Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re: Snowden (Score 3, Interesting) 221

What he did was illegal, but I can't say that it was wrong.

I'm not in the least convinced that it was illegal. Revealing classified info which reveals the existence of criminal behavior is not necessarily illegal (at least as of one of my early briefings when having a clearance bestowed upon my august presence).

Comment Re: Please Microsoft... (Score 0) 347

You're entirely missing the point. Aside from the fact that viruses almost never penetrate the corporate firewalls, what I stressed was that system (and AV-software) updates can be pushed without executing a forced shutdown. There are better ways to achieve the same goal.
Call someone else a PEBCAC, 'mkay? I lost 2 days of work because some red flag went off and IT wasted 2 days doing their SuperSpecial scans only to find nothing at all -- and here I am with an 8-core machine but they wouldn't let me run their scans while simultaneously working.

Comment Re: Please Microsoft... (Score 1) 347

Computers that aren't rebooted at least once a month are likely to miss a critical patch and present a serious risk to the network. If the users aren't willing to do their part to maintain network security, then the script needs to reboot the computers.

And, THAT is why we call IT workers total fuckwits. Until you figure out how to tell the users they must reboot without doing a forced shutdown of apps without so much as saving the work in process, we're going to do everything we can (e.g. pulling the ethernet plug every night before going home) to stop your idiocy. Granted Windows itself is largely to blame, as it's incapable of understanding that force-quitting apps should never be allowed sans local keyboard interaction (i,e. direct user approval), but the typical IT approach of nuking from orbit is unexcusable.

Comment Re:I hate hardware (Score 1) 150

What if your cloud service provider goes down? How you going to get all your data if you get only 1 day, or a week notice? How about if you get no notice, the shit just stops working? The company goes poof! So does all your data.

Not the best analogy, but: in case of bankruptcy, shutdown, or death, a medical doctor's practice/office/heirs are required by law to store the patient records & provide them or transfer them upon request. Similar legislation is needed for data storage service companies. (Oh,wait-- intelligent legislative action in today's Congress? Putting a burden on the Job Creators? nevva mind)

Power

Lockheed Claims Breakthrough On Fusion Energy Project 571

Lockheed Martin claims it has made a significant breakthrough in the creation of nuclear fusion reactors. The company says it has proved the feasibility of building a 100MW reactor measuring only 7 feet by 10 feet. They say the design can be built and tested within a year, and they expect an operational reactor within a decade. The project is coming out of stealth mode now to seek partners within academia, government, and industry. "Lockheed sees the project as part of a comprehensive approach to solving global energy and climate change problems. Compact nuclear fusion would also produce far less waste than coal-powered plants, and future reactors could eliminate radioactive waste completely, the company said."
Security

How Poor Punctuation Can Break Windows 94

An anonymous reader writes with a report at Ars Technica about how a small bug can lead to a security problem. In this case, the problem is that quotation marks — or the lack of them — can be significant. From the Ars article: "The scenario... requires a 'standard' user with access rights to create a directory to a fileserver and an administrator executing a vulnerable script," Frank Lycops and Raf Cox, security researchers with The Security Factory, said in an e-mail interview. "This allows the attacker to gain the privileges of the user running the script, thus becoming an administrator." While the attack falls short of the severity of the Shellshock family of Linux shell vulnerabilities, the two researchers stressed that it's a good example of how untrusted input can be used to execute commands on a system. The researchers identified at least one popular script with the vulnerability. When the script attempts to set the starting directory for system administration work, it inadvertently runs the command appended to the malicious directory's name as well. ... The solution is to use proper coding practices—in this case, the judicious use of quotation marks. Quotation marks are used in the shell environment to make sure that the data inside the quotes is not interpreted by the program as a command.

Slashdot Top Deals

What the gods would destroy they first submit to an IEEE standards committee.

Working...