Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Hyde Park, Chicago (Score 4, Interesting) 330

When I was a graduate student at University of Chicago, the University's private police force was the third largest police force in Illinois, after the cities of Chicago and Springfield. That may still be the case. The University police patrolled the Hyde Park neighborhood of Chicago in which the University is situated. Hyde Park is surrounded on three sides by high-crime neighborhoods, and on the east by a park along the shore of Lake Michigan, but it was safe to walk the streets of Hyde Park at all hours of the day or night. University police patrol cars could constantly be seen cruising slowly up and down every street. In those days before cell phones were popular, you could walk up any street almost without ever taking your hand off an emergency call box. When I first visited Hyde Park for my interview, I remember being told the exact boundaries of where it was safe to walk. That included things like "make sure to walk only along the south side of 47th Street, never along the north side of the street."

Comment Not the right approach (Score 1) 2

Using the type system to achieve finer-grained control of capabilities is certainly a good idea. But some Haskell experts have commented on the Haskell reddit that the right way to do that is to use the classic monad transformers. This "new" approach is actually just a re-hash of an older approach that actually doesn't really work well. See this comment for more details.

Comment Re: hushmail (Score 1) 410

Their TOS explicitly states they can and will decrypt emails if asked to by law.

They can only do that if they have your key. If you use their web interface to generate your key, or to send and read email, then they can be forced to decrypt your email. But if you generate your key yourself and use it to encrypt and decrypt locally, your are fine.

They are not worth looking at

I think that's a little harsh. They're doing the best they can, and they are being very honest about the inherent limitations.

Submission + - India's very own Satellite Navigational System (forbesindia.com)

mostwanted678452056 writes: To ease India’s dependence on America’s GPS and even to some extent on Russia’s Glonass, the Indian Space Research Organisation (Isro) has built its own geo-spatial positioning system, a regional one at that, and called it Indian Regional Navigation Satellite System (IRNSS). If all goes according to plan, the first satellite in this series will go up on July 1. By early 2015, all seven satellites in this constellation will be up there, 35,000 km above the earth, to make the system fully operational. It will provide an all-weather absolute position over the Indian landmass and 1,500 km beyond its geo-political boundary.

Read more: http://forbesindia.com/article/real-issue/isros-very-own-gps-is-ready/35511/1#ixzz2Xs9z9j55

Submission + - IXWebHosting suffers DDOS attack against DNS for more than a day (ixwebhosting.com) 1

ygslash writes: The DNS servers of IXWebHosting, a major domain name registrar, have been targeted by a massive DDOS attack against their DNS servers for more than 24 hours. The attack is still ongoing at the time this post is being written. All domains hosted by IXWebHosting are gradually becoming unavailable as their TTLs expire and the domains drop out of DNS caches around the Internet. Some details about this attack were posted on the company's support blog — but now their own domain name has passed TTL and can no longer be resolved. If anyone has an IP address for IXWebHosting, or some other way of finding out information about this attack, please post it in the comments. Are incidents like this evidence that the venerable DNS system is no longer robust enough to keep the Internet running in the modern era?

Submission + - Seven ways the US Government can access your cloud data (itnews.com.au)

littlekorea writes: Law enforcement authorities within the US Government have at least seven avenues open to collecting user data from web-based service providers, according to a 90-page report published by the University of New South Wales, law firm Baker & McKenzie and industry partners. Most of these legal instruments do not require a warrant, as they might in other countries.

Submission + - How secure are Snowden's laptops? (washingtonpost.com)

An anonymous reader writes: Marc thiessen, columnist for the Washington post, claimed in a recent op-ed that the biggest problem with Edward Snowden is the reams of data on his laptops. He wrote, "Snowden is reportedly carrying four laptop computers loaded with top-secret U.S. intelligence documents. No doubt the spy agencies in the countries he is visiting have been feasting on the reams of classified information in his possession.". Surely the laptops are encrypted and well protected given Snowden's background. How easy would it be for a country with a sophisticated cyber program to access the content of his laptops? Are the Chinese and Russians truly feasting or are still preparing the appetizers?

Submission + - New Vaccine May Protect People from Multiple Malaria Strains (jci.org)

Jagungal writes: It is being reported that Researchers at Queensland’s Griffith University have had promising results with a new vaccine against Malaria. The malaria parasite is transmitted by mosquitoes and kills over 600,000 people each year. The vaccine which has been trialed in mice is the first to trigger an immune response to the whole malaria parasite. Past research on the development of vaccines have mainly focused on targeting specific parasite antigens. However, researchers said that many of these vaccines have failed because the antigen targets are highly variable.

Comment Re:yank out the sticks (Score 1) 91

My understanding of Hetzner's report is that it works like this: there is a backdoor on a Nagios server (not clear whether that means a backdoor in Nagios itself, or some other kind of backdoor on a server whose purpose is Nagios monitoring). The attackers are able to use this backdoor to gain root on other servers within Hetzner, which they use to modify key daemons on those servers. The daemons are modified in memory as they run, and I'm sure the attackers are careful not to generate any logging events. So nothing at all is touched on disk for the servers being attacked. Nothing.

The backdoor on the Nagios server probably does persist across reboots. However, that also may be something that is remote in origin. For example, perhaps the backdoor is hidden in the Perl code of some Nagios module which is regularly updated by Hetzner (and probably plenty of other data centers) from some remote repository which the attackers have compomised. There doesn't even need to be any trace of the backdoor on the Nagios server most of the time. It only needs to be present for a few seconds every once in a while, say, once every few weeks, because the daemons it attacks are long-running processes.

Slashdot Top Deals

Testing can show the presense of bugs, but not their absence. -- Dijkstra

Working...