Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment The security firm provides a competing product (Score 2) 188

It looks like the vulnerability is in a PwC product called ACE, which analyzes SAP security settings.
The flagship product of the security firm that produced the disclosure appears to be "ESNC Security Suite", which from what I could tell appears to be a competing product.

While I definitely support security research and responsible disclosure, it makes me a little uncomfortable that it appears this security firm could have chosen to target and test the PwC software because it is a competitor to software they produce.

Comment Cool but looks too closed/proprietary (Score 5, Insightful) 393

This seems like a cool idea, but are we really going to get the world to start using an algorithm for determining location that appears to be proprietary and closed-source? I was looking to find specifically how it works and as far as I can tell you can only implement this by downloading apps or APIs from what3words, and their closed code will do all the work mapping locations to words and vice-versa.

Why would anyone build any type of important solution or process on top of this and have their hands tied to this one vendor to use it going forward. Its not like you could upgrade or convert to a different process later if your plan was to get people to use this new method for specifying their location.

Comment Some similar, less expensive projects (Score 1) 74

The MiniPwner is a similar device built on a TP Link TL-Wr703N router, so you can build one for under $40. http://www.minipwner.com/

Also Hak5 has had their Wifi Pineapple available for a few years that is similar, however their MarkIV version which should come out really soon I think will trump both the Pwnie Express and the MiniPwner. http://hakshop.myshopify.com/products/wifi-pineapple

Comment Similar project with less hardware hacking (Score 2) 86

I recently started a similar project based on the $23 TPLink TL-WR703N travel router. Without any need for soldering or other "hardware hacking" you can build a battery-operated network drop box running OpenWrt linux.

There is a serial interface on the circuit board for the WR703N but you have to crack the box and do some soldering to connect to it. I've been toying with the idea to do just that to interface it with an arduino/parallax processor or sensors or whatever. I'm also playing with connecting a USB sound card and adding a microphone to record audio in the local range of the box.

Comment Re:True story bro. (Score 2) 948

Probably not the case, but I could see as an interviewer asking this question not to see the interviewee's answer, but to see the interviewee's response to a conflict situation. Its actually a great and creative way to see how they'd react (do they get frustrated/angry, do they take a constructive approach to resolving the conflict, do they just accept it and not push back at all?) Great insight to get about someone during an interview.

Comment Re:Spoken like a true extrovert (Score 2) 475

And How! The reason lunch is mandated is generally so the individual gets a break. For an extroverted person, a break means visiting with others. For an introverted person (introverted in the sense that she gets her energy from being along, and finds being with others draining, not that she is "shy") a break means being left alone to recharge. Pretty insulting for an extrovert to steal away all the introvert's time to recharge because he doesn't understand that the introverts are different than he is. Also pretty sad for his team that he's probably driving off all the introverts and losing the diversity in his team.


Nintendo 3DS Launching On March 27 For $250 120

Sam writes "Nintendo executive Reggie Fil-Aime today revealed US availability and pricing for the Nintendo 3DS at an event in the Nintendo World store in New York City. The 3DS will launch on March 27, 2011 with a retail price of $250 and will be available in two flavors: Aqua Blue and Cosmo Black. There will be roughly 30 games released between the launch day and E3 2011 (June 7 to June 9). These include Super Street Fighter IV 3D Edition, Resident Evil: The Mercenaries 3D, Madden NFL Football, The Sims 3, Pro Evolution Soccer 2011 3D, and LEGO Star Wars III: The Clone Wars. The device will have the same form-factor as the DSi and will be backwards compatible with both DS and DSi games. Users will also be able to download games via an online store, called the eShop. In Europe, the 3DS will launch on March 25, 2011. While Europeans will get the device two days early, pricing is not good news. Nintendo held a second event in Amsterdam today and said that pricing would be left up to retailers. Retailers in the UK are reportedly planning a £229.99 ($367.64) price tag, while other European retailers are going with €249 ($336.00)."

Submission + - Activities to teach privacy awareness?

bongk writes: I am creating an employee training program containing activities dedicated to customer privacy, identity theft and computer security topics. Employees earn entries into a drawing by completing the activities. Some self reported activities would be OK ("My desk is clean of customer information", "I reviewed my free credit report") but I prefer activities I can measure ("Send a secure email using the corporate secure mail system", "Take this quiz to identify legitimate and phishing emails"). What other easy/fun activities could teach or reinforce computer security and customer privacy for end users?

Comment Re:I'm gonna bite on this one like it's serious. (Score 1) 810

Instead of a one-time trip (like they do on the ghost hunter shows), if this is a family home that you could have 24x7 access to I would suggest setting up a DVR surveillance system like ZoneMinder. Find out where people see the most "Ghost" activity, and place various cameras to cover those areas. Then you ask the family members who live there to write down when and where they experience weird activities. Sure, if they saw an apparition the only thing you'll be able to show them is there was no apparition on film. But if they say that things are moved, doors open, etc. You'll have video evidence showing the real cause of the suspicious activity.

Input Devices

Microsoft Kinect With World of Warcraft 80

An anonymous reader writes "Researchers at the University of Southern California Institute for Creative Technologies have developed software that enables control of PC video games using the Microsoft Kinect sensor. Their toolkit, known as the Flexible Action and Articulated Skeleton Toolkit (FAAST), emulates custom-configured keyboard controls triggered by body posture and specific gestures. This video shows a user playing the online game World of Warcraft using the Kinect. Potential applications of this technology include video games for motor rehabilitation after stroke and reducing childhood obesity through healthy gaming."

Comment Better than storing stuff locally (Score 1) 393

Having supported friends and family's home and small business computers for years, I'll go on record saying "in the cloud" is better than storing it locally for most of them.
- I'm pretty confident Google is doing a better job securing their data in the cloud than many home users and small businesses do securing their local PC's from trojans and other malware.
- I'm pretty sure Google is doing more frequent and reliable backups than many home users and small businesses.

Now I would never condone a business putting customer or sensitive company data on Google's cloud without a business contract with Google, and I would have friends and family avoid storing their taxes or other critical personal info in the cloud or on their personal computer, but for documents, pictures, etc. the cloud is probably a much better place for most home users.


1928 Time Traveler Caught On Film? 685

Many of you have submitted a story about Irish filmmaker George Clarke, who claims to have found a person using a cellphone in the "unused footage" section of the DVD The Circus, a Charlie Chaplin movie filmed in 1928. To me the bigger mystery is how someone who appears to be the offspring of Ram-Man and The Penguin got into a movie in the first place, especially if they were talking to a little metal box on set. Watch the video and decide for yourself.

Selling Incandescent Light Bulbs As Heating Devices 557

Csiko writes "The European Union has banned by law trading of incandescent light bulbs due to their bad efficiency/ecology (most of the energy is transformed into heat). A company is now trying to bypass this restriction by offering their incandescent light bulb products as a heating device (article in German) instead of a light device. Still, their 'heat balls' give light as well as heating. So — every law can be bypassed if you have some creativity!"

Comment Re:A regular bank account? (Score 1) 242

From my experience generally credit cards do have a few nuances that make them safer than debit for online purchases.
Both have zero liability for unauthorized purchases.
With some (all?) credit cards you get a satisfaction guarantee for authorized purchases. For example, if you buy a collectible model car online and receive a poor quality, crappy cheap plastic toy, and the company wont do a refund, a credit card likely would refund, while a debit card wouldn"t. Or in another example, if you buy plane tickets and the airline folds before your flight, the CC generally would refund and the debit card would not.

Slashdot Top Deals

1 1 was a race-horse, 2 2 was 1 2. When 1 1 1 1 race, 2 2 1 1 2.