Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment A few options (Score 1) 122

First, do you have a decent relationship with your former company? If so, good, reach out to someone there who might be able to get you authorization to contribute them back to the project Second, if they won't or if you can't, reach out to the project and at least notify them of the bugs and I would assume you can provide the details of where they are located. You're already providing more than a bug report at that point which helps them more than nothing at all. Third, work with another person to develop a clean-room patch so it isn't your exact work and therefore not your former company's work product.

Comment Re:Well of course not... (Score 5, Insightful) 206

Taking your analogy a bit further..... While you may have a more secure door without the lock, you also have what is commonly referred to as a wall. Without a way to use the door it is no longer serving it's intended purpose. The most secure computer is one that is not on a network and cannot be physically accessed. Once you actually need to access it you are now weighing the tradeoff between usability and security. The picture password is intended to provide a way for users who wouldn't otherwise protect their device with a low impact way of doing so.

Comment Re:Blackberry + BES Express (Score 1) 198

The question was asked as "should the BES be in the U.S. or the foreign country." Given those two options the better place would be the U.S. since the OP was concerned about the foreign country to begin with. Your point about the physical access is correct, however if you have encrypted mail stores and you encrypt the handheld you could conceivably create quite a headache for anyone who even has access the physical box or the handheld (assuming you didn't remote wipe it anyway).

Comment Re:Blech (Score 1) 126

First of all, there's a common misconception amongst a lot of people that BlackBerries require BES, they do not, BlackBerries can hook directly into ActiveSync just like other smartphones without a BES.

I believe the Blackberry BIS service only supports Outlook Web Access (Not true ActiveSync), there are third party apps for ActiveSync but from my research they are a bit cumbersome to use.

Comment Re:Blech (Score 1) 126

Why people want to continue going down the BES route is a mystery

Well I know one reason I moved to a Blackberry and BES was that ActiveSync didn't handle notes. Additionally the iPhone didn't handle tasks. I don't know if any Andoid based devices do but none did when I was looking in January of this year.

Image

Anti-Speed Camera Activist Buys Police Department's Web Domain Screenshot-sm 680

Brian McCrary just bought a website to complain about a $90 speeding ticket he received from the Bluff City PD — the Bluff City Police Department site. The department let its domain expire and McCrary was quick to pick it up. From the article: "Brian McCrary found the perfect venue to gripe about a $90 speeding ticket when he went to the Bluff City Police Department's website, saw that its domain name was about to expire, and bought it right out from under the city's nose. Now that McCrary is the proud owner of the site, bluffcitypd.com, the Gray, Tenn., computer network designer has been using it to post links about speed cameras — like the one on US Highway 11E that caught him — and how people don't like them."

Comment Exchange ActiveSync SSL issues (Score 3, Interesting) 283

There seems to be many people having issues with s self signed SSL certificates on Exchange. The phone requires you to load the certificate and "trust" it before you can connect. It doesn't allow for you to "trust" it inline with the EAS setup (ala Windows Mobile and iPhone). If you get past that, and you are running a standard SBS sever which by default creates a self signed cert with CNs for the private AD host name, the public dns host name and some SBS specific websites (companyweb and others). The pre supports multiple CN certificates, but it seems from some early research I did with a friend who just picked one up, that it uses the 1st CN to create the SSL connection (or verify the root ca) instead of the server url the user entered in the setup. Since many small shops don't use their public domain name as their AD domain name there seem to be many people having an issue.

Also, the error message it provides is not very helpful and is generic "SSL certificate error. Is the date and time correct"

Thankfully my friend's company happened to own the domain they used for the internal AD as well and since he is the admin he just added in the DNS records for it. It then worked as designed.

Comment Any way to block this at the border? (Score 2, Interesting) 285

I was looking for information on this last night and wasn't able to find much.

Is there a way (on a ASA/PIX specifically) to block the outbound connections made by this worm so that you can contain the traffic to the local network and also log the hosts that are infected?

The only thing I found was someone making reference to blocking http://ipaddr/search?q= requests but I couldn't find any backup for that claim. TIA
The Internet

FTC Kills Scareware Scam That Duped Over 1M Users 329

coondoggie writes "The Federal Trade Commission today got a court to at least temporarily halt a massive 'scareware' scheme, which falsely claimed that scans had detected viruses, spyware, and pornography on consumers' computers. According to the FTC, the scheme has tricked more than one million consumers into buying computer security products such as WinFixer, WinAntivirus, DriveCleaner, ErrorSafe, and XP Antivirus. The court also froze the assets of Innovative Marketing, Inc. and ByteHosting Internet Services, LLC to preserve the possibility of providing consumers with monetary redress, the FTC stated."
Security

Child-Suitable Alternatives To Passwords? 895

An anonymous reader writes "Two months ago I donated my old PC to my little sister, who is 7 — I had promised she would get her own computer as soon as she can read and write properly. I then proceeded to answer her questions about how it works, as far as she inquired, and tried to let her make some choices when installing Debian (she can already use GNOME). As I explained password protection and encryption to her, I was pleasantly surprised when she insisted on protection measures being as strong as possible, so that no one else can screw with her computer. She knows that my younger brother has to endure strict parental control software that was installed on his machine without his consent. The significant problem is that she cannot permanently memorize abstract passwords, even if they are her own creation. I talked with a teacher who assured me that this is common at her age. My parents would probably be able to guess non-abstract passwords. What mechanism of identifying herself does the Slashdot crowd suggest?"

Slashdot Top Deals

"Don't drop acid, take it pass-fail!" -- Bryan Michael Wendt

Working...