Forgot your password?
typodupeerror

Comment Re:What about "unauthorized producers"? (Score 1) 213

This is an under-appreciated point, especially with regards to HDCP, where the HD alliance is run by a group of content producers who have collaborated to effectively force all content producers to use their system. Consumers won't buy hardware unless it plays existing content, and manufacturers can't make hardware that plays HDCP-protected content unless they meet all of the HDCP requirements, which means no one can't effectively support non-HDCP HD content, which means other HD content producers have to work within that license-encumbered system. It's not a total lock-in, but there are unreasonable negative effects on the consumer in addition to producers, such as the analog sunset, that has made it contractually impossible to fully support some common older formats like component video.

Comment Re:No education or occupation (Score 1) 169

He possess hacking programs, that means he is a terrorist. What kind of 'severe disruptions' did he cause that cost 500,000 USD?

If he disrupted servers used by NASA to provide data to their employees, it could easily reach that. For example, the Planetary Data System servers are the normal point of access for thousands of researchers around the country working with raw data from NASA space probes. Take that off line for a day and you've disrupted quite a lot of work. Similar if you take down a technical data server that suppliers need to access detailed requirements or coordinated design data like CAD models of a system a supplier needs to make a subsystem interface with.

Comment Mahmoud Ahmadinejad is too (Score 1) 188

He actually has a PhD in civil engineering (transportation emphasis) from the Iran University of Science and Technology. I'm not sure if he ever actually worked in the field. His biography lists some administrative positions, then he taught for a while, was appointed a provincial governor, and eventually mayor of Tehran. I shouldn't have been as surprised as I was when I first learned Ahmadinejad was a civil engineer. After all, I know quite a few uncivil civil engineers.

Comment Re:HDR? (Score 1) 287

You're probably the first person I've run into who can describe what's going on in such images well enough to convince me that you understand it. I was going to try to explain it myself until I saw your post. The comparison of local contrast to proper brightness mapping is much more concise than anything I would have come up with.

Comment Presentation versus Research Paper (Score 1) 206

I see nothing dysfunctional about this.

They don't want to release the data they spent the last several years developing a system to collect until they have a chance to study it and write the first papers from it. In the meantime, there's nothing preventing them from talking in general terms about the sorts of things they're finding. Saying there appears to be 400 earth-sized candidates isn't going to allow anyone to beat them to getting credit for analyzing the data.

Comment Spain doesn't get 41% from wind (Score 1) 506

According to the CIA World Factbook, Spain uses about 276 billion kW-hr per year. According to Wikipedia, wind in Spain generated 36 billion kW-hr in 2009, which is growing at around 10% per year.

That's 13%, which although I don't read Spanish competently, I think is what your link says. It's still one of the highest shares of any nation, but definitely not 41%.

I'm sure you got that 41% number from a recent story about during a time of unusually strong winds and the low demand period at night, wind made up 41% of the generation for a couple hours.

Spain can handle this because huge regional overcapacity like the Pacific NW does, they don't have a large fraction generated by dams that are required by the EPA to keep flow rate through the turbines at minimum levels for salmon protection, and around half of their generating capacity is from natural gas, which can quickly adjust output to meet changes in supply or demand.

At the same time, they pay on average about twice what we do in the US, partially because wind and gas are expensive.

Comment Re:Mine was stolen and I got it back, here's how: (Score 1) 765

They were insured. That wasn't the point. The point was the access to the office without damage to get in. The point was finding out who could do this with such ease. The point was tracking this person down not only to further prevent such thefts but also to leverage this info to get better security around labs and high profile offices. All of this is now successful because of what we did.

Also, thankfully as a well-pair scientist and lawyer I know the difference between petty theft and grand theft unlike you. The person now implicated in the theft stands to serve a minimum of 7 years because this isn't his first felony. The others get 18-24 months for possession of stolen goods at a minimum, one other looks like they will get 5+ because of a criminal record that is quite lengthy. People may not like lawyers but they sure as hell love what they can do to get folks out of a pickle.

Comment Re:Mine was stolen and I got it back, here's how: (Score 1) 765

Have to agree AC. With encryption and a good hardware level password, the stolen laptop would be almost useless to the thieves, even making it hard to sell it. The process would become more like/

1) Purchase new replacement from insurance process

2) Restore from a backup and move on!

If you _REALLY_ wanted to see "vigilante" style justice served in the case of such thefts, partition the drive as follows. One partition is a securely encrypted OS that you use. The other is Windows. Set the default to automatically boot Windows and load it up with backdoors, keyloggers, automatic webcam capture to web etc like people have already described.

Petty theft is under $5000 in Ontario. This is grand theft and the problem was more serious as the theft involved absolutely no damage to the premises. Someone had access to a master or sub-master key. Secondly, there is some back-story to the break-in wherein we had a suspect in mind but couldn't prove it (past break-ins, vendetta etc).

Encrypting the hdd was a non-starter because of performance with a VM we must use. That's an internal IT decision not ours. This was a work system and therefore needed to be on the intranet. The filesystem encryption was dramatically slowing down the VM we would use on a daily basis. Truecrypt was used for the sensitive data. We weren't paranoid about data loss. We had plenty of backups as I mentioned (mirrored systems, back-up to the university servers which are themselves backed up regularly).

The key was tracking down the perp and getting some answers. Which we did and this has forced the hand of the university to install cameras outside the major labs (something they resisted), increased security around the master keys. Decreased the number of people who have access to those keys regularly etc. etc.

In the end, it worked out and with not too much effort. The upside is that a whole lot of other people got their computers back, along with some other pricey items stolen from offices, labs and other places off campus.

Comment Mine was stolen and I got it back, here's how: (Score 4, Interesting) 765

I actually just went through this exact situation a week ago. Here's my story and how I was able to get the computer back with the cops' help. My country (Canada) works very similar to most US states so hopefully this will help you.

Our outfit is into tech in a big way. We are all scientists of some sort and up and up on O/S, security and the latest tech gizmos. When my boss wanted to upgrade his systems to dual Macbook Pros, we immediately setup s mirroring system where he could be perpetually synchronized between his office and home with automated backups to the university servers. We had a script I had written to do much of this along with posting an IP address every hour in 24 blocks. We also were using Log Me In so that he could remote control his systems. The server ran on startup and wasn't viewable in the taskbar as my boss hates clutter.

Anyhow, we had two separate systems that were capable of posting IP addresses when online.

Three days after the theft we started getting IP writes in the logs.

The first and major things we both had to do was 1) restrain ourselves from doing absolutely anything to jeopardize the comp from going offline 2) contact the police immediately with the IP information.

Before we contacted the police again, I had determined where the IP was coming from (a home account from a major ISP). We waited another three days, consistently getting the same IP posting. We then went back to the police. Like the OP, they view a computer theft as insignificant given their work load. They saw a wealthy scientist ($500k/year) who had lost out on a $5000 laptop (Macbook Pro 17" with all the fixins) containing $30k of specialized software (and we had the discs of course to reload) a digital project worth $1.5k and a few other smaller items. Even though this was over $5000 (which is like a felony in Canada), they simply weren't able to provide us with much help. They knew what a computer was and even an IP but after that they were deers in headlights. I requested to speak with someone in their cyber-crimes division and I was told that because of the G8 and G20, I was out of luck there.

Not unlike research institutes and universities world-wide, this police department fought for funds internally and also internally, departments would "pay" other departments for work. In this case, because it would be a "special favour," during an immensely chaotic time for our police forces because of the heads of states well, they simply said no to all those requests.

Here is where things got both fun and tricky but I think could work for the OP.

A consistent IP can easily be traced to the ISP. If the IP is consistent over a select period of time, a motion can be filed before a judge and a warrant issued to get the personal information of the person owning said account. I happen to be a trained lawyer, so the detectives were really open to what I was suggesting, and since I also happen to be a computer scientist who does research into security as well as other things, they viewed me as an expert in the field. The first warrant was sought and granted within two days of us suggesting this avenue. This is your first MAJOR task and one that will be the most fruitful.

Legally, I was able to log into the stolen computer without comprising any investigation because I was about to be "contracted" by the police department to do what their cyber-crime division wouldn't do but could: gain network access and collect as much data as possible.

I did this and eventually worked around the router (a joke given the default settings that existed) and then the grey area began where we required another warrant: checking out the other comps on the network. While the search warrant was being issued for this, a SECOND warrant (and really the only other one we needed) was being issued to search the premises the cops received via the ISP. The IP had been consistently posting with the same address over 10 days and staying online for 6-10 hours at a time. I could have taken video of the thief/thieves or recorded their audio, taking pics, whatever the cops wanted, but ultimately the KEY was the personal info from the ISP.

In the end, I was able to gain access to 6 other computers on the network, only one belonged officially to the group of guys and the others were all stolen. The day after they had authorized me to do all that, the same detectives had gone out and busted the punks. A nice little arrest of a medium sized theft/drug ring. The cops were completely unaware about these guys, so they got a nice little kudos to their case cracking quota for the year. Regardless, despite all the fancy leveraging I did to get access to the computers the ONLY really important info was the ISP user account info which again was all the ocnfirmation the cops needed to get a search warrant. The tiny print indicated that the comp had to have been online within 12 hours from the time of issuing to the time of the search. Not a problem if the cops are motivated enough to go through with this. With a warrant in hand, they certainly were.

The guys who were busted in my case weren't necessarily the guys who broke into the office. I'm now doing some forensics on the stolen computer and providing info to the cops which again, I couldn't do without authorization from the department. So our case in ongoing, the guys are now out on bail but the best part is that we have the hardware back and the very trivial method of retrieving the IP and finding the ISP lead to the search and ultimately the arrest. With the extra info I've now gathered, they won't simply be charged with possession but will now be charged with grand theft.

So a quick recap:

1) log the IP addresses over days
2) supply this information to the cops in the nicest way possible
3) request a warrant to confirm via the ISP
4) keep logging the IP!
5) get a search warrant
6) get your kit back

Cellphones

No More OpenMoko Phone 219

TuxMobil writes "Bad news for FreeRunner fans: development of the first Open Source smartphone will be discontinued. (English translation via Google) OpenMoko executive director Sean Moss-Pulz said at OpenExpo in Bern (Switzerland) that the number of staffers will be reduced to be able to stay in business. OpenMoko had high intentions: the offspring from Taiwanese electronic manufacturer First International Computer (FIC) wanted to produce an Open Source smartphone. Not only with Open Source software pre-installed, but with free drivers and open specifications of the hardware components. This would give programmers as well as users complete freedom. Up to now the manufacturer has produced two models, the first has sold 3,000 units and the second one 10,000. Both models were targeted primarily to developers. From the beginning, OpenMoko had to fight with different problems. The smartphones came onto the market after a huge delay. Some phones came with construction defects. Also, changes in the team slowed down the development. Software development for the current smartphone will be continued but with fewer resources, Moss-Pultz said. He still hopes the community will support the FreeRunner."
NASA

Submission + - STS-119 Launches into Space...Finally (thefutureofthings.com)

Iddo Genuth writes: "After several delays, including twice over the past week, the space shuttle Discovery has finally been launched into space. The spacecraft took off at precisely 7:43 p.m. EDT, embarking on the STS-119 mission, which will provide the International Space Station (ISS) with the fourth and final set of solar arrays. The shuttle will also deliver to the ISS its newest crew member — Japan's Aerospace Exploration Agency astronaut Koichi Wakata, who will replace flight engineer Sandra Magnus at the station."

Slashdot Top Deals

Someday somebody has got to decide whether the typewriter is the machine, or the person who operates it.

Working...