Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Thanks Google (Score 1) 348

I do not claim that MS does not need to test their patches thoroughly. I only told that at least in the cases I have observed, Windows updates produced at least one order of magnitude more problems that all Linux updates I have seen. It is a sign that whatever testing MS does, it is not effective.

As of legal trouble: If there were any real legal liability for MS's software defects, MS would be already bankrupt a dozen times and you can choose whether for their bugs in general, the failures of products to meet their specs (remember the Windows Vista hardware requirements fiasco?), or negligence to fix security bugs.

Comment Re:Thanks Google (Score 1) 348

Which distributions?

Debian, Suse, Gentoo, ...

Just last week Ubuntu released two kernel updates (at least for x86-64) for 10.4. I can't help but think the reason is that there was a flaw in the first release that forced a second.

Sure, such cases happen, but you still have the choice: either you prefer security even if it might cost stability in rare cases (which can be worked around by reverting to the previous version almost always), or you prefer stability, so you can wait a couple of days with applying the patch and check if an updated version is issued.

Comment Re:Thanks Google (Score 1) 348

No, but unlike many others I prefer to present all the evidence I have. I have written "at most once", because in our case I do not really know whether the problem was related to the security update or not, because it disappeared quicker than I was able to find out its cause. But even if it were a failure, one problem on a large amount of machines vs. many problems even on a small number of machines is still a strong case.

Comment Re:Raging Bull (Score 2, Insightful) 348

Sorry, but it seems that you are a little bit confused about the real cause. First of all, the blame lies on MS for creating the bug. Secondly, a responsible vendor should fix a security hole as quickly as possible, because security bugs are rarely discovered by a single person only. It is highly probable that the same bug is already being expoited by the black hat hackers in the wild. Five days is more than enough for the vast majority of security problems and delaying the fix is completely irresponsible. IMHO, MS should stop complaining and fix their processes instead.

In addition to that, it seems that MS has never replied to the researcher. Responsible vendors do that and they even cooperate with the researchers on the possible fixes. Most researchers treat such vendors very respectfully, but they hardly have any understanding for vendors who expect that they can delay security fixes for months and ignore the input from the security community.

Comment Re:Thanks Google (Score 3, Insightful) 348

It may seem that so, but the reality seems to disagree. Most Linux distributions release security updates within a day or two after the vulnerability is announced and while I maintain dozens of Linux machines, I had witnessed a security update breaking something at most once. On the other hand, I have seen problems caused by Windows updates countless times.

Comment Re:A Christian's take (Score 1) 1252

Evolution doesn't explain the beginning of time, doesn't explain order or complexity, nothing cannot come nothing, chaos does not create order, etc.

Contrary to popular belief, chaos can very well create order. In fact, you can rigorously prove that any system which is large enough must contain regular parts, however chaotic it may seem at the global scale. See the Ramsey Theorem for a classical example.

Government

Submission + - Making Sense of ACTA

Hodejo1 writes: This past week Guadalajara, Mexico hosted the 7th secret meeting of ACTA proponents who continue to ignore demands worldwide to open the debate to the public. Piecing together official and leaked documents from various global sources, Michael Geist has coalesced it all into a five part ACTA Guide that offers structured insight into what these talks might foist upon the populace at large. "Questions about ACTA typically follow a familiar pattern — what is it (Part One of the ACTA Guide listing the timeline of talks), do you have evidence (Part Two), why is this secret (Part Three), followed by what would ACTA do to my country's laws (Part Four)? Countering the momentum behind ACTA will require many to speak out" (Part Five).

Submission + - Ireland's Blasphemy law comes in to effect. (blasphemy.ie)

stereoroid writes: As of January 1, it is a crime in Ireland to commit Blasphemy. The law was changed in July 2009 to fill a gap in the Irish Constitution, which states that it is a crime but does not define what it is, an omission highlighted in a Supreme Court decision in 1999. A July story in the Irish Independent described the situation in more detail. The story has also been covered in The Guardian (UK) today.

To mark the occasion, Atheist Ireland published a list of 25 blasphemous quotations on the blasphemy.ie website, from such controversial figures as Bjork, Frank Zappa, Richard Dawkins, Randy Newman, and Pope Benedict XVI. (The last-mentioned was quoting a 14th Century Byzantine Emperor, but that's no excuse.)

Security

Submission + - GSM Decryption Published 3

Hugh Pickens writes: "The NY Times reports that German encryption expert Karsten Nohl says that he has deciphered and published the 21-year-old GSM algorithm, the secret code used to encrypt most of the world's digital mobile phone calls, in what he called an attempt to expose weaknesses in the security system used by about 3.5 billion of the 4.3 billion wireless connections across the globe. Others have cracked the A5/1 encryption technology used in GSM before, but their results have remained secret. “This shows that existing GSM security is inadequate,” Nohl told about 600 people attending the Chaos Communication Congress. “We are trying to push operators to adopt better security measures for mobile phone calls.” The GSM Association, the industry group based in London that devised the algorithm and represents wireless operators, called Mr. Nohl’s efforts illegal and said they overstated the security threat to wireless calls. “This is theoretically possible but practically unlikely,” says Claire Cranton, a GSM spokeswoman, noting that no one else had broken the code since its adoption. “What he is doing would be illegal in Britain and the United States. To do this while supposedly being concerned about privacy is beyond me.” Simon Bransfield-Garth, the chief executive of Cellcrypt, says Nohl's efforts could put sophisticated mobile interception technology — limited to governments and intelligence agencies — within the reach of any reasonable well-funded criminal organization. “This will reduce the time to break a GSM call from weeks to hours,” Bransfield-Garth says. “We expect as this further develops it will be reduced to minutes.”"

Comment Re:Hash Collisions (Score 1) 386

This would be an upper limit if you knew that the hash function has uniform distribution. However, nobody is able to prove anything like that for the SHA family. We have a plenly of evidence supporting uniformity, but definitely not a proof.

Comment Re:forward looking (Score 1) 333

This could work if the load of your machine is of a single type only. However, many people tend to use their workstations for both interactive desktop programs and lots of number crunching on the background. Therefore they need a scheduler which performs well on both "server" and "desktop" style load at the same moment.

Slashdot Top Deals

Is your job running? You'd better go catch it!

Working...