Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:cd tax (Score 1) 430

Pretty much this is a major legal limbo.

There was a judgment that basically said that since we pay the cd-tax, we can't be sued civilly for using CDs to pirate music. That was appealed and set aside, meaning that legally the issue is undecided. The RCMP (our FBI) also said that they have much more important things to do then to investigate personal use pirates.

http://en.wikipedia.org/wiki/File_sharing_in_Canada has a decent writeup of the situation.

Keep in mind that there is also much more to the Pirate Party then file sharing. Patents and Privacy are also very important aspects we fight on, and we've recently added Digital Sovereignty to counteract the Cybersecurity bill in the USA.

Comment Multiple ways (Score 1) 497

I manage a bunch of physical and VPS servers, all colocated at various facilities. Using gvpe and dedicated switches, I've built a VPN between the locations and my house that allows ssh access between the machines. The vast majority of SSH servers only listen on the private IP address. There is no special access for traffic inside the VPN, and ssh keys are mandatory to login to these servers. In case something happens to the VPN gateways, there is an alternate host that accepts connections using port knocking (which is about 100% effective against automated attacks) and contains a whitelist of known good IP addresses. Fail2Ban still runs on it and it can ban IP addresses on the VPN is something untowards happen. Sometimes my customers require SSH access to the server. I apply the following order of preference:
  • OpenVPN/PPTP to the client machines
  • Port knocking
  • Different SSH Port

The problem is that all solutions need more work from the customer and that's sometimes something they just don't want to deal with. If I'm really really stuck, what I do is set fail2ban to block on the first failed attempt. That server also gets removed from the VPN network and thus do not get any backup or MySQL replication. No matter what, there is no root password login enabled.

Comment First, know the load! (Score 3, Informative) 260

Not knowing the load required on the UPS makes it very hard to tell what kind of UPS you need. You need to know how many watts are used in the rack to be able to plan some proper UPS capacity.

apcupsd can be networked between machines and can trigger auto shutdowns of all of them, including VM guests.

Some virtual machine system can also suspend all VMs on shutdown which could be a better alternative then shutting them down. Again, without knowing which VM system you use it's hard to get into details.

Comment Re:As a Canadian... (Score 1) 271

As a Canadian, I have decided to actively help the Pirate Party set up shop in Canada. I am happy to say that we are on track to apply for registration in the next few weeks. We are just waiting on 2 pieces of paperwork (one from Industry Canada, one from an accounting firm) to complete the huge stack of paperwork we've already accumulated.

You can find more at http://www.pirateparty.ca/

Comment I have it with -all (Score 1) 263

A few people are inconvenienced because they have to connect to a different port then the default due to ISP firewalling.

I would really really like it if more ISPs were checking them and silently discard anything that is flagged as spam _AND_ fails SPF instead of bouncing it back.

We get thousands of bounces addressed to non-existant users, which in turn makes into a double bounce. Of course now I've set our system to silently delete them instead. Else it's just a colossal waste of resources.

Computers Key To Air France Crash 911

Michael_Curator writes "It's no secret that commercial airplanes are heavily computerized, but as the mystery of Air France Flight 447 unfolds, we need to come to grips with the fact that in many cases, airline pilots' hands are tied when it comes to responding effectively to an emergency situation. Boeing planes allow pilots to take over from computers during emergency situations, Airbus planes do not. It's not a design flaw — it's a philosophical divide. It's essentially a question of what do you trust most: a human being's ingenuity or a computer's infinitely faster access and reaction to information. It's not surprising that an American company errs on the side of individual freedom while a European company is more inclined to favor an approach that relies on systems. As passengers, we should have the right to ask whether we're putting our lives in the hands of a computer rather than the battle-tested pilot sitting up front, and we should have right to deplane if we don't like the answer."
Transportation

Funding For Automotive Fuel Cells Cut 293

rgarbacz writes "The US will stop funding research on automotive fuel cells and redirect the work towards stationary plants, because of slow progress on the research. Developing those cells and coming up with a way to transport the hydrogen is a big challenge, Energy Secretary Steven Chu said in releasing energy-related details of the administration's budget for the year beginning Oct. 1. Dr. Chu said the government preferred to focus on projects that would bear fruit more quickly. The industry and the National Hydrogen Association criticized the decision and declared their intention to fight for funding. Dr. Chu also announced that funding for a coal gasification pilot project, cut by the Bush administration, will be reinstated. The Obama administration will also drop spending for research on the exploration of oil and gas deposits because the industry itself has ample resources for that, Dr. Chu said."
The Internet

Time Warner Pulls Plug On Metered Billing Tests 112

fudreporter is one of many who writes to tell us that Time Warner is not planning to continue their tiered consumption tests at this time. The company is not completely admitting defeat, stating that they "may return to the idea in the future," but for now the test has been shut down. "The plan would have established several tiers based on how much consumers use the Internet. Time Warner Cable had said at the time that it believed that consumers who download the most content need to pay more to cover infrastructure upgrades. The plan was first announced two weeks ago, then modified with higher download caps last week. In a news release yesterday, Glenn Britt, the chief executive of Time Warner Cable, said, 'We will not proceed with implementation of additional tests until further consultation with our customers and other interested parties, ensuring that community needs are being met.'"

Comment Re:Your choice (Score 1) 958

Always give them 2 options, one of them to accept and one so bad that they have to refuse it. This creates the illusion of leadership and will make them feel important and valued.

Don't bring more then 2 options as everything will get muddled up.

As you said that it is a small company, see if you can have a quiet talk with the owner of the company, they might not actually be aware of the situation, nor of the danger.

Of course in a lot of cases a basic install of Ubuntu will allow someone to do their job. But keep in mind that it isn't in all of the cases.

Comment Re:I've been doing this for years (Score 1) 399

Like many technological things (BGP and DNS comes to mind), caller id is trusting.

When you use *67 to block a caller id, the caller id is still sent, but with a privacy flag turned on so that the _end point_ equipment can conveniently not display it.

If I call into my Asterisk PBX on a SIP line with *67, the caller id will show up in the variable that holds the caller id, allowing me to do nice and wonderful things with it.

It won't show up on my Polycom phone, unless I explicitely set the privacy header of SIP to show the number.

Privacy

Repairing / Establishing Online Reputation? 564

illini1022 writes "I'm currently a senior nearing graduation from college. With studies focusing on power and energy I believe I have set myself up extremely well for post-graduation employment. I have one concern. The top search result on Google for my full name is a blog posting regarding an article about a pedophile that happens to bear the same name as myself. The blog also originates from a city I lived in during one summer (specified on my resume). Upon closer inspection, it would become quickly apparent that the subject in question is not me. The person of interest was in the military, and I have never been. However, I fear this unfortunate coincidence might cost me chances at employment with companies I'm now applying to. I have absolutely no issue with any employer finding anything I've put on the Internet; I have been careful to protect my reputation. My concern is with an employer mistaking me for someone else, and disqualifying me from recruitment. I've attempted to contact the blog owner to no avail. What are my options? Am I overreacting? Should I attempt to set up my own site that would steal the top Google search from this blog posting? I appreciate any insight/advice."

Slashdot Top Deals

The last thing one knows in constructing a work is what to put first. -- Blaise Pascal

Working...