Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment Re:Basically (Score 1) 180

I hope the "insightful" mod is in regard to the lack of proof, and not the ridiculous car analogy. The biology and functionality of the human brain is several orders of magnitude more complex than the mechanics of an automobile, to say nothing of the fact that fuel efficiency is completely off-topic, even as an analogy. That's comparing apples and solid rocket boosters.

Comment Re:Basically (Score 1) 180

Honest question: what activities are recommended for improving focus? I've identified a general decline since high school in my ability to focus on things that aren't highly stimulating. I did some brief searching a while back, and most of the advice just boiled down to, "make a conscious effort to not let distractions (internal or external) break your focus, and over time, your ability to focus will improve." I've wondered if there are specific activities (marathon video game sessions?) that can more easily hone one's ability to focus. An analogy would be (for me) riding a bicycle to get exercise. I just generally enjoy heading out on a bike and exploring, so as a side effect, my physical fitness improves. Can I find a similar solution for improving focus?

Comment This isn't a threat; it's a tool. (Score 1) 190

IMHO, the news here isn't the threat of a malicious rootkit, but the functionality that can be used for other purposes. In a penetration testing scenario, this would be a sweet little tool. Hide an Android phone somewhere in the target facility (or vehicle), and then you can silently call it from across the city/country/world and activate wifi/GPS/camera/microphone.

My android phone also uses USB for charging and data transfer, so it wouldn't be hard to hang it off the back of a PC, place it out of sight, and never worry about the battery running down (my phone doesn't show up to the computer's OS until you tell the phone you want to connect).

Comment Re:Developers on ChromeOS? (Score 1) 1003

It seems that there are lots of people in this thread saying that Google can't pull this off, and most of the excuses are centered around a need to develop on, or use tools for, Windows. It's not hard to figure out the solution here-- Linux for the core OS, and any specialized (non-replaceable/windows-only) tools or development that has to run under windows can be done in a sandboxed VM.

Comment Re:18,000 lbs = 4500 gallons every 12.5 days... (Score 5, Funny) 119

Clearly, this shouldn't be considered if it doesn't provide a comprehensive solution to the problem. It's the same reason we shouldn't be expanding solar, wind, and nuclear power generation in unison...we should definitely wait for just one technology that will serve all our needs, and not attack issues with a multi-pronged approach.

Comment Re:Translation (Score 1) 193

Ditto on not needing OpenSSL installed, but be careful with echo. On the systems I've used, echo by default includes a newline character, which also gets hashed, so you need to not include that if you want a 100% reproduce-able algorithm:

echo -n salt.site.password |md5sum
echo -n salt.site.password |sha1sum

Also, I find the Hashr extension for firefox handy.

Comment Re:AV on POS computer?? (Score 1) 233

You're confusing "should be" vs. "real-world." Even if the actual POS machines are dumb terminals, they'd connect back to the server, which is probably Windows. Marketing Department and/or Customer demand says that more POS systems will be sold if Corporate can push out pricing updates to the servers and check inventory levels across the Internet, instead of having leased lines all over the place. And since there's Internet connectivity, you need Antivirus. The fact that POS machines aren't quarantined the way they should be isn't the worst of it. I walked up to my bank branch once, and the ATM was showing a WinXP BSOD.

Comment Re:/me too (Score 1) 139

Well, you've eliminated every "user-error" vector I can think of, except one. What were your password reset settings on the account? I'm guessing that with the rest of your measures, you didn't have an easily-guessable answer, but I'm curious.

Comment Re:disclaimer: in the industry (Score 1) 306

I'm inclined to doubt that the students are the ones printing most of their emails. In my experience, it's usually the older generation(s) that seem to want to print everything, so it's probably faculty/professors printing out every damn thing. I have two theories on this:

1) Younger people are still more used to digesting content directly from an electronic screen, so they don't feel a need to convert it to dead-tree form for a more "natural" medium.

2) Younger people are probably more likely to trust that the email will still be there*, and they are able to use search tools to find it, whereas older generations may feel (even subconsciously) that if they don't print it out and put it in their hard-copy filing system, they may not have access to it again. I think the only reason my mother has cut down on her printing of every "interesting" email is that she has spammed herself into oblivion with mailing lists & such, to the point that printing everything would be cost prohibitive.

*Assuming there's not a ridiculous "all email will be deleted within 90 days, and no archiving or auto-forwarding allowed" policy, like with my employer.

Comment Re:Neither is "more" secure (Score 1) 307

Who says he is blindly following advice? In my experience, asking a large group of experienced people, many of whom are more likely to be more well-versed than I am on the topic, is an extremely valuable research technique. It doesn't mean I'm going to blindly trust whatever I'm told; it means that I have a wealth of new, highly-relevant information with which to make my decision. In this case, slashdot is google on steroids.
PlayStation (Games)

PS3 Hacked? 296

Several readers have sent word that George Hotz (a.k.a. geohot), the hacker best known for unlocking Apple's iPhone, says he has now hacked the PlayStation 3. From his blog post: "I have read/write access to the entire system memory, and HV level access to the processor. In other words, I have hacked the PS3. The rest is just software. And reversing. I have a lot of reversing ahead of me, as I now have dumps of LV0 and LV1. I've also dumped the NAND without removing it or a modchip. 3 years, 2 months, 11 days...that's a pretty secure system. ... As far as the exploit goes, I'm not revealing it yet. The theory isn't really patchable, but they can make implementations much harder. Also, for obvious reasons I can't post dumps. I'm hoping to find the decryption keys and post them, but they may be embedded in hardware. Hopefully keys are setup like the iPhone's KBAG."

Comment Re:Simple solution (Score 1) 216

Exactly. I'm not saying Adobe should strip out javascript, just fucking disable it by default. And *if* I need it, *if* I turn it on, at least give me the option to only leave it on for that session. There aren't enough adjectives for my opinion of what Adobe has done to Acrobat Reader.

Slashdot Top Deals

Take everything in stride. Trample anyone who gets in your way.

Working...