Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Voice recognition is a headache. (Score 1) 3

A voice recognition system has a hard time to handle dictation if it don't know the context. Is it "beer" or "bear". If you just start dictating then it could be anything and it could take several sentences before the voice recognition system finally knows enough to be able to come up with something coherent.

Personally I also dislike voice recognition systems because they can have a hard time with dialects and local idioms as well within a language.

Submission + - The CVE database almost wasgone. Now 11 months left (theregister.com)

gavron writes: The CVE list contains over 25 years of security vulnerabilities. Stephen J Vaughn-Nichols explains why it's important to ALL countries and ALL ITSEC people. It also almost just went away when rabid DOGGIES tried to cut it.

It also only has 11 months left to live based on funding, so FDJT may try and cripple it again. It helps EVERYONE and only hurts blackhat hackers. Unfortunately nobody in Congress understands anything technical (except for Ron Widen) and they're too busy dismantling their own least favorite part (CDA Sec 230) to worry about this.

Meanwhile the US FBI, UK, and NZ equivs say we should have back doors in encryption.

CVEs are important. This should not be defunded. Call up the office of that idiot in your district and tell their PA that.

Submission + - Hackers can now bypass Linux security thanks to terrifying new Curing rootkit (betanews.com)

BrianFagioli writes: ARMO, the company behind Kubescape, has uncovered what could be one of the biggest blind spots in Linux security today. The company has released a working rootkit called âoeCuringâ that uses io_uring, a feature built into the Linux kernel, to stealthily perform malicious activities without being caught by many of the detection solutions currently on the market.

At the heart of the issue is the heavy reliance on monitoring system calls, which has become the go-to method for many cybersecurity vendors. The problem? Attackers can completely sidestep these monitored calls by leaning on io_uring instead. This clever method could let bad actors quietly make network connections or tamper with files without triggering the usual alarms.

Comment Re: I Have Some Questions (Score 1) 24

I have seen a few stories by AI - seems like they can start in a decent style but then they falls into some incoherent blurb repeating themselves or come up with story parts out of order.

The reason they exist is that those stories only take a few minutes to create and almost every sale will be an immediate profit, even just 10 books. People buying wouldn't necessarily understand that it's an AI generated story.

Slashdot Top Deals

The superior man understands what is right; the inferior man understands what will sell. -- Confucius

Working...