Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Well known (Score 1) 77

DSS are already our cyber detectives and can bring a great deal of wealth into what to expect with these types of attacks.

This is their report from last year on what kind of defense contractors are being targeted and why. (PDF Warning 2011-unclassified-trends.) Social engineering has generally always been the weakest link in a good secure system, but can still be deterred with strict security policies. It's not really a matter of if you'll get infected, but a matter of when. I've heard of incidents where companies have been infected for months without realization before the FBI stepped in to stop the further transmission of gigabytes of sensitive information.

If you think you or your company has been infected by foreign or domestic threats, go ahead and contact your local FBI office. They'll work with you in a cooperative investigation and guide you to prevent a similar incident from reoccurring. Despite what the movies show, the FBI does not come in and just take control of your network. You're still in charge and nothing happens without your consent.
Security

TSA Pats Down 3-Year-Old 1135

3-year-old Mandy Simon started crying when her teddy bear had to go through the X-ray machine at airport security in Chattanooga, Tenn. She was so upset that she refused to go calmly through the metal detector, setting it off twice. Agents then informed her parents that she "must be hand-searched." The subsequent TSA employee pat down of the screaming child was captured by her father, who happens to be a reporter, on his cell phone. The video have left some questioning why better procedures for children aren't in place. I, for one, feel much safer knowing the TSA is protecting us from impressionable minds warped by too much Dora the Explorer.

Comment Re:for those who wonder what the hell akamai might (Score 4, Informative) 171

More specifically, Akamai is a content distribution company that serves as a local mirror for it's customers and their customer's clients. You'll see them everywhere from streaming video at Yahoo! to deploying Windows Updates with Microsoft. You would be surprised with how much content is delivered to your computer from their servers.

Comment Exchange 2007 and Powershell (Score 3, Insightful) 617

That's one thing Microsoft did right with Exchange 2007. They built it entirely around their new powershell CLI and then built a GUI for it. The GUI is limited in compared to what you can do with the CLI, but you can get most things done. The CLI becomes extremely handy for batch jobs and exporting statistics to csv files. I'd say it's really up there with BASH in terms of scripting, data manipulation, and integration (not just Exchange but WMI, SQL, etc.)

They tried to do similar with Windows 2008 and their Core feature, but they still have to load a GUI to present a prompt...

Comment Re:Please reconsider (Score 4, Informative) 417

As a father of five, I can testify that as long as you don't abuse it, computers are just as healthy and stimulating as a block of legos. My two year old spends most of his time with cars, blocks, and books; but he enjoys getting on the computer as well. We password protect it so he can only get on with our permission, but he has his own account configured with links to youtube videos of planes and bugs, toddler friendly websites, and games such as Minesweeper and Portal. We fully supervise when he is on the computer and limit how much time he can be on it, but overall it's quite beneficial. He no longer has a paranoia of bugs and he's improved quite a bit with identifying different types of colors and shapes. We credit his ability to recite his ABCs to his Vtech and the games we play with him, but the reinforcement from the computer certainly helps.

Regardless, no matter how a child is raised, it is mostly important to be involved with their day to day actions. Watching them soak up information and apply it is a huge testament to how incredible they are, which is also why it's important to remain involved and direct them.
PlayStation (Games)

PS3 Hacked via USB Dongle 337

dlove67 writes "PSX-scene.com reports that the first PS3 modchip has been tested and confirmed to be working. Running off of a USB dongle, it appears to be relatively user friendly and claims to not void your warranty. Online gameplay works (at least for the time being). It's been a long time coming; cheers to the PS Jailbreak Guys." The video is attached below if you're curious. Can't help but point out that this wouldn't have happened if Sony hadn't decided to yank the Boot Other OS option.

Comment Re:Trademark (Score 4, Informative) 357

Found out a little bit more. Unless you're going to confuse God Squad for Geek Squad, this doesn't appear to have a leg to stand on.
From 1114. Remedies; infringement; innocent infringement by printers and publishers emphasis mine
  • (1) Any person who shall, without the consent of the registrant—
    (a) use in commerce any reproduction, counterfeit, copy, or colorable imitation of a registered mark in connection with the sale, offering for sale, distribution, or advertising of any goods or services on or in connection with which such use is likely to cause confusion, or to cause mistake, or to deceive; or
    (b) reproduce, counterfeit, copy, or colorably imitate a registered mark and apply such reproduction, counterfeit, copy, or colorable imitation to labels, signs, prints, packages, wrappers, receptacles or advertisements intended to be used in commerce upon or in connection with the sale, offering for sale, distribution, or advertising of goods or services on or in connection with which such use is likely to cause confusion, or to cause mistake, or to deceive,

Then again, IANAL

Privacy

Submission + - Beware: govts are tapping your 3G calls (zdnet.com.au)

joshgnosis writes: ZDNet Australia reports that an increasing number of governments around the world are using interceptors that can push 3G calls back down to the much less secure 2G in order to tap into the calls. "People have this misconception that if they're using a 3G phone their call cannot be intercepted because the 3G network provides them with a bit more security", says Les Goldsmith, CEO of call interceptor distributor ESD Group.

Comment Re:Speaking of the BP gulf spill (Score 4, Interesting) 138

The problem with Florida isn't BP, but more likely ships illegally dumping.

"We've done a number of tarballs from Florida, Key West, Miami and so forth, none of which so far have matched the Deepwater Horizon," Gronlund said. "The tarballs that have been found on the beach in Florida are fuel oil."

Slashdot Top Deals

The biggest difference between time and space is that you can't reuse time. -- Merrick Furst

Working...