Follow Slashdot stories on Twitter


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment This is an attack, not a leech (Score 5, Informative) 884

First of all, just to be clear: this isn't leaching, this is someone doing something nefarious. If they just wanted free bandwidth, they would never set up an evil twin network. Most of the replies on this thread are bad advice assuming it's a leech. The person responsible might be nearby, but probably not; if you track down the computer that's responsible, you're likely to find that its owner doesn't know what's going on and it's been taken over by an anonymous attacker over the Internet. Or you'll find a PwnPlug.

The first thing you need to do is notify the police that you're being targeted by hacking. This is important; if your computer/network is taken over and used for something illegal, which is likely to happen, this will protect you. Second: you need to notify your employer, as well as anyone whose confidential data you're in possession of. And third: you need to harden your computer security, and figure out why you might have been targeted.

Comment They said no such thing! (Score 1) 105

This lipid could serve as a way to diagnose people who are at risk of developing neurological disorders after a blast, the scientists say.

No, the paper doesn't say that. I checked. It's also not true; this can't be used for diagnosis (except maybe post-mortem), because it's on the wrong side of the skull.

Comment Based on misunderstanding how transactions work (Score 1) 438

This paper is based on a misunderstanding of how Bitcoin transactions work. If I receive 10BTC, then send 7BTC to someone using the usual software, then 7BTC will go to them and the other 3 will be sent as "change" to a newly-created Bitcoin address that's added to my wallet. It's also common practice for websites that accept Bitcoins as deposits or payment to generate a new address for every customer to send coins to, so that when they send coins they can tell who sent them using the destination address alone. The authors of the study don't seem to know this, so they completely misinterpret the patterns they're finding in the blockchain. If everyone followed the suggested practices of generating a new address for every incoming transaction, then every address would be either empty, or have never had an outgoing transaction.

And speaking of websites that accept Bitcoins as deposits, the recommended security practice is to divide coins into a "hot wallet", kept on the server and used for day-to-day transactions, and a "cold wallet" that's kept off-line for security. A cold wallet should almost never be involved in transactions - but it backs peoples' deposits which are used in transactions, so it's not like it's out of circulation.

Comment Not actually approved (Score 5, Insightful) 386

From the article:

"Ngoc Sinh has been certified as safe by Geneva-based food auditor SGS SA, says Nguyen Trung Thanh, the company’s general director."
"SGS spokeswoman Jennifer Buckley says her company has no record of auditing Ngoc Sinh."

In other words, the article claims that Ngoc Sinh Seafoods Trading & Processing Export Enterprise is using repulsive and unsafe practices, and lying about having been inspected. Bloomberg is accusing them of a crime. The Slashdot headline, on the other hand, converted this into "Approved for Consumers" - accusing a different group, the regulators, which appear to be innocent.

Comment Because ordinary errors don't lead to retractions (Score 4, Informative) 123

You might be tempted to think that this means ordinary errors aren't as common as we thought. Lots of papers - actually most papers, at least in medicine - are wrong for reasons like the author being confused, doing the statistics wrong, or using a type of experiment that can't support the conclusions drawn. But merely publishing a paper that's bullshit? That usually isn't enough to trigger a retraction, because retracting papers looks bad for the journals. Only an accusation of Serious Willful Misconduct can reliably force a retraction.

Comment Center For Applied Rationality (Score 3, Interesting) 263

Consider giving it to the Center For Applied Rationality. Their goal is to make people more rational, by teaching about cognitive biases and scientific decision making, and studying how to do so effectively. They're doing great things, on relatively little resources; your marginal dollars would go a long way.


Submission + - Textcelerator: A speed reader for the Web 2

Jimmy_B writes: "Textcelerator extracts the text from web pages, and displays it in a cool way that makes you read it faster. Because it's written in Javascript, Textcelerator can either be embedded in a site, as a "Speed Read This" button, or installed as a browser plugin, which makes it work everywhere. Could this be the solution to information overload?"

Hulu To Require Viewers To Have Cable Subscriptions 648

The NY Post reports that Hulu, the video streaming service with over 30 million users, has plans to force those users to prove they have a subscription to cable or satellite TV if they want to keep watching. Quoting: "The move toward authentication is fueled by cable companies and networks looking to protect and profit from their content. The effort comes as entertainment companies continue to face drastic shifts in home viewing habits. Overall spending on home entertainment edged up 2.5 percent to $4.45 billion in the first quarter as a surge in digital streaming — which rose more than fivefold to $549 million — offset a continuing collapse in video rentals, according to Digital Entertainment Group. ... Hulu racked up some $420 million in ad revenue last year and is expected to do well in this year’s ad negotiations. But the move toward authentication, which could take years to complete, will make cable companies happy because it could slow cord-cutting by making cable subscribing more attractive."

Comment It's a sunk cost (Score 5, Insightful) 119

If Google had won a wireless spectrum auction (they didn't), then Google Voice could've been the core of Google's competition with the telco network. Pieces of it are probably still useful for Android, and it could give them negotiating leverage with carriers. So it could've been really important, but didn't turn out that way. The thing with software products, though, is that almost all of the cost is in the initial creation; once created, they cost very little to keep around. So Google keeps Voice running, because it costs them little and turning it off would be very disruptive.

Comment Re:Solution to wrong problem (Score 1) 58

The problem has never been knowing whether a worker is tired or the degree. Workers are well aware of how tired they are. The problem is jobs that pretty much require them to keep working anyway.

Workers may know that they're tired, but they can't easily prove it, and they can hide it if they don't want to lose pay. If someone goes to their boss and says they're too tired to work safely, they're likely to be ignored, and told to keep working. But if there's an impartially generated number that says they're too tired to work safely, that can't be ignored - because if a supervisor ignored that, and there was an accident, it would be easy to prove they were at fault.

Comment Re:I don't see why this is such a big deal (Score 1) 301

You're partially missing the point ;)
On the one hand, of course, TI is actively trying to block arbitrary native code execution on the platform - and failing at it.
But on the other hand, Lua programming is about using something that TI themselves (silently) put into the OS. And TI broke what we had been using so far, documents made of compressed+encrypted part copied from TI's own documents and a part merely compressed. We're back to a situation where only TI can _easily_ generate Lua documents that OS 3.0.2 understands... until the encryption of all document parts is documented and replicated by third parties...

Comment Re:More tolerent of human error (Score 1) 510

Also who is liable in a fatal accident caused by a machine?

The insurance company that owns the policy for the vehicle, same as if it were being driven by a human. And while the general public may have a hard time reconciling statistics that say driverless cars are safer with a few stories about them getting into fatal accidents, insurance companies do not have that problem and will support whichever costs them less money in claims.

Slashdot Top Deals

"Gotcha, you snot-necked weenies!" -- Post Bros. Comics