Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re: North Korea's ultimate deterrent? (Score 1) 129

North Korea is currently suborbital launch, also it is expensive. The key here is between companies like spacex and satellite miniturisation are getting launch costs down to the point where it would be feasible having lots of low earth orbit satellites rather than a dozen in geosynchronous orbit. LEO comments gives better latency but one needs a lot more as you need multiple in the sky at any time as they are constantly moving relative to the user. Before now such constellations have been the work of large governments or groups of governments in global positioning systems.

Comment Re: /. won't either (Score 4, Interesting) 448

I wonder if anyone has figured just how malicious this actually is, it is insidiously so when we consider this deliberate repeat activations of what is a google search recorded against a users google account and feeds into the advertising interest algorithms for the advertising google's network serves. It is directly going to skew adverts to win win the advert buy auction on an interest score rather than a price per an advert.

Comment Re: commonly used claim? (Score 1) 227

Do you arrest Glock cause someone was murdered with one of the pistols they made? What about Louisville Slugger cause someone was beaten with one of their baseball bats? How about Ford cause one of their cars was used to run someone down? Arresting the creator of a tool because of how it is being misused by others is highly questionable in any circumstance. I think most of the civilised world would agree that the responsibility for the use of such a tool in all the listed cases is on the person who used it to commit a crime, not one the person who created the tool, why should a software tool be considered any different?

Comment Re: Hey Apple... (Score 5, Insightful) 199

They are saying you could replace it with one that records the data from the sensor and then replays it later at the attackers whim. Making and using a jelly finger is a much better, easier, cheaper and more covert attack vector and so you are correct that the excuse is bull for the real reason of stopping people replacing commonly failing parts in their electronic devices without paying the corporate overlords their cut.

Comment Re:Um, No... (Score 1) 23

No, they don't they have jurisdiction to one square mile of the walled City Of London, which is controlled by the City of London Corporation which almost has complete control over that square mile and has it's hands so deep in the economy that the Palace of Westminster has little choice but to bow to their wishes as long as they remain within some sort of reason. That said, this "policing" is far overstepping their jurisdiction of their quasi-police force of that 1 square mile.

Comment Re: They really don't understand. (Score 5, Insightful) 366

A programming language is a language, it has its own syntax, grammar and vocabulary, though linguistic studies into such languages are rare (there are a couple of linguists studying the field though).

Yes I would agree basic foundation is very important, so why the fuck are we not teaching decision and discrete mathematics. It is the relevant mathematics field to study but is an optional in most curriculums pre university and so not taught by most schools.

Comment Re: patching without source code (Score 3, Informative) 39

So you have never changed a value in some binary to skip a routine or something? It is relatively easy to change a conditional jump to an unconditional jump or noop if you know a little reverse engineering, crackers used to do such things all the time to bypass things like disk checks.

Comment Re:Why not blame the manufacturer? (Score 1) 264

Marginal extra cost, want to look up the difference in price between a Intel Core i7 extreme edition on an X99 board and the equivalent Intel Xeon where the difference between the processors is the ECC memory controller. There are a few low end mobile and embedded processors Intel do with ECC, but majority of their consumer range deliberately do not have it, it is a Xeon "feature" and the price tag that has.

Comment Re: "Of course it can," says government (Score 1) 264

Accept what are being talked about here is not low frequency radiation but extremely higher frequency radiation, wavelengths smaller than gaps between atoms that are only stopped on that direct hit which if it happens to just the right atom on that added circuit or whatever. Now the are extraordinarily rare events it the probability of any single ray is calculated but are being constantly but by these rays all day every day making the probability of causing an issue somewhere on the plant quite high. There are some solutions though, ECC ram for example means individual but flips can be fixed and is what is used in most server systems however support on consumer level gear is non existent. If that isn't enough run systems in triplicate on the separate machines then run a vote on the result only one machine is likely to have had a bit flip during that specific operation.

Comment Re: ECC (Score 2) 264

We are already there:

As the IBM article states they are working with Samsung and Global Foundries while the other article is about Intel that is 3 of the major chip fab companies stating they are moving to silicon-germanium hybrid crystal over pure silicon for exactly this reason. Also the fabs on a new process node take time to setup and they need to be ready before circuit design comes in to fab prototype batches so they are usually a couple of years ahead of what is commercially available on the market.

Comment Re:the real reason theyre arguing it. (Score 1) 310

Rarely is the issue a BGA package, usually it's a capacitor or soic package which can be replaced by hand even if it's not the easiest component to replace. A multimeter is still the most useful diagnostic tool especially when the most common component, a VRM or capacitor in the power supply has gone, knowing what the potential difference should be across various points of the board helps in identifying such issues. Memory test failure and similar software errors could literally be that the memory didn't get enough power cause part of the power supply has gone dead.

Some vendors are really nasty and rub the id codes off or re-badge(own brand and id instead) on what is otherwise off the shelf components making it even more of a nightmare to tell what is wrong.

Comment Re: Slackware..... (Score 2) 145

Yeah, not to mention. Ubuntu users are more likely to be on ask Ubuntu. Mint also had it's own forums. This is personal choice not server administration so redhat and centos are out...
The real question is how many prefer slackware for their personal desktop but use something else most of the time for some work reason or something.

Comment Re: You cannot sign with MD5, you hash with MD5. (Score 1) 55

Part of the RSA signature algorithm is signing a hash of the content you want to sign. They are changing that hashing algorithm.

The funny thing is sha-1 is nolonger fit for this purpose and so Mozilla is requiring sha-2 in all HTTPS certificates from next week (after a major push by all the browser creators for CAs to use sha-256 for the last couple of years), so yeah, Oracle and Java is way behind the times and that is before we get to those that won't update.

Slashdot Top Deals

"There is no statute of limitations on stupidity." -- Randomly produced by a computer program called Markov3.