Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Secure Boot is Windows only .. (Score 0) 161

@innocent_white_lamb: "The last time I tried that I spent TWO SOLID DAYS at Staples trying to find a laptop that would boot with my Linux "live cd" flash drive."

@Kjella: "You need to go into the BIOS and disable secure boot, then it should load on all of them. If it would boot your Linux distro it'd also boot whatever malware was trying to trojan Windows and that's exactly what they're trying to avoid"

Microsoft: "Secure Boot is a security standard developed by members of the PC industry to help make sure that your PC boots using only software that is trusted by the PC manufacturer."

I don't understand why these members of the PC industry didn't include the Linux makers in the design stage and instead made Secure Boot Windows only. I also understand that UEFI doesn't play nice with dual boot, purely a coincidence no doubt.

Comment Re:Actually, ALL American... (Score 1) 187

@ Applehu Akbar: "The first local settlers walked into a war between the invading Navajo and the agrarian Hopi, a conflict which moved through centuries of war into the American court system, and continues in muted form to this day."

Massive Population Drop Found for Native Americans, DNA Shows

"The number of Native Americans quickly shrank by roughly half following European contact about 500 years ago, according to a new genetic study.

The finding supports historical accounts that Europeans triggered a wave of disease, warfare, and enslavement in the New World that had devastating effects for indigenous populations across the Americas
."

Submission + - I Don't Love Spock: Matthew Continetti v. Captain James T. Kirk (thefederalist.com)

Limekiller42 writes: Over at The Washington Free Beacon, Matthew Continetti wrote about his apathetic reaction to the death of Lenard Nimoy. He stated that he didn't love Spock because, among other things, that "Not only do Spock’s peacenik inclinations routinely land the Enterprise and the Federation into trouble, his “logic” and “level head” mask an arrogant emotional basket case." This resulted in a sharp response from one Captain James T. Kirk that was posted over at The Federalist website.

Comment Reducing the spread of cyber threat .. (Score 1) 47

'the editorial board at the New York Times has suggested that the most constructive approach to reducing the spread of cyber threats would be to "accelerate international efforts to negotiate limits on the cyberarms race, akin to the arms-control treaties of the Cold War."'

I would have thought the solution is to built 'computer' that can't so easily be hacked. DDOD attacks only being feasable because of all those hacked Windows desktops out there in cyberspace.

IRAN -- Current Topics, Interaction with GCHQ

" Iranian Cyber Attacks: Iran continues to conduct didtribituted denial-of-service (DDOS) attacks against numerous U.S. financial institutions and is currently in the third phase of a series of such attacks that began in August 2012."

Submission + - Microsoft and Google working together on Angular 2 JavaScript framework (betanews.com)

Mark Wilson writes: There are unlikely partnerships, and there are unlikely partnerships — Google and Microsoft certainly make for strange bedfellows. At developer conference ng-conf in Salt Lake City, Google's Angular team revealed that it has been working with the TypeScript Team from Microsoft to produce Angular 2.

The worlds of TypeScript and AtScript have converged, resulting in the collaborative effort that is Angular 2. The new version of the JavaScript framework will be written in TypeScript and will be used to develop the next generation of web sites and web apps.

Submission + - India Bans BBC Documentary on Rape

An anonymous reader writes: India's far-right Hindu Nationalist government headed by Narendra Modi has banned telecasting and viewing online of a BBC documentary on the 2012 Delhi rape which shocked the nation. The documentary consists interviews of the rapist Mukesh Singh, his lawyers and the victim's parents seems to expose the male dominant nature of Indian society. Indian government is now attempting to ban the documentary worldwide. Critics of Indian government's action has accused it for not addressing issues women face and instead trying to hide the dirty secrets of its culture from the world. Some Indian websites also reported that the views expressed by the rapist is echoed by policemen, lawyers and politicians of the nation. So far the government's attempt to ban the video online is with mixed success.

Comment The Cybernet and ATC systems .. (Score 1) 60

"Cyber-based threats to federal information systems such as those that FAA relies on for its ATC systems are evolving and growing .. Further, the growing interconnectivity among different types of information systems presents increasing opportunities for such attacks."

Just who in their right minds connect an Air Traffic Control system to the Cybernet?

Comment INSERT INTO slashdot VALUES strawman .. (Score 1) 94

@BarbaraHudson: 'Yet another report that doesn't give hard numbers either in the summary or the article. And of course, the pdf is walled behind a "give us your information and we'll let you download it" page.'

If you haven't downloaded it, how do you know it doesn't gave any hard numbers. Besides, you can fill in any ole name and download it.

Key findings from the 2015 Linux Jobs Survey and Report show that:

"The 2015 Linux Jobs Report reveals and analyzes the responses from more than 1,000 hiring managers at corporations, small and medium businesses (SMBs), government organizations, and staffing agencies across the globeâ"as well as responses from more than 3,400 Linux professionals worldwide."

@BarbaraHudson: "I doubt we will ever have an unbiased set of numbers to work with - that would require someone who doesn't have a vested interest in the outcome."

Yes - of course - you're absolutely right - the Linux foundation obviously have a hidden agenda here ..

Comment Arstechnica post fake Apple/android security alert (Score 2) 89

"The so-called FREAK attack - short for Factoring attack on RSA-EXPORT Keys - is possible when an end user with a vulnerable device - currently known to include Android smartphones, iPhones, and Macs running Apple's OS X operating system - connects to an HTTPS-protected website configured to use a weak cipher that many had presumed had been retired. At the time this post was being prepared, Windows devices were not believed to be affected, and the status of Linux devices was unknown"

Submission + - European Data Protection Reform is Badly Broken (edri.org)

jrepin writes: New leaked documents show that European countries, pushed by Germany, are systematically working to destroy the fabric of European privacy legislation. Under the current proposals, far from being provided with security fit for the digital age, Europe’s citizens right to data protection would be devoid of meaning.

According to the leaked proposals, crucial privacy protections have been drastically undermined, including the right to be asked for consent, the right to know how your data are used and the right to object to your data being used, minimum standards of behaviour for companies exploiting individuals’ data. In several places, the text would not likely pass judicial scrutiny under Europe’s human rights framework.

Comment Re:Last straw? (Score 2) 533

@ShanghaiBill: "The reason we have ISIS is because we defeated Saddam Hussein without thinking much about what would come next."

@hcs_$reboot: "Not true. There were people talking in front of the UN audience, warning exactly what would come next in 2003."

I think what ShanghaiBill meant is that no one in the Bush administration did much thinking, if indeed they were capable of rational introspection.

Slashdot Top Deals

You are in a maze of little twisting passages, all alike.

Working...