Andrew Pollack's Blog

Technology, Family, Entertainment, Politics, and Random Noise

Remember all those original Star Trek scenes where the earspliting noise attack would cripple the crew?

By Andrew Pollack on 11/08/2005 at 01:01 PM EST

Crippling high pitched noises forcing crew members to their knees on the bridge of the Enterprise as some kind of non-lethal submit-or-die noise came from the foe-du-jour was part for the course on the 60's TV series. Well, apparently the crew of that cruise ship off the coast of Africa used something like that to stop the pirate attack. According to Wikipedia, the LRAD (Long Range Acoustic Device) is commercially available. It can "fire" a sonic beam tight enough to leave the operator and bystanders unaffected while producing a high pitched sound twice as loud as a smoke alarm directly in line with where it's pointing.

Sounds a bit like something Tesla would have created, no?


There are  - loading -  comments....



Other Recent Stories...

  1. 11/10/2014Simplified explanation and steps for upgrading to SHA-2 encrypted SSL certificates for DominoI went through the process to understand what IBM is saying in their patch information -- and while it's valid, it's also harder than it needs to be (IMCO) for people already used to doing things the Domino way. If you're already familiar with using the server certification database to create the keyring and make the certificate request certificate (CSR) you can keep using it. This is also helpful if you already have a SHA1 based certificate and you just want to re-issue. Note: This resolves the browser ...... 
  2. 11/04/2014Warning: IBMs Interim Fix¬†adding TLS 1.0 to Domino can break connections from Python and some other scripting clientsHere's a bit of joy to add to your day. Once your server can speak TLS 1.0 to help secure you from POODLE attacks, any code making connections to your server over HTTPS that use the utilities wget, curl and most importanly Python (and others, apparently) may break. The issue is that these tools are built using a version of openSSL that will try to connect using TLS 1.2 first -- and when that fails, the connection gets dropped. I've seen reports of this in Ruby as well, but I've verified that it is an issue ...... 
  3. 11/04/2014Patch for the SSL v3 POODLE exploit has escaped IBM and can now be downloaded. You REALLY need this patchIf you do not apply this patch, you are going to start having users unable to connect using SSL to your Domino servers. Vendors and customer sites are starting to release operating system and browser patch that block access to sites using only SSLv3 without TLS. Until this morning, that meant all Domino servers not using a reverse proxy front end of some kind. This patch adds TLS 1.0 to Domino versions 8.51, 8.52, 8.53, 9.0, and 9.01 in all the various platforms. TLS 1.0 is a fairly old version of TLS but ...... 
  4. 10/29/2014Automatic Spam Report to Provider Agent 
  5. 10/21/2014Quick update on the Domino SSL v3 "POODLE" , TLS, and SHA-2 issues -- Good news 
  6. 10/16/2014Summary Recommendation for dealing with the POODLE SSLv3 Vulnerability on Domino servers 
  7. 10/14/2014Speaking tonight ath the ICU One (aka NE Notes Users Group) 
  8. 10/09/2014Presentations from AdminCamp 2014 
  9. 09/17/2014IBM Domino Servers STILL don't support SSL SHA-2 Certificates - and it is about to be a PROBLEM 
  10. 02/09/2014Changing what I do at the Fire Department 
Click here for more articles.....


pen icon Comment Entry
Subject
Your Name
Homepage
*Your Email
* Your email address is required, but not displayed.
 
Your thoughts....
 
Remember Me  

Please wait while your document is saved.