Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
User Journal

Journal Journal: TRUE DATA DISASTER

A true 'data disaster' would have to be defined to include: 1) loss of data (including minor and major losses)[data is gone]. 2) loss of integrity of that data [the current data cannot be authenticated]. 3) loss of use of the data, even temporarily [loss of access]. 4) loss of the confidentiality of the data [unauthorized exposure of the data, including unauthorized capture]. 5) Unauthorized USE of the data. --->> whether the loss is for an individual or a larger organization can not be

Comment A TRUE DATA DISASTER . . . (Score 1) 113

A true 'data disaster' would have to be defined to include: 1) loss of data (including minor and major losses)[data is gone]. 2) loss of integrity of that data [the current data cannot be authenticated]. 3) loss of use of the data, even temporarily [loss of access]. 4) loss of the confidentiality of the data [unauthorized exposure of the data, including unauthorized capture]. 5) Unauthorized USE of the data. --->> whether the loss is for an individual or a larger organization can not be a consideration in the definition. the definition would include such loss as may caused, directly or indirectly, by authorized possessors of the data AND unauthorized possessors of the data. Data Disaster. HOW TO PREVENT DATA DISASTER . . should be a topic

Comment BIOMETRICS Re:The State of Data is Not Good (Score 1) 113

biometrics is harder to maintain than one would think (and therefore harder to use). in my experience, once enrolled onto a system, BOTH, a system hardware change and a system SOFTWARE change, can corrupt the file(s) holding the biometric data. The fix is easy for me, -just turn off the biometrics BEFORE making such changes. But for Jane and Joe user, who don't understand how or why to control 'automatic up-dates', biometrics become just too much to deal with. (this is posted before I look at anything already posted below the post it is attached to)
Windows

Microsoft Kills Support For XP SP2 315

Trailrunner7 writes "Microsoft's announcement this week that it is preparing to end support for machines running Windows XP SP2 not only represents a challenge for the thousands of businesses still running SP2, but also is the end of an era for both Microsoft and its customers. It wasn't until 2004 that the final release of XP SP2 hit the streets, but when it did, it represented a huge step forward in security for Windows users. It wasn't necessarily the feature set that mattered as much as the fact that the protections were enabled by default and taken out of the users' hands."

Comment Re:Sweeping Conclusion (Score 1) 389

I concur here with Ivmond01. We're no longer in the 80's or 90's, so uninformed, unchecked internet use doesn't make sense, no matter what OS you may be using. And, Yes, of course the attack vector may be changing (again)(routers and modems). -What else does an informed user expect? -Perhaps we do need to think about internet licenses, for both the user and the machine!!! ( -:
Image

Google Street View Shoots the Same Woman 43 Times 106

Geoffrey.landis writes "Terry Southgate discovered that his wife Wendy appears on the Google Street View of his neighborhood not once or twice but a whopping 43 times. From the article: 'It seems as if the Street View car simply followed the same route as Wendy and Trixie. However, Wendy was a little suspicious that the car was doing something on the "tricksie" side. Several of the Street View shots show Wendy looking with some concern towards the car that was, well, to put it politely, crawling along the curb. "I didn't know what it was doing. It was just driving round very, very slowly," Wendy told the Sun.' The next best thing to being a movie star — a Street View star!"

Comment CoNfuSiOn cOnTinues to reign (Score 1) 510

MA is trying to protect its' citizens and their rights. All States probably have requirements TO DO this exact thing (make laws that protect its citizens). If they are not required to act upon obvious 'wrongs' to its citizens (failure of PII gatherers to protect that information from being used\misused in ways not authorized by the owners [the citizens]), who is the citizen to turn to for protection? This subject should be a 'common sense' thing but just isn't, MOSTLY because of financial reasons (which happens a lot in business). This law is requiring thoughtful consideration of everything about 'information technology', including the consequences of not thinking about it all, and pulling organizations away from just thinking about ROI and 'ease of use'. Most gatherers of PII admit that the owners of that PII are entitled to protections against unauthorized\misuse of their PII, but for financial reasons the gatherers argue that requiring them to be the protectors is just not fair to them. This idea that MA is going towards cannot be considered a bad thing, so what is all this other arguement about ?

Comment employer has needs too (Score 1) 2

in the event of a breach whose root cause can be whittled back to having been 'allowed' [ because ] there was no 'reasonable' password policy in place and enforced that was designed to decrease the chances of a breach from occurring, the administrator and\or owner of the system can be sanctioned, and\or insurance coverage to mitigate the loss can be denied. The users will learn to understand that; learn and accept that their 'use' of the systems requires compliance, and will stop complaining. -The next job of similar responsibility requires it too.

Comment Info Security to Protect the business WILL meet co (Score 1) 196

over a year ago, this post "Security by compliance is obviously not working. We need to stop thinking about information security and start thinking about information risk management. Compliance should be approached from a risk management, and not a purely technical, perspective. You need to do information security not to meet compliance but to protect the business. There is a huge difference between those two methodologies. We need to identify, govern and manage IT risk for security, and therein realize compliance." see it at http://www.linkedin.com/myprofile?trk=hb_tab_pro
Bug

Outlook 2010 Bug Creates Monster Email Files 126

Julie188 writes with this snippet from Network World "Office 2010 is still in beta and a patch is already out. Microsoft is trying to fix a bug in the email program Outlook 2010 Beta that creates unusually large e-mail files that take up too much space. The Outlook product team has offered a bug fix for both 32-bit and 64-bit systems that fixes the problem going forward, although previous emails will remain super-sized. This could be a problem for email programs that limit message sizes, such as Gmail or BlackBerry."
Science

Why Time Flies By As You Get Older 252

Ant notes a piece up on WBUR Boston addressing theories to explain the universal human experience that time seems to pass faster as you get older. Here's the 9-minute audio (MP3). Several explanations are tried out: that brains lay down more information for novel experiences; that the "clock" for nerve impulses in aging brains runs slower; and that each interval of time represents a diminishing fraction of life as we age.
Space

Space Photos Taken From Shed Stun Astronomers 149

krou writes "Amateur astronomer Peter Shah has stunned astronomers around the world with amazing photos of the universe taken from his garden shed. Shah spent £20,000 on the equipment, hooking up a telescope in his shed to his home computer, and the results are being compared to images taken by the Hubble Space Telescope. 'Most men like to putter about in their garden shed,' said Shah, 'but mine is a bit more high tech than most. I have fitted it with a sliding roof so I can sit in comfort and look at the heavens. I have a very modest set up, but it just goes to show that a window to the universe is there for all of us – even with the smallest budgets. I had to be patient and take the images over a period of several months because the skies in Britain are often clouded over and you need clear conditions.' His images include the Monkey's head nebula, M33 Pinwheel Galaxy, Andromeda Galaxy and the Flaming Star Nebula, and are being put together for a book."
User Journal

Journal Journal: MEMORY RANKING

wOw!! we've been duped! memory ranking !!! check it out!!

Slashdot Top Deals

Prediction is very difficult, especially of the future. - Niels Bohr

Working...