Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Businesses

How Do You Justify the Existence of IT? 411

bakamaki writes "I work for a small manufacturing company as a SysAdmin. My boss is a DBA. We are the only IT employees. He recently decided to record hours spent on his projects and then evaluate how much time the databases he writes save the employees. Then he translates that into a $ figure. He's asking me to do something similar but I'm kinda at a loss. It seems most of the stuff I do is preventative, IE care and feeding of servers and network infrastructure in addition to all the break fix stuff I do for the user base with their desktops. When in this position what do you folks usually do?"

Comment Re:WPA2 is NOT broken (Score 1) 311

Yes, wired is more secure from many standpoints. First of all, as the person above me points out, you need to gain physical access to the wire in order to attempt to snoop it and have specialized tools to do so. Above and beyond that, breaking through the siding of someone's house, tearing out their insulation is something that is illegal and it would be difficult not to make the occupants aware of that due to the racket it would cause. Of course, there is always the possibility that such a criminal would be willing to wait for an opportunity for the occupants to vacate the premises in order to perform this act. Even so, the occupants would probably be aware of the illegal activity due to the physical damage caused.

With a wireless network on the other hand, the hacker doesn't have to be on the other person's property to sniff their network and can do so without the person being aware of it. Furthermore, if the person never once logs on to the other person's network in anyway so as to log packets that indicate such a thing and instead just snooped the over the air signal and captured personal information like a credit card number, it would be hard to prove that they even did such a thing. Not that I condone such actions but to me snooping a wireless signal is like overhearing a loud conversation in the next door neighbor's house.

For these and many other reasons, when our house was built, I worked out a deal with the guy overseeing the construction of our house and ran my own cable and put my own junction boxes and patch panel in.

Republicans

McCain Campaign Protests YouTube's DMCA Policy 597

Colz Grigor writes "It appears that CBS and Fox have submitted DMCA takedown notices to YouTube for videos from the McCain campaign. The campaign is now complaining about YouTube's DMCA policy making it too easy for copyright holders to remove fair-use videos. I hope they pursue this by addressing flaws in the DMCA."
Software

OpenOffice.org 3.0 Is Officially Here 284

SNate writes "After a grinding three-year development cycle, the OpenOffice.org team has finally squeezed out a new release. New features include support for the controversial Microsoft OOXML file format, multi-page views in Writer, and PDF import via an extension. Linux Format has an overview of the new release, asking the question: is it really worth the 3.0 label?"
Television

TiVo PC Could Be a Game-Changer 191

An anonymous reader sends in an article by Andrew Keen (author of "The Cult of the Amateur") about TiVo's new TiVo PC, which he believes could seal the fate of advertising on online videos. Just as TiVo let viewers zap commercials on broadcast TV, TiVo PC — a TV tuner that can be plugged into a PC — will let Net viewers of the likes of Hulu.com and ABC.com skip commercials in the nascent medium of online video. Keen believes that TiVo's business model involves (besides selling lots of $199 boxes) mining and selling the far richer stream of user behavioral data that TiVo PC will enable.
The Internet

Quarter of Workers' Time Online Is Personal 248

sloit writes "Most people spend more than 25 per cent of their time online at work on personal activities. And 80 per cent of emails sent by volume in the workplace are personal. Bosses often have no way of tracking Internet activity or policies to define what staff can and cannot do. Paul Hortop, who reviews company network security for consultancy Voco, said the most common websites visited by personal web surfers were online trading sites, instant messaging/chat services and peer-to-peer sharing sites (allowing movie, music and software sharing)."
Communications

Email-only Providers? 601

Amiralul writes "I feel that having GMail or Yahoo email domains on my business card isn't really a professional touch. Yes, I do have a work-domain email address, but it lacks IMAP and it's rather non-responsive from time to time, so I choose not to depend on it for the time being (the previous mentioned free services are actually more reliable). Besides buying a domain and using Google Apps on it (which isn't actually intended for home users), I was thinking on having a domain of my own and choosing a commercial email provider that should provide just that: email (POP3, SMTP, IMAP, with a decent storage space). I don't need storage for my website, I don't need an ugly web interface (if provided and looks decent, maybe I'll use it, but it's not a must-have). If it's free, it's ok, but it doesn't bother me if it has a decent monthly or annual fee. So, do you Slashdotters know any providers that would satisfy my email-related needs?"
Windows

Black Screens For Unauthorized Copies of Windows 762

arcticstoat writes "In a bid to deter people from using pirate versions of Windows XP, Microsoft is now updating its Windows Genuine Advantage (WGA) tool to introduce a few uncomfortable niggles for users of pirated versions of Windows. These include replacing the desktop wallpaper with a black screen every 60 minutes, although you can still replace it with your wallpaper of choice in the intervening period. As well as this, copies of Windows deemed to not be genuine will also have a translucent watermark above the system tray, which Microsoft calls a 'persistent desktop notification.'"
The Courts

Where To Draw the Line When Punishing Email Snooping? 124

CWmike writes "While it might seem like a practical joke or a harmless, furtive glance, e-mail snooping could land you in more hot water than you'd ever expect — you could be charged with a federal crime. The recent case of a Philadelphia TV news anchor charged with breaking into his co-anchor's e-mail accounts shines a light on the seriousness of such snooping. Scott Christie, a former federal prosecutor who headed up the computer hacking section at the U.S. Attorney's Office, said, 'You look over someone's shoulder and read a personal letter and that's not a crime, so how can it be a crime to access someone's e-mail? It's not the same thing, of course... What you're doing when you're accessing e-mail is affirmatively exceeding your access to electronic documents and systems.' He adds: 'Usually, you're doing that by pretending to be that person to break into their account.'" It's worth noting that the Philadelphia man accessed his co-worker's email over 500 times, and his use of the information he found was hardly harmless. However, the rules and conventions for email privacy are much less familiar to most people than the laws regarding snail mail. At what point does a privacy breach demand punishment?
Role Playing (Games)

Final Fantasy XIII Is Coming To Xbox 360 541

An anonymous reader writes "In a stunning change, Square-Enix announced today at Microsoft's E3 press conference that its next iteration in the Final Fantasy series is also coming to Xbox 360." And I just rationalized the PS3 purchase by telling myself that the next FF will require it.
Portables

Meet the Laptop You Will (Won't?) Use In 2015 231

robert2cane writes "The Compenion concept notebook, designed by Felix Schmidberger, eschews the familiar clamshell design in favor of two superbright organic LED panels that slide into place next to each other, making the notebook just three-quarters of an inch thick." Really this page is just some renderings of some concept computers that are pretty far out of practical production reach. Some interesting ideas, but mostly a whole lot of 'Yeah, right.'
Windows

Mass Effect DRM Still Causing Issues 593

An anonymous reader writes "There was some discussion last month about the proposed DRM for Mass Effect and Spore that required the game to phone home every ten days. They backed down from that, but have left in that a user is only allowed 3 activations per license key. A license key is burned up when the O/S is reinstalled, when certain hardware is upgraded (EA refuses to disclose specifics of what), and possibly when a new user is set up in Windows. Only in its first month, some users are already locked out of their games from trying troubleshooting techniques to get the game running."
Government

UK Can Now Hold People Without Charge For 42 Days 650

the_leander writes "Prime Minister Gordon Brown has narrowly won a House of Commons vote on extending the maximum time police can hold terror suspects to 42 days. There is talk of compensation packages available for the falsely accused. The chances of you getting that money however are slim to none, lets not forget, this is the same country that charges prisoners who have been falsely accused for bed and boarding costs."

Slashdot Top Deals

"Hey Ivan, check your six." -- Sidewinder missile jacket patch, showing a Sidewinder driving up the tail of a Russian Su-27

Working...