Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Similar to the unpopular Answer (Score 1) 199

I've been looking for something exactly like that, but for my Windows Vista notebook, that way, I can use my notebook mics and speakers as a hands free phone. HFP for Linux would be great, but not being much of a Microsoft code monkey, I doubt I could get it to work.

Patrick (thpdg (519053)), any ideas if the software for those dongles would work with the "HP Integrated Module with Bluetooth 2.0 Wireless Technology" in my notebook?

Anyone?

Anyone?

Comment Wormhole? (Score 2, Insightful) 361

This sounds somewhat like the way the "Stargate" works in Stargate SG-1 and Atlantis, the main difference is this is a bubble rather than a tube between locations that are generating the "extremely large amounts of energy". We just need to find a few Zero Point Modules. Problem solved!

Comment AF Standard Desktop Configuration (Score 5, Interesting) 507

While this was an interesting article, the XP and the Vista versions used by the USAF are the same ones used by the general public. The only differences are the security setting, the firewall configuration, and the user configuration. No one is an admin unless they need to be, and no normal day-to-day work is done in admin mode (same thing you do in Linux, no doubt).

I didn't know this article was going to be published, but when I found it, I was not surprised by the comments. I've been working on this program for more than 2 years. Users hate it. Developers loathe it. Network security staff loves it.

Nothing can make Windows (or any other OS) completely secure if it's connected to a network. This is as close as the federal government as ever come.

Comment Re:Cyber Security is a job for the Airforce (Score 1) 90

OK, while I agree that cyber- anything has been over used, the Air Force has already stepped forward ahead of the other services to stand up a "Cyber Command". However, USSRATCOM has Cyber warfare and defense in its mission statement. A joint task force is the most likely form of any cyber-related activity, either offensive or defensive. The big problem is, how can you defend against something when it's already inside your walls? The Pentagon's networks have been infiltrated more times than I can count with bare feet and my pants down (more than 21). Not to mention DOE computers. All networks are vulnerable if they are connected to the Internet. No one service can do the entire job.

Comment Technology Lag (Score 1) 576

I know from experience that, in the USAF at least, there is a technology lag WRT power savings. Too many old computers that won't wake-on-LAN, too many older servers that won't support Microsoft's SCCM (the new flavor of SMS). We are constantly dealing with computers not getting updated because they were powered off, making them more vulnerable than other computers on the network. And if PCs are put in "sleep" mode and will WOL, if the server isn't running SCCM, you can't send the WOL to wake them up before pushing patches.

It all comes down to this: you need to spend money to save money. The federal government mandated that all agencies use less energy, but they're all spending more than the savings to get there.

I think I missed something somewhere.

Graphics

XPS Notebook Torn-Apart and Overclocked 24

Pelly writes "For those who are interested in seeing the inner-workings of Dell's latest XPS M1710 flagship notebook, Hot Hardware has taken the time to rip the system apart and photograph the hardware for your viewing pleasure. In addition, there's some amusing overclocking attempts which utilize the sub-zero temperatures of New Hampshire's winter weather to provide an interesting spin on the review."
Security

Submission + - Tor Open to Attack

An anonymous reader writes: A group of researchers have written a paper that lays out an attacks against Tor, in enough detail to cause Roger Dingledine a fair amount of heartburn. The essential attacks are: Tor doesn't verify claims of uptime or bandwidth, allowing an attacker to advertise more than it need deliver, and thus draw traffic. If the attacker controls the entry and exit node and has decent clocks, then the attacker can link these together and trace someone through the network. Yowza!

Slashdot Top Deals

The best things in life go on sale sooner or later.

Working...