Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Comments should work now. (Score 4, Informative) 438

The point is that anyone attacking WiFi in any way is using passive monitoring tools. Those will see your AP no matter if it broadcasts or not. Those will also see any clients, and thus already have a list of valid MACs.

Even more fun, any computer that is set to automatically connect to a "hidden" AP is constantly broadcasting looking for it whenever not connected. So your computer, phone, etc. advertises the existence of a "hidden" AP everywhere you go. Probably impacts battery life too.

Even old-school Netstumbler would show the active clients.

MAC filtering, SSID hiding, etc. are all below WEP64 in terms of security. They can only be considered worthwhile in a situation where for whatever reason (shitty old client device you can't replace usually) you absolutely must have an open AP but want to have it at least be a slight challenge to access.

If there is any encryption at all, even the trivially broken WEP64, none of those things add anything as literally every single person who could crack even that can bypass the rest.

It's the same sort of cargo cult "security" technique as the fuckwits who disable ICMP on their routers and think that makes them invisible on the internet rather than just being a pain in the ass to diagnose network problems.

Comment Re:Comments should work now. (Score 5, Insightful) 438

How about restarting it again to get rid of the absolutely idiotic choices. Please stop promoting the misconception that MAC filtering, SSID hiding, or DHCP disabling are worth anything at all for network security. All any of those three do is make legitimate use harder while not hindering an attacker in the slightest. Does anyone think there are people who can crack WPA2 but can't run Wireshark for 15 seconds to see both legitimate MACs and the IP scheme?

Comment Re:Does anyone actually... (Score 1) 195

I also drive a manual, so I couldn't use a phone without it in the car even if I wanted to. I've done it a few times, the results were hilarious, if almost hitting pedestrians on the sidewalk is your version of hilarious.

Hey now, it's not that hard. Both of my cars are manual, but only one has Bluetooth. Hold the phone in your left hand (presuming you're in a LHD country) and plan your shifts to avoid needing them mid-corner (which is something you should be doing anyways.

That said the Bluetooth is a lot nicer. I don't talk and drive often (unlike apparently most I pay more attention to the road than the other party, requiring a lot of repeated information and usually resulting in them deciding to call back later). I'd be all for requiring hands-free whenever driving, but I'm not sure how many cell phone related accidents actually involved the phone in the hand being a factor rather than the driver spacing out on their driving while they focus on the call.

Comment Re:The LeftHand Path (Score 0) 193

As an administrator, giving network access to black hats by failing to block access SSH access to sensitive systems from unknown IP space just shows you are an idiot.

The part you're missing is that the concern here isn't unknown IP space for the most part. There are probably very few of these things actually exposed to the whole internet, and I agree that the people responsible for any that are need a good smacking. The concern is malicious users or code running within your network. Most networks fit the candy analogy, i.e. hard shell, soft insides. There may be decent external security but once you're inside the perimeter you often have open access to everything.

As someone else said, this is about the geeky mail clerk who is pissed about something and wants to make an impact when he leaves. An easily accessible backdoor like this could make such an attack nearly untraceable.

Comment Re:Eh? (Score 1) 193

Sounds like you need a better security director, a better firewall/network infra admin, and some junior guy to read logs and watch the seim. The better question here is how/why was this device able to tunnel in/out of your network without someone explicitly allowing it? What you allow unfiltered egress from your data center? If you do your vendors are the least of your problems.

Reading helps...

There were other reasons their software needed to connect to them so they just used the same port to allow their support techs to have basically more access than I, the senior administrator had.

It's not hard to tunnel pretty much anything over anything else, particularly when encryption is involved. If your whatsit speaks a proprietary binary protocol or even just uses encryption in a reasonable way and has a legitimate reason to connect to outside sites, you don't really have a good way to know what exactly it's doing with that connection.

Comment Re:Is it called Ouya? (Score 1) 143

Of course it doesn't use the Play Store. It's not meant as a general-purpose Android platform (and neither would any Google console). It has to have it's own specialized store. You can't very well have a console loading apps that expect a touch screen, accelerometer, etc. Even if Google let their console use the Play Store, they would have to wall it off into it's own area.

It's not like we really need to speculate, they already have had television-optimized Android devices accessing the Play store officially for over a year and a half in the form of Google TV. This works fine because the Play store allows developers to filter device availability based on hardware capabilities. Android apps are assumed to require a touchscreen unless explicitly declared otherwise, so by default an app will not show up on GTV or presumably any future console. If the application's manifest is adjusted to state that it does not require a touchscreen and it has no other hardware dependencies, it'll show up on anything that can access the store.

Comment Re:If you don't want people to see the source... (Score 3, Insightful) 165

No, you still misunderstood. OP was asking for an open + free solution for self hosting, not saying that all their code they wanted to host is open + free.

This was the important part:

At my company we use Git with some private repositories.

The private repositories are key. Those are not open. They may contain code which will eventually be released under an open and/or free license, but they are not currently. OP wants to take those out of "the cloud", using open/free solutions.

Comment Re:And where have they put the power button on the (Score 3, Informative) 464

Which is done with the reboot option from within the OS, generally. The point was that most computers default to automatically sleeping in a reasonably short time and this has actually worked reliably for the last 5-10 years, so its fairly common to not actually turn a computer entirely off.

My desktop sleeps at five watts. Parasitic draw when entirely off is 1.5 or so. That's just short of 31 kWh in a year. At my electric rates, that means leaving it asleep rather than off for an entire year would add all of $6 to my electric bill. As it's certainly not off/asleep for all that time, the real-world impact is closer to $2-3. Even with a nice SSD, boot is a 30-45 second thing where the longest part of waking from sleep is waiting for my monitors to realize what's happened and turn on.

The cost of a smoothie every year in exchange for convenience every time I return to my computer? Yeah, worth it.

Also, most Mac users don't dual-boot unless they're gaming. VirtualBox works just as well for 95% of uses and adds a lot of features you don't get with bare metal installs like snapshots, plus Parallels and Fusion exist for those with more specific needs who can't get away with VirtualBox. I'll agree that many serious users of Intel Macs run Windows in some form, but the dual boot versus virtualized split has been shifting more and more towards virtualized over the years.

Comment Re:No updates in 6 years? (Score 4, Informative) 197

It's worth noting that mobile devices often decode popular compressed audio and video formats in dedicated hardware. Modern, powerful devices can play audio and sometimes video reliably in software, but they use a lot more battery power to do so in comparison, so sticking with formats natively supported by your hardware is still usually the best idea.

I think a few chips got Vorbis support and it wouldn't surprise me to find that FLAC made it in to real hardware somewhere, but there's a reason MP3 was basically the only real portable format choice for years.

Comment Re:What is wrong with these folks? (Score 2) 171

Because in a lot of cases they own the facilities that print the books. The parts of the business that e-books either render obsolete or reduce the need for are parts where the big companies involved still make money. They see e-books as a threat to that part of their business and thus their profit margins. They've also seen what happened with music, if you are a content producer it's getting easier and easier to bypass most of the middlemen. The "big content" companies are the middlemen, so while I don't think anyone believes they'll win they'd still prefer to drag out the battle as long as possible. Doing anything in their power to reduce the appeal of e-books is part of that strategy.

Comment Re:How to save your company (Score 1) 800

And it still had major issues until Windows 2012. A few major services could not be used on Core machines, plus there was no way to "upgrade" a Core install to a full GUI or the other way around. Plus Powershell support was not the greatest back when that became available, so managing some of the services that worked fine could still be a chore.

It's nice that Microsoft still tries to build a decent server OS, but they're strung up by the fact that it's still Windows and thus they have to deal with the immense pile of legacy garbage that exists for Windows systems. Microsoft's own services may now all be good in a headless, GUI-less environment, but the third parties are a mess.

The reason *nix systems remain mostly clear of that shit is simply that they never compromised good design for user convenience at the same scale, so pretty much everything written for the platform is built to assume user-level privileges and GUIs being optional. I still to this day have software vendors telling me that their client application that just works with data from a remote system absolutely requires that all users be given Administrator privileges, and then acting like I'm the weird one when I refuse to do so. It's not like NT on the desktop is a new thing, am I unreasonable for expecting actively developed software to have been updated to 2000-era standards by now?

Comment Re:Not to mention... (Score 1) 455

My roommate does the same in his Optima actually, I just picked SD because it seems to be the common choice among OEMs for nav storage these days and in my experience is more durable than USB drives.

I've killed a few USB drives in the course of normal use where while I've heard of them I've never seem an actual dead SD card. I'd expect the actual internal memory to be similar, so I can only imagine the difference comes from the physical form and possibly simpler interface.

Comment Re:Not to mention... (Score 2) 455

And the hundreds of thousands of Chrysler MyGig systems with ordinary 2.5" laptop hard disks contained within are failing in massive quantities, right? Or any number of other manufacturers offering hard disk based storage in their entertainment system. Or the thousands of custom-built in car PCs rigged up by enthusiasts, until recently often equipped with full desktop disks for capacity reasons.

FYI, the "freezer trick" is a common way to coax some last remaining life out of a hard drive that won't spin up. They seem to like the cold, since one that doesn't work at room temperature in my experience has about a 20% chance of coming back to life if frozen. More than once I've rescued data with a USB cord running out from my minifridge.

Or we'll skip the hard drive altogether, SSDs are well under $1/GB for non-performance applications (which media storage in a vehicle certainly fits within). Since when did they care about vibration or the sort of temperatures cars are tested for? Hell, for the role a SD slot would be more than sufficient. Then not only is it practically indestructible media but it's entirely user swappable, allowing easier loading of content and trivial upgrades down the line.

Anyone who's used MyFord Touch or Cadillac Cue for more than a few minutes knows that the idea of these systems being heavily tested is laughable anyways. Supposedly old Sync was nicer and I haven't had any problems with Kia's Sync-derived UVO system, but I haven't used any of the others to really compare.

Comment Re:Small business don't advertise that much (Score 3, Insightful) 121

I can't agree. More times than I can count I've had a question about a local business which I've tried to find an answer to on their web site, something like what their hours are or often restaurant menus, but searching their name only results in a listing on one of the many useless yellow pages type sites. Many of my customers are small one or two person businesses, they'll tell me their email address and it's some random @aol or @hotmail which was clearly their personal account long before the business. It's entirely unprofessional these days to have absolutely zero internet presence and puts them in a position of having an uphill battle for me to respect them as a business.

It's not rocket science to have a domain with email and a basic web site. It's trivial to get a domain and the absolute minimum level of hosting required for such things, why people consider it acceptable to not do this I can't understand.

Slashdot Top Deals

We are not a loved organization, but we are a respected one. -- John Fisher

Working...