Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Of course you should... (Score 1) 396

To caviet... let me ask you if you think RSA ( the major cyber security company) runs all windows on thier servers? Yet they got pwned. They were socialy enginered... then the user installed a root kit on the system which allowed access to their servers... root kit = malware. Now thier NIDS ( network based intrusion detection) caught what was happening when it was in progress... but by the time they were able to respond the damage had been done and a lot of information access and ripped. Many of you are forgetting there are many forms of AV out there. You are all talking about signature based which relies on after 0 day signatures of known virii. These ARE helpful... but yes its after it's on your system. There are other types of AV , heuristics/behavior/anomily/signature based systems. AV doesn't hurt you unless your allowing it to take up to many resources which a good sys admin or user shouldn't allow to happen. If I'm running a Unix / Lunix / OS X / Windows server farm for a company I should definately do what I can to protect it. Network based intrusion detection systems, Host based ( NIDS HIDS) firewalls, DMZ's for incomming traffic ( demiliterized zones) Honeypots ( places set up to lure hackers so you can watch thier activity) you think all these concepts were developed for "windows only machines" ?

Comment Re:Last Resort (Score 1) 396

So your saying because it's less targeted, I shouldn't use it? That's like saying because I have a lower sperm cell count I don't have to use condems. By your reasoning I shouldn't have to use NIDS HIDS either if I'm running off of a linux server... oh wait most things run on the net off of a unix based system( I'm lumping OSX and Linux together as they are a branch off of unix). But you won't find 1 company that has ANY IT security NOT running these things. Your internet servers... not running windows... still using security... and thier security people would be fired if they weren't as they should be. Yes, less targeted because lower home user market share... but still targeted and thus still require protection for a smart user. Think of it like this. Soft targets are the targets that get hit. If you don't protect yourself... you stand a higher risk of being exploited. OSX, Linux, Unix, Windows all need 3rd party detection, signature, hueristics, anomoly/behavior based... it's all needed. I know YOUR specifically talking signature based but there are many forms of AV out there ( I just pointed them out). Sorry I'm a security guy by proffession and I think you as a user should be informed.

Comment Of course you should... (Score 1, Interesting) 396

As a system admin and Information Assurance officer I myself run windows, linux ( virtualized) , and OS X. I use 3rd party malware detection on all 3 systems that are signature based. They are very much needed. It's silly for average users to think that just because they are running OSX which is a less targeted operating system that they aren't targeted. In fact... safari the OSX default browser ( which I like just because it's GUI is intutive to me) is probably the least secure of all the major web browsers ( if you look at the stats at each pwn to own competetion it gets busted the fastest). There are known OSX exploits and many of the same things apply. Man in the middle attacks, SQL injections, sneak ack attacks, all forms of malware... still apply. Just because you are using a specific operating system don't get lulled into a false sense of security.
Desktops (Apple)

Submission + - Valve Switching to Skype Voice Codec for Steam (maclife.com)

ShadowFoxx writes: According to a press release sent to us by Valve, the company will be switching to the SILK voice codec for providing in-game chat and communication options to its customers. In keeping with its recent attitude towards the Mac gaming community, the upgraded service will be offered to Mac and PC gamers alike.
Bug

Submission + - OSX 10.6.7 UPDATE (apple.com)

ShadowFoxx writes: There is an update that supposedly addresses the isse previously posted yesterday on slashdot. It also addresses some of the following and more:

- Improve the reliability of Back to My Mac
- Resolve an issue when transferring files to certain SMB servers
- Address various minor Mac App Store bugs

Comment Bootcamp Driver Issue There is a fix (Score 1) 501

It seems that this was also a problem on the 2010 models that have been re-uped since they switched to the Raedeons from the nVids. The video drivers from the boot camp CD cause issues and lock ups ... .. i've read this from multiple sources: Check this link out to replace your current video drivers http://wilby.com/cameron_blog/?p=118

Comment Re:Well of course (Score 1) 501

Agreed. Readinig about the error however I'm hoping it's not a heating issue reguarding chassis enginering. With the added speed and power of new model under the same chasis design... even the old one ran hot pushing the bubble without having major issues. If it's something that can be fixed with firmware or operating system update that would be great. I really want to buy one of these but I'm not going to until this issue gets resoleved. I might have to settle for one of the new sandy bridge HP's or an m17x which are less portible.

Comment The judge and prosecution grievously errored (Score 1) 234

The router IS classified as a computer according to the Dutch rubric. It has a processor albeit not x86 it's a SOC (system on a chip). It does store quite a bit of data to include configurations, routing tables, and includes passwords. The data was also accessed and exploited (indirectly) by the intruder to gain access to the Internet, thereby classifying this as illegal to thier own standard. The judge was wrong on his classification, and the prosecution failed to provide the proper expert witness testimony to clarify what a router is and does. As far as the misguided "you better learn how to secure your router or it's your own fault." routine... Wireless is always considered an unsecure medium for this of us that are in the security field. Even WPA-2 is vulnerable given penetration software (freely found on the Internet), rainbow tables, time and other methodology. WPA-1 and WEP are even worse and a script kiddy can look up how to break into thier neighbor's wifi on YouTube. Fact of the matter is... If u have a wireless access point (most of us do) it's not impossible to crack. But, if you do encrypt it (and in this case it was encrypted)... most people feel they have a right to privacy on that network and should be able to assume that it's "reasonably secure" as the law should afford us (the general public) these rights and protections. (from a western legal ideological point of view). In the U.S. This has been accomplished by the electronic data acts... And the constitution. Posted from my iPhone :-)
Apple

Submission + - Apple rethinks inventory management for iPad 2 (appleinsider.com)

ShadowFoxx writes: Apple has changed its inventory management policy for iPad 2 deliveries, having its retail stores hold on to new shipments until the next day in an effort to ease the sales process for both customers and employees
The Internet

Submission + - Al Franken: ‘They're coming after the Intern (politico.com)

ShadowFoxx writes: Al Franken is purporting to be a champion of net neutrality by regulating and not allowing market sources or more ISP choices drive the freedom of the net. I'd like to hear your opinions /. On if more regulations or freemarket practices is the best answer to drive the freedom of the Internet.

Slashdot Top Deals

You know you've landed gear-up when it takes full power to taxi.

Working...