Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Similar to the unpopular Answer (Score 1) 199

I've been looking for something exactly like that, but for my Windows Vista notebook, that way, I can use my notebook mics and speakers as a hands free phone. HFP for Linux would be great, but not being much of a Microsoft code monkey, I doubt I could get it to work.

Patrick (thpdg (519053)), any ideas if the software for those dongles would work with the "HP Integrated Module with Bluetooth 2.0 Wireless Technology" in my notebook?



Comment Wormhole? (Score 2, Insightful) 361

This sounds somewhat like the way the "Stargate" works in Stargate SG-1 and Atlantis, the main difference is this is a bubble rather than a tube between locations that are generating the "extremely large amounts of energy". We just need to find a few Zero Point Modules. Problem solved!

Comment AF Standard Desktop Configuration (Score 5, Interesting) 507

While this was an interesting article, the XP and the Vista versions used by the USAF are the same ones used by the general public. The only differences are the security setting, the firewall configuration, and the user configuration. No one is an admin unless they need to be, and no normal day-to-day work is done in admin mode (same thing you do in Linux, no doubt).

I didn't know this article was going to be published, but when I found it, I was not surprised by the comments. I've been working on this program for more than 2 years. Users hate it. Developers loathe it. Network security staff loves it.

Nothing can make Windows (or any other OS) completely secure if it's connected to a network. This is as close as the federal government as ever come.

Comment Re:Cyber Security is a job for the Airforce (Score 1) 90

OK, while I agree that cyber- anything has been over used, the Air Force has already stepped forward ahead of the other services to stand up a "Cyber Command". However, USSRATCOM has Cyber warfare and defense in its mission statement. A joint task force is the most likely form of any cyber-related activity, either offensive or defensive. The big problem is, how can you defend against something when it's already inside your walls? The Pentagon's networks have been infiltrated more times than I can count with bare feet and my pants down (more than 21). Not to mention DOE computers. All networks are vulnerable if they are connected to the Internet. No one service can do the entire job.

Comment Technology Lag (Score 1) 576

I know from experience that, in the USAF at least, there is a technology lag WRT power savings. Too many old computers that won't wake-on-LAN, too many older servers that won't support Microsoft's SCCM (the new flavor of SMS). We are constantly dealing with computers not getting updated because they were powered off, making them more vulnerable than other computers on the network. And if PCs are put in "sleep" mode and will WOL, if the server isn't running SCCM, you can't send the WOL to wake them up before pushing patches.

It all comes down to this: you need to spend money to save money. The federal government mandated that all agencies use less energy, but they're all spending more than the savings to get there.

I think I missed something somewhere.


Submission + - Becoming "The Man"?

PapaSmurph writes: I've been working for "The Man" now for about 25 years in the IT field. I keep feeling it's time to strike off on my own and start my computer and network installation and maintenance business. I want to make a difference in my community and I want to make a decent living for my family. I know I would have to compete with the "big box" retailers out there like Best Buy's Geek Squad. I was wondering if anyone out there in /. land has made the move and had any suggestions for me.

Submission + - Google Reader out of the labs

PapaSmurph writes: Looks like Google has released Reader from the labs. Not that this is really big news, because Google has a way of waiting until everything has been over tested before being released.

XPS Notebook Torn-Apart and Overclocked 24

Pelly writes "For those who are interested in seeing the inner-workings of Dell's latest XPS M1710 flagship notebook, Hot Hardware has taken the time to rip the system apart and photograph the hardware for your viewing pleasure. In addition, there's some amusing overclocking attempts which utilize the sub-zero temperatures of New Hampshire's winter weather to provide an interesting spin on the review."
Wireless Networking

Submission + - People with WiFi surf more

MC Gates writes: A new study from the Pwer Internet & American Life Project shows that people who have WiFi at home spend more time online than those without. 'A survey of 798 Internet users found that 72 percent of wireless users check e-mail at least once a day, while only 63 percent of wired broadband users do so. The same pattern held true for reading news online, suggesting that wireless access offers "relentless connectivity" that might change a person's online behavior.' WiFi users also tend to be younger than the general 'net-using population, as they are concentrated between 18 and 49 years of age, instead of 30 to 64 like the general surfing public.

Submission + - Adobe Inviting Bloggers to Engage

An anonymous reader writes: Adobe is inviting a group of high profile bloggers and analysts to their campus in order to show off some of their customer's work. Companies like Brightcove, Scrybe, yourminis and some of Adobe's own projects will be demoed at the event. It's the best of the best using Adobe's technology. Ryan Stewart has a few things to look for the bloggers to talk about after seeing the demonstrations.

Submission + - Tor Open to Attack

An anonymous reader writes: A group of researchers have written a paper that lays out an attacks against Tor, in enough detail to cause Roger Dingledine a fair amount of heartburn. The essential attacks are: Tor doesn't verify claims of uptime or bandwidth, allowing an attacker to advertise more than it need deliver, and thus draw traffic. If the attacker controls the entry and exit node and has decent clocks, then the attacker can link these together and trace someone through the network. Yowza!

Slashdot Top Deals

Optimism is the content of small men in high places. -- F. Scott Fitzgerald, "The Crack Up"