Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment The desktop itself is dead (Score 1, Insightful) 108

There will never be a "year of the desktop", because the desktop is dead. The reality is that such a large percentage of the population use mobile devices for the majority of their interactions that whatever happens on the desktop is irrelevant. I find it bizarre because the mobile experience is so abysmal compared to a proper desktop. But I've never understood the mainstream, and I guess this is just another example of that.
User Journal

Journal Journal: Farewell, part II :-( 9

It seems right to post this here, where it all started. Farewell, ~jawtheshark.

User Journal

Journal Journal: Farewell :-( 4

It seems right to post this here, where it all started. Farewell, ~talinom.

Comment COBOL programmers aren't all old (Score 1) 383

There's a COBOL shop in my small town that contracts for corporations and the government. I know several COBOL specialists in their 30s. It's actually an extremely lucrative field to get into these days, with good pay and job security.

Rewriting all that COBOL code in some other language would be bound to cause major problems.

Submission + - Badlock Vulnerability Falls Flat Against Hype (threatpost.com)

msm1267 writes: Weeks of anxiety and concern over the Badlock vulnerability ended today with an anticlimactic thud.

Badlock was the security boogeyman since the appearance three weeks ago of a website and logo branding the bug as something serious in Samba, an open source implementation of the server message block (SMB) protocol that provides file and print services for Windows clients.

As it turns out, Badlock was hardly the remote code execution monster many anticipated. Instead, it’s a man-in-the-middle and denial-of-service bug, allowing an attacker to elevate privileges or crash a Windows machine running Samba services.

SerNet, a German consultancy behind the discovery of Badlock, fueled the hype at the outset with a number of since-deleted tweets that said any marketing boost as a result of its branding and private disclosure of the bug to Microsoft was a bonus for its business.

For its part, Microsoft refused to join the hype machine and today in MS16-047 issued a security update it rated “Important” for the Windows Security Account Manager (SAM) and Local Security Authority (Domain Policy) (LSAD). The bulletin patches one vulnerability (CVE-2016-0128), an elevation of privilege bug in both SAM and LSAD that could be exploited in a man-in-the-middle attack, forcing a downgrade of the authentication level of both channels, Microsoft said. An attacker could then impersonate an authenticated user.

Slashdot Top Deals

Love makes the world go 'round, with a little help from intrinsic angular momentum.

Working...