an IP address — at least not directly. This search/seizure was performed by Seattle PD conducting a child porn investigation. Sure enough, investigators had traced the activity back to an IP address, which was all the probable cause it needed to show up at privacy activist David Robinson's home at 6 a.m. and demand access to his computers.

Slashdot Top Deals

What this country needs is a good five cent nickel.