Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Re:Security, Availability, Expandibility. (Score 1) 346

Interesting point, but I think ad-hoc may actually work better then a client / AP network in a high-bandwidth situation due to bandwidth overhead in a repeater-type wireless system (access point). When you are connected Ad-hoc, your data goes directly to the other computer and vice-versa. When you have an AP in the middle, your data goes to the AP, and then the AP sends it to the recipient- if you are both connected to the same AP you have a doubling of data in the same band space. Multiply that by 2 or 3 devices and you see where the problem is. Additionally most networkable games are designed to use as little bandwidth as possible so they work well with a variety of internet connections.

Comment Security, Availability, Expandibility. (Score 4, Insightful) 346

These are the three things that WiFi still can't compete in against a wired network.

Even the most secure wireless is still much more susceptible to attack then a wired network. Even with the most modern access control and protection methods (which are neither cheap nor convenient) the sheer massive avenue of attack WiFi presents creates a problem for many large corporations. Ask JPMorgan Chase how much WiFi connectivity they have. Or pretty much any US Government building.

Even if you do as the article suggests and call in an expensive contractor to map out the best locations for access points, you have to find out if it's even feasible to run network and power to that location. Even with the best-possible placement you are going to have dead zones, and the size and location of dead zones will vary depending on the devices used. My Toshiba laptop got service in places a virtually identical Macbook did not- let alone the poor wireless reception most mobile phones and devices provide. So you have to deal with irate users, and try to find places to install additional access points to cover the dropped zones.

When I worked for a small non-profit K-12 school, during teacher inservice days I always had to install 2 additional access points in the gym so that the teachers could all connect on their laptops, as the single AP currently serving the gym was not sufficient. Even then, transferring any large file from the server or online either brought the network to a standstill or required tethering each machine to an ethernet cord to do the transfer. Most high-tech oriented conferences, the wireless is all but useless if it's available publicly, due to the hundreds of devices all connecting within a limited frequency space and bandwidth. There is just not enough bandwidth in a small space available to deal with more then a handful of data-rich connections. Spread across multiple spheres of AP reception the problem is reduced, but not eliminated! My bedroom is WiFi-connected only due to wiring constraints and connecting from my laptop to my server via VNC or to copy files is very... very... slow. And really, try having a LAN party over wireless- I can run hundreds or thousands of network cables through a small room and connect everything I need for nearly any project or task inexpensively, and know that the network will be robust. Working with WiFi in anything other then a solo arrangement is a lesson in frustration.

TL;DR - Until security protocol and access control methods are more robust and available; until tools to design, implement, and test wireless networks are more plentiful and robust; and until bandwidth availability is not on par with but exceeds that of standard CAT5- wireless is but an adjunct, a convenient add-on to the main structure of a wired network in a business. ... err, not that I'm impassioned about it, or anything.


Submission + - Church of Scientology violates Federal Law ( 5

FreedomToThink writes: "This is a very long story I'm sure the editors will have fun with, but I couldn't see how to cut it down at all.

On the eve of the Ides of March protest, from the source of the recent 'Anonymous' submitted CCHR leak on wikileaks, comes this message

"Dear $cientology,You attempt injunctions.I respond.Shall we continue the game? Much Love, DEEP CLAM"

Included was yet another PDF this time including yet more emails leaked from a Church of Scientology front group.

Vote Rigging?

From: "Mike Kaplan" <>
To: <Undisclosed-Recipient:;>
Date: Sun, 6 Jan 2008 11:53:07 -0400

See below. Everyone in Clearwater MUST vote. Every vote will be needed to be
sure Hibbard gets re-elected. The alternative is Rita Garvey who is an SP.

— Original Message —
From: Shelly <> Bauer
To: Shelly Bauer <>
Sent: Sunday, January 06, 2008 8:09 AM


Lunch with your preferred Presidential candidates for a high price?


I have arranged a private one-hour luncheon with Ron Paul on 11/28 in St.
Pete when he will be in town for the CNN/YouTube Republican debate.

This luncheon is reserved for $1000+ donors to Ron Paul's presidential
campaign. 19 people so far have paid and confirmed and will have the honor
and pleasure of having lunch and communicating with Ron Paul directly.

From the head of the "Non Proffit" CCHR Bruce Wiseman

Go the the HELP committee website. The link is here.
Here you will see the names of the Committee members on the left hand
of the page. Please go to the individual websites of the Republican =
(this will take just a bit of leg work on your part by putting their =
into Google) and calling their office or sending a fax to them (email is =
least effective) stating your opposition to S. 1375 The Mother's Act.

Currently, the law prohibits political campaign activity by charities and churches by defining a 501(c)(3) organization as one "which does not participate in, or intervene in (including the publishing or distributing of statements), any political campaign on behalf of (or in opposition to) any candidate for public office."

An OCMB (Operation Clambake Message Board)regular adds :

I downloaded myself a copy and started looking through them. I found an interesting one on pages 47-48.

Karin Pouw of OSA of CofS writes a message.
It's forwarded by Michael Genung. He's the guy who runs ACSR, Association for Citizens Sociel Reform. ["CSR Background and Philosopy: CSR was founded in 2001 by a group of Scientologists and other like-minded individuals concerned with the escalating social ills in society. CSR's purpose is to work with in the field of public policy to bring about more effective and humane solutions to these social ills of illiteracy, criminality substance abuse and general decay of character."]

Then it's forwarded by Doyle Mills, of LEAF fame (Letters to the Editor Attack Force).
Then it's forwarded by Mary C. (possibly one of two Mary C's I'm thinking of, but unsure).
Then it's forwarded by Mike Kaplan, another person who runs an email list and forwards CCHR type stuff to CofS members.

If that ain't stringing a line from the CofS to CCHR and the CofS front group ("grassroots") movements, then I don't know what is!

Apologies in advance as the Enturbulation servers will not be up to a slashdotting so the Coral Cache link is here Enturbulation Discussion (already cached for you)

ANYONE CAN REPORT TAX FRAUD DIRECTLY TO THE IRS :,,id=106778,00.html It does require that you print out and mail in an actual hardcopy, but it does not require you to identify yourself.

Just a casual user passing on a message from the Enturbulation forum, this is already out there, there's no reason to attack the messenger."

The Almighty Buck

Submission + - "Recycled" Computers Actually Shipped Over

Bilby Baggins writes: Rather then actually recycling or reusing old computers and hardware collected at neighborhood recycling drives, it seems that many corporations are simply shipping them overseas. There, workers with little or no safety gear are extracting the valuable materials within, exposing themselves and the environment to dangerous toxic chemicals.

From the article:
"The gear most likely to be shipped abroad is collected at free recycling drives, often held each April around Earth Day, recycling industry officials say. The sponsors — chiefly companies, schools, cities and counties — often hire the cheapest firms and do not ask enough questions about what becomes of the discarded equipment, the officials say. Many so-called recyclers simply sell the working units and components, then give or sell the remaining scrap to export brokers."

I and many of my fellow IT workers in schools and businesses across the country depend on recycling companies as a legal way to dispose of heavy old CRT monitors and broken and useless hardware- but do we really know where the equipment we 'recycle' is going? How can we be sure that these items are taken care of in a responsible way?

Slashdot Top Deals

Many people are unenthusiastic about their work.