Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:is this good? (Score 4, Interesting) 159

123Password is very strong because it uses numbers and upper and lower case letters.
Those meters are stupid.

As long as it's not one of either this list: http://gizmodo.com/the-25-most... or just a copy of your exact username, then yep it will probably suit you just fine. Dictionary attacks don't happen in break ins nearly as often as exploiting password resets (via social engineering or otherwise) or other blatant sidesteps of security (token reuse, etc), since everyone tarpits bad logins, sometimes after as few as 3 attempts.

Comment Still waiting for a "hackability meter" (Score 5, Interesting) 159

The plain simple truth is that complexity of a password is barely relevant at all when compared to the threat of an outright data breach at a provider. Who cares if your password is 'veronica' (your daughters name) or `myL1ttleBr0ny%` since an attacker isn't going to bother with brute forcing anything but '123456' and 'password' because they will get tarpitted by any reputable provider before they can guess anything out of a dictionary more than 5 entries long.

What we need is a meter on a web site describing how much effort they put into server security, how big their target profile is (how many entry points they have) and a sign that says "??? days since a total data breach!", and then the user can decide if they want an account there at all. How's that coming?

Comment Re:Trade secret? (Score 2) 74

How can you claim something is a trade secret if you show it to others? If you want to keep your design proprietary, patent it.

Via a handy catch-all called an NDA. Facebook is in trouble if it stipulated something like "BRG is presenting designs in confidence and all material is proprietary and not to be copied for any reason... Facebook will be held liable for any material/tangential loss due to disclosure of included designs..." etc since Facebook has allegedly shared their "secret modular designs" with the construction firm that won the bid, and Open Compute Project.

Comment Re:Ummm.... (Score 3, Insightful) 74

Did BRG have that concept patented?

Doesn't matter (but would help their case if it were). Note that the lawsuit isn't for infringement (patent or copyright) but for breach of contract and theft of trade secrets (that Facebook allegedly only had access to in confidence, i.e. via aforementioned contract). It all depends on if Facebook's agents signed anything similar to a NDA when negotiating with BRG for a design contract, in order to review a proposal using their "modular techniques". If BRG was smart they would have papered it up very specifically before they showed any sensitive bits to Facebook.

Like TFS says we don't have enough info to know if something super specific about the design was copied (like some allegedly optimal ratio of airflow to floorspace to TDP). This is most likely just a contract chase, hoping that the words of whatever Facebook signed are broad enough to catch them for designing anything similar to what BRG had proposed.

Comment Re:How is this new? (Score 3) 172

In the history of "conservation" no one has managed to turn the ability to use less of a product, into the *practice* of using less of a product. How often do you let the empty ketchup bottle "ride" in the fridge and squeeze a few faint drops on each hot dog hoping to get the last of it, while really only putting 1/10th your normal amount on? Yep. Now, you can get your full ketchup fix on time, every time. And when the bottle is gone it's gone, no more "maybe one more blob of salt-tomato-vinegar heaven, if I shake it just right!" instead, it's on to the next new bottle, and the next full load of ketchup on your bratwurst, and even BETTER sales for Kraft/Heinz.

Further reading: energy efficiency != energy conservation: http://freakonomics.com/2015/0...

Comment Re:It depends (Score 1) 486

RAM *is* faster (by far) than any persistent media 9SSD, HD...). So whatever the test, the algorithm is probably bad,

I read this summary as "when the goal is to write a string to disk, building it in memory first is slower than just writing it to the damn disk in the first place".

Followed by a "does this mean my cafeteria meal card is going to get renewed?" at the end.

Comment Re:Nice (Score 4, Funny) 119

It's easy. You just use "vi [filename]" and then inside the file you hit lower case i to actually edit it and then escape to stop editing it and then ctrl to activate the command prompt inside vi and w to write it and exclamation mark because youre sure you want to save it and then q to quit.

And after that I have configured resolv.conf and apt.sources to the point where I can just install nano and get back to work.

Comment Re:Summer? (Score 1) 160

The article says nothing about what happens during the summer months. You just shut down the servers then? (HTTP 707 Error: Server on summer break).

They probably install a duct to just circulate outdoor air through the unit. In The Netherlands the average high temp doesn't get past 70F/21C so there are few times when you would have waste heat that you couldn't use.

Plus, these are no doubt highly distributed redundant systems (cloud, as it were) so turning them off and relying on servers elsewhere is a viable option.

Comment Re:Yeah because you know... (Score 2) 224

Entirely true. It would just make more sense if they developed technology that could be retrofitted in to any car instead of just their newest line.

There are a fucking million of them but, what good is a device that goes for around $100 when you can sell [announcer voice] aaaaaaaa new caaaaaaar! [/announcer voice].

Comment Re:boxen and Borg? (Score 1) 296

Then the answer is not to send the hardware to empty buildings, but to install a GPS tracking device in the shipping container, and see where it goes off-course. Bonus points if you can track it all the way to the NSA modification warehouse, but at least if you know where it got diverted, you can figure out *how* it gets diverted. I suspect the truck drivers are in on it, but without tracking data, that is just a theory.

Why on earth wouldn't you just presume that they are sitting in the CBP cargo control office waiting for anything marked Cisco? Secret warehouse? What is this, a Bond movie? It's a guy with a laptop and a cubicle at the port of Los Angeles who sifts through manifests and then saunters out for a few hours when he spots a ripe container, does his flashy flashy, puts some pretty tape back on the box, and no one is the wiser. The guy who works in Memphis at the border control office for the Fedex hub has it even easier, he just waits for the box to come down the conveyor and "inspects" it for a few minutes and sends it on its way.

You make a good point though, Cisco doesn't seem to have any problem with the premise that US intelligence agencies can basically do anything with their products after they leave the warehouse, but is glad to set up an extra layer of work (for a fee!) to help (not really) remedy it. If they wanted to actually stop this from happening they would take a completely different approach, like just doing final assembly over seas, since all the freaking parts come from Asia anyway.

Comment Re:What I would do (Score 1) 296

If I were Cisco I'd send a rep to a few customers believed to be likely targets (at no cost to the customer), have them check the firmware on site w/ JTAG and if it doesn't match, take the firmware apart and publish the malware. Would serve NSA right.

TSA goon 1: Oh, youre with cisco, and you're headed to Iran? (chris hansen voice) Why don't you take a seat over there?
TSA goon 2: Nice JTAG interface you have there. Shame if anything happened to it (h4x0r flash with firmware to hide modified cisco firmware)
TSA goon 1: Have a nice trip!

Comment Re:boxen and Borg? (Score 2) 296

What?

"Editors"

While admiring Cisco's efforts here, this seems hard. At least these criteria would need to be satisfied:

1) the order would have to come in over an actual secure channel and be handled on known-secure systems.
2) the payment could not be processed until the delivery was made. Once the payment is made, the delivery location is compromised for future orders.
3) the shipment would have to be to a location that does not appear on the MLS. The receiver would have to follow tracking and send a courier out to meet the delivery driver (a easy expense for the right customers).

Driving to a distributor for pickup also seems like a good idea, so long as #2 is adhered to, since it amplifies the required effort of an attack to intercept several palettes of gear.

What other attacks are there on such a secure-delivery system using a common carrier?

The most obvious one: they will just intercept everything leaving Cisco and not heading to a reputable US company (scratch that, they probably target reputable us companies too). If they can intercept and MitM one box they can surely do it to a thousand. Why should they care if they don't even know where it's going, they can needlessly bug 1000 routers for every 1 that gets inside the right place and still have enough money in the budget to buy donuts on friday.

Where did you get criteria 2 and 3 from? It's pretty clear from the description that Cisco thinks the NSA will be thrown off the trail based on the premise that they are using a (From==Cisco && To==Iran) style filter to do these intercepts, and won't think to do ((From==Cisco && To==Pier 4, NYC) || (From==Pier 4, NYC && To==Iran)). The thinking is similar to bitcoin laundering services Underestimating the NSA in this regard is pretty sad, given that the leaks are only a fraction of their secretive doings.

Slashdot Top Deals

"Pay no attention to the man behind the curtain." -- Karl, as he stepped behind the computer to reboot it, during a FAT

Working...