Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:shotgun more effective (Score 4, Insightful) 147

Shooting down UAVs near your property makes about as much sense as shooting the tires of speeders in your neighborhood. Talk about overreacting!

Do you also grab the shotgun when you see a kite above your property? Kites can also carry cameras on stabilized platforms. So can balloons.

Also, if you fire a weapon within your city or county limits, you will be talking to the authorities anyway.

--

Comment Re:Encryption needed (Score 2) 40

Yes, encryption would be critical in securing the control of the RC craft. When the transmitter and receiver are paired, the receiver memorizes the transmitter's serial number and ignores all other transmissions. The attack device listens for the transmitted signals, records the transmitter serial number, then uses it to quickly transmit a counterfeit signal before the true transmitter transmits. The frequency hopping sequence gets our of sync with the true transmitter and because the signals are only one-way, the original transmitter has no indication that it is no longer in control.

By agreeing on an encryption key during the binding process, the entire exploit fails. The true transmitter no longer transmits its serial number in the clear, the signals are decrypted by the receiver using the stored key, and unless it sees the correct transmitter serial number in the encrypted signal it ignores the transmission. Since the clear text never changes (the transmitter's serial number) it would have to use a rolling key to prevent the counterfeit transmitter from just replaying past transmitter sequences. (Your car's remote key fob and garage door opener already use a rolling code to prevent this same type of replay attack.)

--

Comment Re:Nearly useless (Score 1) 65

b) Police need privacy too. They have to pee and stuff, just like other people.

Since when are Body Worn Cameras pointed at the officer's crotch? At best it will show a picture of the urinal or stall door. I doubt the police would release video of bathroom breaks. Unless the officer is facing a mirror, nothing will be on video.

--

Comment Re: CoffeE and Nicotine (Score 1, Offtopic) 257

I call Bullshit. Breaking the law does NOT require intent before you can be charged.

"Honestly, officer, I didn't MEAN to speed. I just wasn't paying attention."
"But I didn't MEAN to kill that other hunter. I just shot at the sound and didn't know what was in the bushes."
"I didn't MEAN to run that stop sign. I didn't see it because I was busy playing with my cell phone."

If intent was part of the prosecution then there wouldn't be a need for the saying "Ignorance of the law is no defense." You can still be charged and prosecuted for breaking a law even if you didn't KNOW it was illegal.

Disclosing classified material, which she should have known was classified, is breaking the law. If I did that when I was in charge of classified information it would have gotten me arrested, my security clearance revoked, and my job changed. I would never be allowed to handle classified material again.

Instead the FBI says "Oh, let's not prosecute her because she didn't MEAN to reveal classified material over an illegal, unsecured email system.

The more likely reason they decided not to prosecute was that they didn't want to draw attention to the fact that multiple classified email messages were sent over an unsecured system and are possibly stored in the backup systems of the commercial email servers. Sweep it under the rug, deny there was any wrongdoing, and hope nobody remembers it once the election circus starts.

Comment Re: Encryption (Score 1) 319

Which is why they just copy the entire hard drive in situ. After returning your laptop, they can open a copy of your OS and files in a virtual machine. If it tries to boot from the alternate partition and overwriting the partition in question, they just load another copy of your files and work around your trick.

If your primary partition is encrypted, that might set them back another 30 minutes to determine the encryption key. It isn't as easy as using "xyzzy" as an override passphrase, but almost.

--

Comment Re:The message is clear: (Score 5, Informative) 309

The troubling section starts on page 47, where it states "Defendant Has No Reasonable Expectation of Privacy in His Computer".

The judge states that because home computers can be hacked so easily, it becomes a common assumption that your home computer MIGHT be hacked, therefore your expectation of privacy is forfeit. Just like a broken window blind allows police to peek into your home, an easily exploited vulnerability on your home computer means you assume your data is not private. Even a password protected file is not immune to discovery because everyone knows passwords can be easily defeated. (pages 47 - 55)

The judge's analysis is similar to saying we should not really expect any privacy in our homes because a skilled locksmith can unlock our front door at any time, and a locked safe in the home is not really private because a skilled safe cracker can open it easily. The judge is saying that because something MIGHT happen, we should assume it WILL happen, and thus give up our right to expectations of privacy.

--

Comment Re:Auto upgdate bricked machine (Score 1) 370

What? You don't have a cold-metal-restore backup? You relied on the restore partition being left alone by all malware? All malware (in this case Win10) should leave your partition configuration just the way it is?

Sounds like you need to rethink your backup strategy soon. A full disk backup and an external copy of your BIOS setup is essential.

And you shouldn't have needed to swap hard drives to get your partition table configured again. DISKPART should have been able to do it, assuming you have a restore CD with a WinPE environment and can setup your UEFI and data partitions. I will admit your post doesn't state if you tried this or not, but I'll assume you didn't because you needed to swap to a pre-configured hard drive.

Your problem is similar to purchasing a new hard drive or SSD. You will need to configure the hardware before installing any OS. Assuming your hardware will always remain configured so you can restore Win7 from your vendor's restore media is a recipe for frustration.

DISCLAIMER: Yeah, I've been in your same situation before. It took me a while to collect the proper Ghost/Trueimage and BartPE/WinPESE tools for a true disaster recovery toolkit, but the peace of mind is worth the effort.

--

Comment Re:Good start to 2016, but don't you want to do mo (Score 0) 118

Why not just have a charge-back system where every email that gets flagged as Spam costs the sender a penny. Until you pay the fine, you're not allowed to send to more than 100 additional emails before your sending ability is frozen.

Legitimate businesses will hardly ever receive more than 100 Spam flags if they offer an opt-out method that actually works. ISPs that continue to host personal domains that don't comply with the charge-back run the risk of being flagged as Open-Relay mail systems and their emails refused.

20 million emails flagged as Spam would incur a $200,000 fine, payable before the next batch of Spam emails could be sent. End of profitability.

--

Comment Re:Squaring up photos of pages (Score 1) 122

Paint Shop Pro also has a batch mode for making image corrections. You open a sample document, turn on the macro recorder, make your corrections (crop, straighten, brightness, contrast, re-sample resolution, save location, etc), save the macro, then apply the macro to all the files in a folder.

Doing a quick review of the resulting output images allows you to correct any anomalies because the original files don't have to be overwritten. Very convenient and useful for a ~$50 software package.

--

Comment Re:Behemoth boring machine... (Score 2) 111

Comparing the two tunnels is a bit unfair because the new construction is like digging 14 of the old tunnels.

The new tunnel is circle 60' in diameter, compared to the 30' semicircular train tunnel (8 times bigger), and the new tunnel is 1.75 miles long compared to one mile(.75x8=+6). Plus, the floor of the old tunnel was flat and only required laying train tracks. The new tunnel is circular and will require a double roadway and utility spaces.

If the new tunnel was dug with picks, shovels, and dynamite, it would take 14 times the 1.5 years of the old tunnel or 21 years total. Then start the construction of the interior infrastructure.

No, this isn't a project that would be feasible with picks and shovels.

--

Slashdot Top Deals

Take an astronaut to launch.

Working...