Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment Re:Drill a hole, relieve the pressure? (Score 1) 269

I'm not a vulcanologist but here's what I think. Imagine a balloon and trying to release the pressure by poking a hole. 16MPa with a 1 square meter hole is nearly 18000 tons of force. I would think the hole would tear apart and basically be an eruption. If it didn't tear open, it'd still release all the gasses and the area would have to be evacuated.

Comment Re:Waiting for the hypocrisy to start (Score 2) 397

Scientists do research, policy makers act on it. Is your argument that policymakers should completely ignore science? Panetta is not a scientist, and it appears he's not talking on science but the policy that stems from it.

This is pure political games that Panetta doing giving speeches to environmental groups. But he's also right, it's his job to consider possible threats. DoD plans for things that aren't a certainty all the time. What if China invades Taiwan? What if strait of Hormuz gets blockaded? and a thousand more things that are far less likely then climate change. The pentagon is massive and basically all it does planning for different contigencies.

Comment Re:Wrong approach. (Score 1) 470

I don't want specific media for ebooks. I want an ebook device that accurately displays the printed page.
Where's my A4 300+DPI E-ink tablet that's been promised 'just around the corner' for years now.

Pages are obsolete in a digital world. It would be nearly twice the size of current tablets. It doesn't face technology obstacles, it faces market obstacles. As in, is there a market to buy a product that:

*doesn't fit conveniently in a purse.
*Is no longer one-handed but should be set on desk or propped up.
*Can't display images well (either no color or low color depth). So still can't display PDF/Figures/Charts

The problem isn't e-readers poor rendering of PDF's. The problem is PDF standard has a primary objective of defining exactly how something should be printed. It is not a standard that should be used for anything that isn't meant to be printed out. We need to be using a standard that provides markup that the e-readers decide how best to render.

Comment Re:You'd think... (Score 1) 448

You'd think that they could detect the activity required to build a tunnel.

I'd think it'd be easier to detect the use of tunnel based on it's endpoints. 200 feet isn't far and both ends would need a lot of traffic. With satellites, it wouldn't be a hard algorithm to identify twin hot spots of activity. Also being so short, they could just run a pneumatic tube and have a very tiny tunnel.

Comment Re:PCI standards (Score 1) 434

If you have the salt you can use a rainbow table to figure out the hash.

No you can't. 1-8character alphanumeric SHA1 rainbow table takes up 160GB. Add even 12bit salt and that becomes 640TB. You know what used a 12bit salt, legacy unix systems. Modern salts are effectively immune to rainbow tables. I'd wager the salt has more entropy then most peoples passwords.

I design software that stores password hashes. It uses the same cryptographic hash functions to store passwords (SHA1 probably).

SHA1 is unsuitable for storing passwords, use bcrypt. SHA1 is designed to be a fast algorithm and is vulnerable to moore's law. Fast hashing algorithms are a weakness for password databases because it makes bruteforce cracking faster. A modern laptop can churn out more then 100k sha1 hashes per a second. Bcrypt is designed with a cost parameter that you can tweak how difficult the hash operation is. As computers get faster, you raise the cost and then the next time person logs in you store the more secure hash.

Just because you're writing security software doesn't mean you're doing it right. I refer you to Schneier's Law:
Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can't break.

Comment Re:cyber command (Score 2) 161

If this is the best the most elite hackers our military can muster, then I think my wife should try and apply. She knows how to use Excel pretty well.

In fact that is exactly how military works. They hire mostly people with high school education and train them into career fields. Cyber command started just over a year ago. Apparently you think the military should be able to train up people in 1 year for what takes colleges 4 years to do.

I prefer to think of them as CS college sophomores... they're still thinking about switching majors because "math is hard."

Comment Re:What market does this target? (Score 1) 212

One use would be to store media libraries. It could eliminate the need to decide which dvd's to bring because it could bring them all. Could bundle with a media player and even put an autorun frontend to select show. The kids go to grandmothers and have every movie/tv show they want.

How often do you end up somewhere and decide to watch a movie where it turns into find something on netflix.

Slashdot Top Deals

U X e dUdX, e dX, cosine, secant, tangent, sine, 3.14159...