Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Submission + - Snowden Used Low-Cost Tool to Best N.S.A. (nytimes.com)

mendax writes: The New York Times is reporting, 'Intelligence officials investigating how Edward J. Snowden gained access to a huge trove of the country’s most highly classified documents say they have determined that he used inexpensive and widely available software to “scrape” the National Security Agency’s networks, and kept at it even after he was briefly challenged by agency officials.

Using “web crawler” software designed to search, index and back up a website, Mr. Snowden “scraped data out of our systems” while he went about his day job, according to a senior intelligence official. “We do not believe this was an individual sitting at a machine and downloading this much material in sequence,” the official said. The process, he added, was “quite automated.”

The findings are striking because the N.S.A.’s mission includes protecting the nation’s most sensitive military and intelligence computer systems from cyber attacks, especially the sophisticated attacks that emanate from Russia and China. Mr. Snowden’s “insider attack,” by contrast, was hardly sophisticated and should have been easily detected, investigators found.'

Submission + - LA building's lights interfere with cellular network, FCC says (networkworld.com) 5

alphadogg writes: When a certain Los Angeles office building lights up, it's a dark day for nearby cellphone users, according to the Federal Communications Commission. Fluorescent lights at Ernst & Young Plaza, a 41-story tower near the heart of downtown, emit frequencies that interfere with the Verizon Wireless 700MHz network, the agency said in a citation issued against the building owner. The FCC's message comes through loud and clear in the filing: the building owner could be fined up to $16,000 a day if it keeps using the interfering lights, up to a total of $112,500. The alleged violation could also lead to "criminal sanctions, including imprisonment," the citation says.

Submission + - ReactOS 0.3.16, the Windows clone has got a new Explorer (kingofgng.com)

KingofGnG writes: On the long, long road that leads to its final target, ReactOS continues to grow and evolve thanks to the hard work made by developers contributing to the project. The latest, important changes help the system to actually advance toward the aforementioned final target, ie to reach full compatibility with software and drivers made for Windows operating systems based on the NT architecture.

Comment Easy to do now (Score 1) 341

It doesn't require a kill switch. It doesn't require a change in hardware or an upgrade in the software. All it takes is a central database of the unique codes (I forget what they are called) each cell phone has that all reported stolen phones would be placed on and the legal requirement that a cell phone can not be activated if it is on the list.

Submission + - Is Whitelisting The Answer To The Rise In Data Breaches? (forbes.com)

MojoKid writes: It doesn’t take a rocket scientist to figure out that cyber criminals are quickly getting more sophisticated than current security, intrusion detection and prevention technology can defend against. And you have to wonder if the computer security industry as a whole is willing to take the disruptive measures required to address the issue head-on. One way to tackle the surging data breach epidemic is with a technology called “whitelisting.” It’s not going to sound too sexy to the average end user and frankly, even CIOs may find it unfashionable but in short, whitelisting is a method of locking-down a machine such that only trusted executables, DLLs and other necessary system and application components are allowed to run – everything else is denied. A few start-up security companies are beginning to appear in this space. The idea is to start with a known, clean system installation and then lock it down in that state so absolutely nothing can be changed. If you follow system security, regardless of your opinion on the concept of whitelisting, it’s pretty clear the traditional conventions of AV, anti-malware, intrusion detection and prevention are no longer working.

Comment Re:Yes, quite the cautionary tale indeed. (Score 1) 249

While your statement about Windows never shipping on a Mac is technically true, the "PC Compatibility Cards for Power Macintosh" cards came really close. They were basically most of a PC on a PCI card using a Pentium processor, so you could have a Windows machine running inside your PowerMac:

http://www.mug.jhmi.edu/mirrors/infoalley/0496/25/pc.html

They came with DOS installed, so you had to instal your own copy of Windows.

Comment Re:water in sci-fi plots (Score 1) 66

You are absolutely correct about the water plots in sic-fi being entertaining, but not realistic. Visitors to our solar system would be far more likely either grab icy asteroids from the asteroid belt (lots of them, and they are not at the bottom of a gravity well), or collect hydrogen and oxygen from any one of many sources and make your own. Sucking water off even an undefended planet is unlikely to make sense form an energy perspective.

But on the defense side: anyone with enough technology/experience to be able to cross interstellar space with the idea of fetching something (as opposed to colonization, where a desperate enough group could wing it) would have enough technology to wipe us off the face of the planet so quickly that we would have no chance. But the human race being obliterated by orbital bombardment does not make for entertaining cinema.

Comment Re: If you like it (Score 1) 171

You blame him for the health insurance providers taking the opportunity to use him as a whipping boy and take out their aggravation that their golden goose isn't looking too healthy?

In other news, Reagan said that trickle-down economics would work, and George W. showed up on an aircraft carrier claiming victory over a war that wasn't over yet, which we started because of falsified intel. Clinton said he didn't have sex with that woman, either.

Slashdot Top Deals

Diplomacy is the art of saying "nice doggy" until you can find a rock.

Working...