Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment Not Surprising (Score 1) 61

It shouldn't be that surprising. The Falcon 9 and Space Shuttle were two very different beasts and have different flight patterns. The Space Shuttle had additional thrust during the first part with the two solid-fuel boosters vs the Falcon 9 with no boosters, just 9 engines. Also the Dragon had some dampening between it and the Falcon while the Shuttle had no dampening, it's three engines effectively was the first and second stage rockets.

As for the second stage, the Falcon second stage has one of the same Merlin engines as first stage, just with a larger nozzle to improve thrust in a vacuum. Unlike the Shuttle or the upcoming Centaur second stage, the Merlin has more thrust but isn't as efficient. Much of this is due to it using RP-1 (highly refined kerosene) instead of liquid hydrogen, which the Centaur second stage will use and the Shuttle used the entire time. The Falcon second stage is going to be more powerful but be done quicker, which keeps it running fast and hot all the way to orbit.

Docking should be smoother. It's entirely automated, which lets it get exactly the momentum needed to dock without any extra which would cause the jolt. I expect all automated docking will be almost equally as smooth as Dragon's.

Comment Oh Noes! (Score 1) 214

Now grandma can't get her copy of a 3D printed gun! How will she ever make that one-shot pistol she's always wanted? Seriously though, Facebook is losing relevance and traffic by the day and parading stuff like this around isn't going to help them. Nobody was going to Facebook to find links to 3D weapons blueprints before, and they still won't now. Short your Facebook stock now while they're still swirling in the toilet.

Comment GTFO Rust (Score 2) 304

Rust can go and, well, rust. If you want to get safer C, than add Cyclone support to gcc and use that. No rewrites, no learning a new language, no hitching your project to a SJW converged organization that is slowly dying, no fanboys who pathetically spam puff pieces on Slashdot... Seriously, Cyclone or any of the other safe-C alternatives are better and less intrusive than a Rust rewrite.

Submission + - SSD Drives Vulnerable to Rowhammer-like Attacks That Corrupt User Data (bleepingcomputer.com)

An anonymous reader writes: NAND flash memory chips, the building blocks of solid-state drives (SSDs), include what could be called "programming vulnerabilities" that can be exploited to alter stored data or shorten the SSD's lifespan. According to research published earlier this year, the programming logic powering of MLC NAND flash memory chips (the tech used for the latest generation of SSDs), is vulnerable to at least two types of attacks.

The first is called "program interference," and takes place when an attacker manages to write data with a certain pattern to a target's SSD. Writing this data repeatedly and at high speeds causes errors in the SSD, which then corrupts data stored on nearby cells. This attack is similar to the infamous Rowhammer attack on RAM chips.

The second attack is called "read disturb" and in this scenario, an attacker's exploit code causes the SSD to perform a large number of read operations in a very short time, which causes a phenomenon of "read disturb errors," that alters the SSD ability to read data from nearby cells, even long time after the attack stops.

Submission + - Things That Scare the Bejeezus Out of Programmers (itworld.com) 1

itwbennett writes: Software developers are, by and large, a cool and analytical bunch, but there are a handful of things that strike terror in their hearts. ITworld's Phil Johnson scoured developer forums looking for an answer to the question: What’s your biggest fear as a programmer? The answers clustered into 5 broad groups ranging from being forced to learn or use a specific technology to working for and with incompetents.

Comment Re:Improved Customer Experience (Score 1) 287

If they know to whom you're talking, or what pictures you're taking, or what documents you're reading or writing, or where you are at any given moment

Well, I'll be sure to give them something to look at. Since this is plain HTTP, technically I can send them anything if I know the right URLs. So they'll see me talking to the presidents of various countries (some friendly, some not), taking pictures of goatse, reading leaked classified documents, visiting motorolasucks.com, and visiting various locations around the north and south poles, North Korea, and Motorola HQ.

Mix in enough chaff and it's harder to separate the real data. Too bad the article doesn't list the URLs, since I'm never in hell going to buy a Motorola phone.

Submission + - Ubisoft hacked, account data compromised

Freshly Exhumed writes: Over at ubi.com today is this creepy revelation from the video game publisher and developer: 'We recently found that one of our Web sites was exploited to gain unauthorized access to some of our online systems. We instantly took steps to close off this access, to begin a thorough investigation with relevant authorities, internal and external security experts, and to start restoring the integrity of any compromised systems.

During this process, we learned that data were illegally accessed from our account database, including user names, email addresses and encrypted passwords. No personal payment information is stored with Ubisoft, meaning your debit/credit card information was safe from this intrusion.

As a result, we are recommending you to change your password by clicking this link.'

Comment Re:Key theft != cracking encryption (Score 1) 268

If Windows notifies programs about suspends/shutdowns (not sure it really does), TrueCrypt needs to dismount immediately and do whatever it needs to do to protect its key.

It does. Just make sure the options "Dismount all when: Entering power saving mode" and "Wipe cached passwords on auto-dismount" are checked in the TrueCrypt settings (Settings -> Preferences) and you should be good. This will automatically dismount all TrueCrypt drives and wipe any cached passwords from memory when sleeping or hibernating.

Comment Re:Why? (Score 0) 627

Ron Paul tried that very technique, but he got stonewalled by the party establishment and had the rules changed at the last minute to exclude him. People are beginning to realize that changing the parties from the inside out doesn't work as long as there are power hungry people controlling the rules and making decisions for the party.

But this only works if you try and work within the party. Once Tea Party Republicans realize that they can't beat the powerful and corrupt using their rules, than we'll see a mass exodus followed by a party collapse rivaling the Whig party.

Slashdot Top Deals

The less time planning, the more time programming.

Working...