Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Velcro! (Score 5, Interesting) 374

I found a solution which I'm pretty happy about.

Take a good piece of double-sided velcro (that will bond to itself), about 10-20cm. Get a short, screw with a large, flat head. Put the screw through the middle of the velcro strip, and screw it onto the underside of your table, somewhere out of sight. Rinse, repeat.

Now you have velcro loops that can carry all your wires really neatly, with infinite and easy reconfigurability.

(Initially, I tried gluing / velcroing the velcro strips on. It never lasted, so I went with screws instead. That really works!)


Submission + - How Child Porn is Distributed ( 1

thomasdn writes: "In this truly fascinating story, "Mr. X" — who has been working for 10 years inside the international child porn industry — gives us technical details about the architecture of the systems and the methods used for distributing child pornography. Mr. X writes: 'Each one who has little technical knowledge will [understand] the importance and implications of this... But what I have to report to you is much more significant than this, and maybe they will finally understand to what extent the public is cheated by the greedy politicians who CANNOT DO ANYTHING against child pornography but use it as a means to justify total monitoring.'"
Hardware Hacking

Submission + - iPhone toolkit sends data through audio jack (

Alex Winston writes: "Alex Winston Ltd has developed two unique offerings that open the iPhone and iPod touch to unique possibilities. The uRemote offering is an IR antenna that plugs into the audio jack to transmit peripheral control codes through a universal remote iPhone application. The iData offering is a development kit that allows arbitrary data to be sent through the audio jack of 2nd generation iPhone and iPod to potentially control 3rd party devices or integrate with external systems. The next release of iData will offer the ability to receive data through the audio jack mic for use in iPhone or iPod Touch applications. Neither product requires a jail-broken phone and the development kits use published software libraries."

Submission + - Password cracked for secret NATO document (

thomasdn writes: "The encryption password for a secret document relating to the war in Afghanistan has been cracked. The password is revealed on the Wikileaks website. 'NATO in Afghanistan: Master Narrative' is the title of the secret document that instructs NATO representatives on which 'story' to give journalists — and which story to avoid giving. The document could be found in encrypted form on the Pentagon Central Command (CENTCOM) website. However, it seems that the entire site has been taken offline in response to the revelation of the password. Parts of the site can still be seen in Google's cache."

Comment Re:ANSI C (Score 4, Insightful) 146

Because you can't compile a mathematical definition.

If we imagine that the hash function came only as a mathematical definition, how would your test your new implementation in LangOfTheWeek is correct?

Well, you have 2 options. One, you can prove that your program behaves, in every important way, the same as the definition. This is long, tedious work, and most programmers don't even have the necessary skills for this. Two, you can make a reference implemention in some other language, and compare the outputs.

Now, given, say, 100 programmers each working on their own functions, we should have 1 resulting behaviour. This will mean that everybody implemented the algorithm 100% correctly. However, the actual number will be between 1 and 100, depending on the skills of the programmers, and the care they've taken in implementing the functions.

Now, what's the result here? (no pun intended). It's likely to be chaos.

That's why it's very convenient to have a single reference source.


Submission + - Robbers steal $6.3 million in Denmark Heist (

thomasdn writes: "Armed robbers got away with 30 millions Danish crowns (USD 6.3 million or 4 million) in a big heist against the Loomis security company.

Masked robbers armed with automatic weapons stole about 30 million kroner (4 million; US$6.3 million) Tuesday from a cash depot in suburban Copenhagen and left explosives in their wake to avoid pursuit, police said.
This story has been covered several places."


HP Skin Patch May Replace Needles 190

Iddo Genuth writes "HP and Crospon have developed a skin patch employing microneedles that barely penetrate the skin. The microneedles can replace conventional injections and deliver drugs through the skin without causing any pain. The skin patch technology also enables delivery of several drugs by one patch and the control of dosage and of administration time for each drug. It has the potential to be safer and more efficient than injections."
The Courts

RIAA Drops Suit Against Santangelo 190

VE3OGG writes "The RIAA, in an expected motion, has recently dismissed the case against Patti Santangelo, one of the most famous targets of the RIAA lawsuits. The mother of five was described by the judge presiding as an 'internet-illiterate parent, who does not know Kazaa from kazoo.' While this is good news, the RIAA is still pursuing its case against two of Mrs. Santangelo's children. To make matters worse, the RIAA has also dismissed the case 'without prejudice', meaning that they could, in theory, take action against her again later on. The RIAA alleges that Santangelo's children downloaded and subsequently distributed more than 1,000 songs. The damages they seek are presently unknown"

Slashdot Top Deals

Prototype designs always work. -- Don Vonada