Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - Federal Court OKs Dish Network's Internet Streaming TV Service (itworld.com)

jfruh writes: Fox, armed with the recent Supreme Court ruling that effectively banned Aero, went to court to stop the Dish Network from allowing its subscribers to stream live and DVR'd content over the Internet to their devices. But a federal court ruled that the situations are different: Dish has already purchased retransmission rights from content creators, and the streaming service falls within the rights of individual subscriber to place- and time-shift content.

Submission + - Oracle Releases Massive Security Update (securityweek.com)

wiredmikey writes: Oracle has pushed out a massive security update, including critical fixes for Java SE and the Oracle Sun Systems Products Suite. Overall, the update contains nearly 170 new security vulnerability fixes, including 36 for Oracle Fusion Middleware. Twenty-eight of these may be remotely exploitable without authentication and can possibly be exploited over a network without the need for a username and password.

Submission + - Silverlight exploits up, Java down, Cisco reports (computerworld.com.au)

angry tapir writes: Attempts to exploit Silverlight soared massively in late 2014 according to research from Cisco. However, the use of Silverlight in absolute terms is still low compared to the use of Java and Flash as an attack vector, according to Cisco's 2015 Annual Security Report. The report's assessment of the 2014 threat landscape also notes that researchers observed Flash-based malware that interacted with JavaScript. The Flash/JS malware was split between two files to make it easier to evade anti-malware protection. (The full report is available here [registration required].)

Submission + - Cybersecurity Readiness: Widening Gulf Between Perception And Reality

An anonymous reader writes: Attackers have become more proficient at taking advantage of gaps in security to evade detection and conceal malicious activity, according to Cisco. Cyber criminals are expanding their tactics and adapting their techniques to carry out cyber attack campaigns in ways that make it harder to detect and analyze. These issues are further complicated by the geopolitical motivations of the attackers and conflicting requirements imposed by local laws with respect to data sovereignty, data localization and encryption. Users are caught in the middle. Not only are they the targets, but end-users are unknowingly aiding cyber attacks.

Submission + - GCHQ intercepted emails from The New York Times, Reuters, BBC, and others (theguardian.com)

An anonymous reader writes: GCHQ's bulk surveillance of electronic communications has scooped up emails to and from journalists working for some of the US and UK's largest media organisations, analysis of documents released by whistleblower Edward Snowden reveals.

Emails from the BBC, Reuters, the Guardian, the New York Times, Le Monde, the Sun, NBC and the Washington Post were saved by GCHQ and shared on the agency's intranet as part of a test exercise by the signals intelligence agency.

Comment Bethany Mota© the fashon icon .. (Score 1) 105

'Bethany Mota' a very clever way of selling product to kids, under the guise of some Valley girl just hanging in her bedroom with her Youtube 'friends'. Marketing exec: 'We got a contract to shift some .. 'batiste dry shampoo', 'Bumble and Bumble City Swept Finish', 'white eyeliner', 'red lipstick', 'mascara', 'vests from Target', 'skirt from For-ever-21', 'boots from For-ever-21', 'tanktop', 'Blue dress from LX-Fashion', 'White shoes from American Apparel', 'Purse from Clothing Line', 'Overalls from Love Culture', 'American Flag T-shirt from Brandy Melville', 'Backpack from Target', 'White dress from For-ever-21', 'Black-&-White Wedges', 'Headband from Michaels Craftstore'. If you're a teenage girl out there, if you buy all this product, then you can also have Bethanys lifestyle.

Fourth of July Outfit ideas, DIY Treats + Hair & Makeup!
ref: Valley Speak

Comment You've just crossed over into the Twilight Zone .. (Score 4, Insightful) 81

"NSA .. are planning .. to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money."

Did I just slip through a crack in the universe, to a place where the past decades of computer intrusions didn't take place. If so, then that would explain why people are still connecting their critical infrastructure directly to the Internet.

Comment Torvalds: in his own words .. (Score 1) 361

Comment: It's the very first question, any idea as to who asked the first question, talk about being ambushed! A classic, generate some controversy at the conference and then only report on that. I wonder did anything of a technical nature occur at the conference.
--

transcript starts from 10.00:-

Q : Morning, so Linux, nice easy question to start with (laughter). Over the years there have been various people including myself who have either reduced their involvement in the kernel community or stepped away from it entirely due to the tone on LKM and especially your contribution to that. Why do you continue to argue that being really unpleasant to people is good leadership.

A : Part of it, fair question, that's not actually my real argument. My real argument is that people are different and I'm a really unpleasant person (laughter). I mean that's what it really boils down to. Some people think I'm nice and some people are then shocked when they learn different. And I'm not a nice person and I don't care about you - really seriously (laughter). I care about the technology and I care about the kernel and I really think that a lot of projects in the Open Source community sometimes care about non-technical things too much. And the reason I say that is that the only thing we can actually agree on ever tend to be technical issues. And if we start making a big deal about non-technical issues - that are important - don't get me wrong. I'm not saying they're not important, I'm saying whenever we start making non-technical issues primary issues - that just guarantees we'll never agree - right. And .. I'm not trying to really make excuses, I'm more trying to explain that this is where I come from.

And I appreciate the diversity in Open Source, but to me that diversity is not about gender, it's not about skin color, it's about - people are different. And people are different in what they are interested in. People are different in what they're good at. Skin color and gender and all these issues that get brought up as really important things - those are details. What is great about Open Source is that some people are unpleasant but they're technically really good - right. Some people are pleasant and like bring other people in and I think that's one of maybe the most important of Open Source - is that you can do what you're good at. So when you look at bringing in minorities, bringing in females, bringing in people who don't speak English. My argument has been and is, that we should look for people who are good at being the people who can be between other people - right. There are a lots of good kernel developers who are great at working with people. And they may not ever be great technically - and that doesn't matter - because we all have strengths. And this is my argument - and I refuse to change - well no - that sounds bad (comment "s'not quite true" laughter). It's not that I refuse to change, it's that I don't think I want to try to bow down to what other people think.

My personal personality is pretty abrasive, I love arguing. Appearing at the Museum of Technology I spent the whole time just arguing with people (laughter). And if you're that kind of personality - when you are on LKM - you will argue. And I know they're are other kernel developers that are like me. And I know they're are other kernel developers who are not like me - and that's all wonderful. That was a really long answer to a really simple question. But the fact is - that's how I feel.
-

Keynote: Linus Torvalds Linux.conf.au 2015 -- Auckland, New Zealand

Comment What Africa Really Needs To Fight Ebola? (Score 3, Informative) 83

What Africa really needs to fight Ebola is to stop traditional burial practices, such as allowing traditional healers to wash the dead body and then travel back to their home village and spread the contagion. Where there is one case, quarantine the village and cremate the deceased. To quote: "Ebola victims are most infectious right after death—which means that West African burial practices, where families touch the bodies, are spreading the disease like wildfire." In Guinea, 60% of all cases had been linked to traditional burial practices."

Comment Yet another cyber-terrorist-bullshit story .. (Score 1) 110

NSA wants to further increase its surveillance of the American people, the NSA dreams up a bullshit story about terrorists using spam to hide msgs. Just who at the NSA would advise their staff to EXCLUDE spam from it's spying machine and why is slashdot posting this bullshit story on the front page?
--

further reading ref

Slashdot Top Deals

Computer Science is merely the post-Turing decline in formal systems theory.

Working...