Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Submission + - $12.9B aircraft carrier 'struggles with jets taking off and landing' (

schwit1 writes: The USS Gerald R. Ford, is not ready for combat, DOD says. The 'supercarrier' is the most expensive Navy warship ever built and is due to be commissioned this year. The ship delivery is scheduled for November, more than two years late of its original date of September 2014. A government memo says 'poor or unknown reliability issues' are behind the latest roll out problems with the ship.

There are two other ships in the Ford class: the USS John F. Kennedy and a new USS Enterprise — expected to be commissioned in 2020 and 2025 respectively. The total cost for the three vessels is estimated to be more than $43 billion.

Comment Re:Where did the money come from? (Score 1) 157

It's really really simple.

Money laundering is the crime of hiding where the money came from.

Now, all the regulations may be screwed about it are screwed up and complicated. But the crime itself is simple.

Just because regulations about a crime are poorly written does not mean the crime is poorly defined.

Submission + - Can Iris-Scanning ID Systems Tell the Difference Between a Live and Dead Eye? (

the_newsbeagle writes: Iris scanning is increasingly being used for biometric identification because it’s fast, accurate, and relies on a body part that's protected and doesn’t change over time. You may have seen such systems at a border crossing recently or at a high-security facility, and the Indian government is currently collecting iris scans from all its 1.2 billion citizens to enroll them in a national ID system. But such scanners can sometimes be spoofed by a high-quality paper printout or an image stuck on a contact lens.

Now, new research has shown that post-mortem eyes can be used for biometric identification for hours or days after death, despite the decay that occurs. This means an eye could theoretically be plucked from someone's head and presented to an iris scanner.

The same researcher who conducted that post-mortem study is also looking for solutions, and is working on iris scanners that can detect the "liveness" of an eye. His best method so far relies on the unique way each person's pupil responds to a flash of light, although he notes some problems with this approach.

Comment Re:How? (Score 1) 334

Have you not seen "Not for Resale" on items before?

Generally you can't stop individuals from reselling used items, but you can refuse to sell in bulk, insisting on only selling things in lots of 5 or fewer. Effectively this makes large scale resale operations impossible.

Or you can set it up so that you sell in large lots only via contracts that specify not for resale less than a set price. This means you can sue if someone sets up a large scale resale operation.

Often these techniques are used to grant people exclusivity in a region - you throw in a contract paragraph that says you can only sell in a specific region and no one else can.

Comment Re:Someone Please Explain The Glitch (Score 1) 80

Ah. I see. Your mistake is simple. You confused what your phone does and what Pokémon GO does.

Pokémon Go software uses actual, real GPS, not merely the location services. Basically it puts a fake picture of a fake pokemon at a location, as if it was invisible to the human eye, but visible to the phone camera.

It can't do that unless it knows precisely where you are. The general location from cell towers is not good enough to keep the fake picture in the same real location.

Comment Re:Someone Please Explain The Glitch (Score 1) 80

Your phone did NOT use GPS location. Instead it used CELL TOWER location. GPS stands for Global Positioning System, and uses US military satellites. The exact same satellites the US uses to target missiles.

Your phone never communicated with the GPS satellites that orbit the planet. Instead it communicated with cell towers on the ground.

That is why the network location appeared 'much less precise' and "bounces around a lot'.

And yes, wifi location

Comment Re:Someone Please Explain The Glitch (Score 5, Informative) 80

Certain areas, such as the entire country of South Korea, are legally forbidden from using GPS style location determination. They are afraid an invading army/missile will use it for targeting.

They put a lock on such services based on geography.

But the lock is not perfect, it uses a grid to determine which areas are GPS allowable and which are not.

The grid is supposed to exclude all of South Korea, but a small town happens to be just outside of their grid. So GPS devices work there.

Pokemon Go requires access to your GPS as part of the game (or rather, they designed the game to need access to your GPS so they can get your geolocation for advertising purposes).

As such, you can't play Pokemon Go in South Korea, EXCEPT in that one small village.

Comment John Deere is evil. (Score 4, Interesting) 636

They are trying to subvert the foundations of capitalism - ownership.

They are abusing the DMCA - a badly designed law that was created to stop IP theft but has instead become a weapon of fraud to trick people into paying ownership prices for what in reality is merely renting.

It's like if you go to buy a house and you pay $800k, up front, expecting to be able to get a mortgage, leave the place to your kids, and sell it if you have to, only to be told later that you merely rented the place for your life time.

Fraud is fraud - whether it is done by outright lies, or instead by hidden fine print in contracts, that no one but lawyer reads

Submission + - Ransomware Wreaks Havoc in the Cloud (

rye writes: Today, researchers at LMG Security released a video of the "Jigsaw" ransomware spreading across the "HackMe, Inc." corporate network in their "Play Lab," starting with the very first click on a phishing email, all the way to the encryption of HackMe, Inc's cloud repository. Watch as the ransomware spreads to the company's networked file share and OneDrive cloud repository. A perfectly creepy "Billy the Puppet" head pops up as the ransom note is printed in green letters across the desktop.

Want your colleagues or management to understand the true potential damage of ransomware? Just show them this video. Then, unplug your network cable, crawl under your desk and hide.

"What does it actually LOOK like when ransomware encrypts all the files on an employee workstation and then moves on to encrypt your company’s file share, and even cloud-based documents?"

Comment Should be worried about gunfire (Score 2, Insightful) 96

Cripes, it's an open carry state, with an open carry believers, for a candidate that encouraged his followers to beat up protestors.

If some one doesn't take a shot at them, then they will take a shot at the protestors.

I would offer odds, 2:1 that someone attending the convention or a protesting against the convention will end up trying to shoot someone

Comment How much to do this legally? (Score 4, Interesting) 37

As in, I would love to get a phone number that is 'premium' and then give it out to every website that keeps asking for a phone number.

Slime keep trying to steal my privacy in exchange for nothing. They abuse the phone number and have no business asking for it. If they want my phone so badly, then PAY every time you call me. After all, I never want you to call me, so why shouldn't you pay to talk to me?

Slashdot Top Deals

I program, therefore I am.