Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×
Wireless Networking

Submission + - WPA2 vulnerability found (

Linker3000 writes: NetworkWorld is reporting that a vulnerability has been found in the WPA2 wireless security protocol that could allow man-in-the-middle attacks. The so-called "Hole 196" vulnerability stems from a weakness in one of the keys (the Group Temporal Key, or GTK) used to protect broadcast data because the GTK mechanism cannot detect address spoofing or data forgery.

Submission + - Ask Slashdot: Aircon Control for a Small IT Suite

Linker3000 writes: My main IT office is also the server room for the building, with a small rack of servers and a few stand-alone systems. Most of the time we can keep the room cool enough with natural ventilation and we only switch on the aircon when we close up and leave at night — but sometimes we forget and arrive the next morning to about 26-28 degress of Celcius goodness (about 80F) — nothing too major, but a tad warm nonetheless. The aircon has a timer built into the remote control, but it's very directional and unless we remember to leave it on a desk pointed at the aircon unit it does not work. I was considering a small project involving an IP or USB-based temperature sensor and a learning/programmable IR transmitter that would allow us to switch the aircon on (or off) automatically, or manually if we so wished. There' s no hardwire option for the aircon unit — I've checked the schematics. Having done the required Google search, I have found what looks like suitable kit, ranging from bareboard hobbyist stuff to ridiculously-priced 'professional' server room HVAC controls, so I decided it might be a good idea to open this up to the Slashdot crowd for their real-world wisdom (apart from 'leave the aircon on all the time'). Anyone rigged up anything like this before?

Slashdot Top Deals

As in certain cults it is possible to kill a process if you know its true name. -- Ken Thompson and Dennis M. Ritchie