Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Submission + - Rogers/Fido cellular service out nation-wide (globalnews.ca)

inject_hotmail.com writes: Cellular carriers Rogers, Fido, and Chatr are currently experiencing a nation-wide outage, which began at approximately 6:00pm EDT (22:00UTC) 09-Oct-2013. All cellular voice services are inoperable, however, the company claims that data and text services are not affected. Some customers are reporting brief periods of service. Attempts to reach Fido's customer service line (1-888-481-3236) failed during their normal business hours; however, once their automated system came back online, it reports that some customer phone number are not recognized by their system.

Submission + - X11 Server Security Hole Plugged Dating Back To 1993 (phoronix.com)

An anonymous reader writes: CVE-2013-4396 was publicized this week and resolved as the latest X11 Server security advisory. This security advisory is about a use after free memory hole that could lead to system crashes and/or memory corruption, but making this X11 security advisory more pressing is that the issue has been present since September of 1993. For two decades in all X11/X.Org Server releases going back to X11R6.0 has been this vulnerabilty that was only now discovered in the widely-used open-source software and can be fixed by a five-line X Server patch.
Education

'Dangerously Naive' Aaron Swartz 'Destroyed Himself' 362

theodp writes "In July, MIT drew criticism after issuing a report clearing itself in the suicide of Aaron Swartz. So, one wonders what Swartz supporters will make of The Lessons of Aaron Swartz, an MIT Technology Review op-edish piece penned by MIT EE/CS prof Hal Abelson, who chaired the review panel. Calling Swartz 'dangerously naïve about the reality of exercising that power [of technology], to the extent that he destroyed himself' (others say prosecutorial overreach destroyed him), Abelson questions 'whether the people who mentored Swartz and helped him achieve such brilliance and power had a responsibility to cultivate not only his technical excellence and his passion as an advocate but also, as my grandmother would have called it, seykhel-a wonderful Yiddish word that means a combination of intelligence and common sense.'"
Books

Book Review: Citrix XenApp Performance Essentials 24

First time accepted submitter gbrambilla writes "A problem every system administrator has to face sooner or later is to improve the performance of the infrastructure that he administers. This is especially true if the infrastructure is a Citrix XenApp farm that publishes applications to the users, that starts complaining as soon as those applications become slow. A couple of weeks ago I was asked to publish a new ERP application and suddenly all the hosted applications started to suffer performance problems... after some basic tests I looked on Amazon for an help and found the book I'm reviewing: Citrix XenApp Performance Essentials, by Luca Dentella, is a practical guide that helps system administrators to identify bottlenecks, solve performance problems and optimize XenApp farms thanks to best-practices and real-world examples." Read below for the rest of gbrambilla's review.
Security

Ask Slashdot: Preventing Snowden-Style Security Breaches? 381

Nerval's Lobster writes "The topic of dealing with insider threats has entered the spotlight in a big way recently thanks to Edward Snowden. A former contractor who worked as an IT administrator for the National Security Agency via Booz Allen Hamilton, Snowden rocked the public with his controversial (and unauthorized) disclosure of top secret documents describing the NSA's telecommunications and Internet surveillance programs to The Guardian. Achieving a layer of solid protection from insiders is a complex issue; when it comes to protecting a business's data, organizations more often focus on threats from the outside. But when a trusted employee or contractor uses privileged access to take company data, the aftermath can be as catastrophic to the business or organization as an outside attack. An administrator can block removal of sensitive data via removable media (Snowden apparently lifted sensitive NSA data using a USB device) by disabling USB slots or controlling them via access or profile, or relying on DLP (which has its own issues). They can install software that monitors systems and does its best to detect unusual employee behavior, but many offerings in this category don't go quite far enough. They can track data as it moves through the network. But all of these security practices come with vulnerabilities. What do you think the best way is to lock down a system against malicious insiders?"

Comment Re:ZFS (Score 1) 268

You didn't have enough RAM. To use deduplication on ZFS without a massive performance hit requires assloads of RAM. 8 GB is nothing to ZFS with dedup on unless your disks are tiny. While Oracle claims less, the FreeBSD guys have found you need at least 5 GB per TB of disk just for dedup, plus more for cache and the rest of the OS. Do the math and any reasonably big storage pool will need tonnes of RAM.

Comment Re:Hope it's going in the new Mac Pro (Score 5, Informative) 176

The Core i7's are consumer-grade processors and are slower than the Xeon's the Mac Pros use

This is completely incorrect. The current Mac Pros use Nehalem based Xeons which are two generations back from the current Ivy Bridge i7s. Xeons may have differences in core count, cache and/or ECC support but their execution units are the same as their desktop equivalents. The base Mac Pro CPU is equivalent to an i7-960 with ECC support. The current Ivy Bridge i7s are a fair bit faster.

Comment Re:Java and flash... (Score 1, Insightful) 97

All other operation systems running on similar hardware but having strict security and privileges proof you wrong. Even Linux existed at that time already and ran happily on that hardware.

No, he is completely correct. Linux of the time did not "run happily" on that hardware with the same level of GUI complexity as Win9x. Either Linux had no GUI at all, or a simple window manager like TWM or FVWM.

This is also doubly wrong in claiming that all other operating systems at the time had proper security. The biggest competitors to MS at the time were even simpler and less secure OSes. For GUIs there was MacOS which didn't have protected memory and could barely multitask, along with having no security model. On the server side the biggest at the time would have been Novell, which did have a security model, but still had no protected memory and much simpler multitasking than even Win9x.

Comment Re:Applets disabled (Score 2) 201

I'm a satisfied CrashPlan customer too, but it most certainly is bloated. For what it does it's memory usage is insane. The service is currently using 900 MB of RAM on my system just idling, plus another 200 MB for the interface. I've had cases where I've had to edit its config files to allow it to use even more memory and Google shows I'm far from the only one.

It's also extremely slow. It will often backup at only 20-40 mbit/sec locally on my gig lan. I know it encrypts files, but my i7 can perform the same encryption in other programs at least an order of magnitude faster. Yes, I have allowed it to use more CPU power.

While there isn't anything that works as well, there are tonnes of programs that do similar things to CrashPlan with a fraction of the resource usage.

Comment Re:Heh (Score 2) 348

Running spinrite against an SSD is one of the clearest ways of showing that it is complete BS. It will report all sorts of things about the drive that are clearly impossible. It won't error or give no data, it clearly makes things up about the drive.

Another good BS test for spinrite is to run it against a non-ATA drive that is still BIOS accessible. A booted USB flash drive is the best, but something like a modern SCSI/SAS controller works as well. It's clearly impossible for spinrite to access such a device directly, yet it still reports all sorts of things it simply could not see. No errors or blank data, it again makes shit up and displays it.

Slashdot Top Deals

Our OS who art in CPU, UNIX be thy name. Thy programs run, thy syscalls done, In kernel as it is in user!

Working...