Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Bad Summary (Score 1) 147

The Summary confuses me...
From the summary:

He refutes reported claims that it's just a kidney shaped mold, as reported by some.

From the linked story:

Wake Forest has since clarified media inaccuracies in a press release, stating Dr. Atla printed "a kidney-shaped mold", not a functioning kidney.

Did he print an actual kidney or not. I am guessing not.

Comment Re:So? (Score 1) 557

You should also consider the efficiency of the power plant when calculating the difference between NG and electric heat. The efficiency of a typical coal fired electric plant (most common in USA) is about 40%. So for every 1W of energy it produces it uses about 2.5W. Therefore, 1W of heat from your electric light bulb will require 2.5W of energy (Neglecting any distribution losses). 1W of heat from NG (assuming 90% efficient furnace and 10% distribution overhead) will use about 1.25W of energy. This is why resistive heating is not a great option for heating. If you do the same calculation for a heat pump running at 250% efficiency: 1W output => (1/250%)/40% = 1W input.
Security

Submission + - Self-Destructing USB Stick Sold as Un-Hackable 3

Hugh Pickens writes: "PC World reports that Victorinox, maker of the legendary Swiss Army Knife, has launched a new super-secure memory stick that sounds like something out of Mission: Impossible. The Secure Pro USB comes in 8GB, 16GB, and 32GB sizes, and provides a variety of security measures including fingerprint identification, a thermal sensor, and even a self-destruct mechanism. Victorinox says the Secure is "the most secure [device] of its kind available to the public." The Secure features a fingerprint scanner and a thermal sensor "so that the finger alone, detached from the body, will still not give access to the memory stick's contents." The product uses an integrated Single Chip Technology, so that there are no external and accessible lines between the different coding/security steps, as on multi-chip solutions making cracking the hardware impossible. Then there's the self-destruct mechanism. While offering no explanation of how it works, Victorinox will only say that if someone tries to forcibly open the memory stick it triggers a self-destruct mechanism that "irrevocably burns [the Secure's] CPU and memory chip." At a contest held in London, Victorinox put its money where its mouth was and put the Secure Pro to the test offering a £100,000 cash prize ($149,000) to a team of professional hackers if they could break into the USB drive within two hours. They failed."

Comment Re:Tax Cheats? (Score 1) 325

All over the US there are private roads and people voluntarily pay tolls to travel them because, brace yourself again, they provide a much more pleasant commute. They deal with traffic congestion immediately, they undertake repairs and maintenance quickly and effectively, without bloated government bureaucracy making repairs and improvements take years and cost tax payers millions of dollars and they do it with their own money.

Toll roads work pretty well for highways, but they would be a nightmare for surface streets. If corporation XYZ controls the street connecting your driveway to the outside world, you are pretty much screwed if they decide jack the toll rate up. What would your solution be? Would you have multiple toll roads connecting to your house so you could decide which way would be the cheapest way to travel to work? Expanding or building new roads would be more expensive and slower then it is now as corporations would not have emanate domain to fall back on if someone won't sell.

Comment Who reads this?? (Score 1) 367

99% of data that is worth accessing is accessed enough to ensure it is in a readable format. As far as the other 1%, it will give our children of the future something to do. Sounds like another stupid excuse for everything to be open and free. Some things are better proprietary and expensive.
Security

Multifunction Printers — The Forgotten Security Risk? 153

eweekhickins writes to share an article in eWeek highlighting the forgotten risks that a multifunction printer could possibly offer. Brendan O'Connor first called attention to the vulnerabilities of these new devices at a Black Hat talk in '06 and warns that these are no longer "dumb" machine sitting in the corner and should be treated with their own respective security strategy. "During his Black Hat presentation in 2006, O'Connor picked apart the security model of a Xerox WorkCentre MFP, showing how the device operated more like a low-end server or workstation than a copier or printer--complete with an AMD processor, 256MB of SDRAM and an 80GB hard drive and running Linux, Apache and PostGreSQL. He showed how the authentication on the device's Web interface can be easily bypassed to launch commands to completely hijack a new Xerox WorkCentre machine."

Slashdot Top Deals

How many NASA managers does it take to screw in a lightbulb? "That's a known problem... don't worry about it."

Working...