Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Image

Man Sues Neighbor For Not Turning Off His Wi-Fi 428

Scyth3 writes "A man is suing his neighbor for not turning off his cell phone or wireless router. He claims it affects his 'electromagnetic allergies,' and has resorted to being homeless. So, why doesn't he check into a hotel? Because hotels typically have wireless internet for free. I wonder if a tinfoil hat would help his cause?"

Comment Re:Really? Got any evidence? (Score 0) 409

largest fine in history (by ~2x) is no difference to what is handed to member country companies?
Wow...

GE/Honeywell and Boeing/McDonnell Douglas, both of which were approved in the U.S. but either died in the E.U. or were substantially affected by E.U. pre-merger conditions.

how about that NDC Health (EU) infringed on the (C) of IMS Health (US) in Germany, and while the German courts found in favor of IMS, the EC forces IMS to license the portion of technology/software under scrutiny.

I assume this will not meet with your approval either and that's just fine. I'll not sling mud about it but I do disagree greatly with your opinion. I think the EC is protectionist to the extreme, and I think that's fine. I think the US should force Airbus to give Boeing their flight software in the interest of making all planes safer, after all, it's better for the consumer. Right?
-nB

Comment Re:I read (Score 2, Insightful) 230

Yeah, I've read this "market share" argument used as a defense for shoddy MS code time and time again. That just doesn't cut it.

So you think that an attacker thinks he must exploit each platform proportional to the market share?

Or do you believe that each attacker randomly chooses a platform to specialize in proportional to market share. Or do they keep a list with number of slots according to each OS's market share?

Consider this:

  1. Imagine you were on a shooting range. You can shoot for two different targets, one labelled "OS X" and the other one "Windows"
  2. One "OS X" target is 3 times larger than the other (OS X has 3 times the vulnerabilities compared to Windows) and is thus easier to hit.
  3. Each time you hit "OS X" you get $10.
  4. Each time you hit "Windows" you get $200.
  5. You have 12 shots.

Now, if the targets were 10 ft in front of you and both easily hit, how would you spend your 12 shots? Would you aim 3 shots that the smaller target and 9 shots at the larger target because that seems the fair thing to do? Or would you just shoot all 12 shots at the smaller target and go home with $2400? I know what the typical person would do.

Only when you move both targets so far back that both of them gets pretty hard to hit would any sane person consider spending any rounds on "OS X".

Attackers chose target platform based this simple economics. As long as Windows has 15 - 20 times (worldwide) the market share of OSX and as long as the limiting factor of attacks is time (the actual creation of an exploit), the attackers are going to target Windows each and every time. Only if they cannot find any exploitable vulnerabilities in Windows will they invest in another platform.

Oh, and what about Apache you say? Apache has 2 times the market share of IIS (roughly). Why isn't Apache attacked exclusively for the same reason. The difference here is that these targets are pretty distant; both Apache and IIS are pretty tight. Neither Apache nor IIS5, 6 and 7 has seen successful widespread attacks directly at the server. Neither Linux nor Windows are vulnerable at the network level anymore, especially not when behind a firewall as *all* webservers are nowadays.

The shooters have simply given up (for the time being) and went to another shooting range with better odds. BothApache and IIS has seen widespread attacks against vulnerable applications running on top of the servers. Here you could certainly argue that attackers has a preference for PHP and ASP.Ancient.

Comment Re:I have no problem with this. (Score -1, Flamebait) 620

Agreed a 150% fucking percent. Most of these dumbs laws are really meant to keep 90% of the "cops", prosecutors, judges and politicans with high paying "jobs" and a great pension after 15-20 years. The worse offenders are cops. The TOP 20 Most Dangerous jobs DO NOT INCLUDE LAW ENFORCEMENT! Its a farce, a lie, a dribble. Fire 90% of the cops, prosecutors, lawyers, judges and you'll see some money returning to the state.

Comment Nothing to see here...move along... (Score 1) 853

Put away your pitchforks and tinfoil hats.

This is similar to regulations already in place which provide an option to shut down the private cellular network during national disasters.

There is nothing in the act to allow suppression of dissent, and if there were, it would be nullified by various existing bodies of law, including but not limited to the constitution.

If you're worried that they are going to simply ignore law like the previous administration, then debate over a law is moot.

Further, this is codifying behavior that you'd want to happen:

Hacker X develops a new malware variant an order of magnitude more virulent, by exploiting a vulnerability in Provider Y's infrastructure.

Only by shutting down that provider until the threat can be eradicated, can compromise of the rest of the commercial networks be avoided.

Provider Y delays, citing some nebulous concern, trying to couch their real fear of losing money.

Provider Y continues to delay, resulting in complete compromise of their network.

At some point, Authority Figure Z steps in, orders troops to take control of, and shut down provider.

After the crisis is over, Y bitches about Z overstepping it's authority, and pisses away a lot of money on legal motions that ultimately go nowhere, as no one is going to sanction the party that saved the day.

  What the act does is codify the actions of Z as within Z's scope of authority, eliminating some of the delay, and post-crisis legal hi jinx.
It also assigns the responsibility for this decision to Z,

The act also mandates a number of things that should be happening anyway, and are due for being codifed.

Slashdot Top Deals

Modeling paged and segmented memories is tricky business. -- P.J. Denning

Working...