Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Poison profile information (Score 1) 459

Why hide or delete personal information? Instead, fill all those fields with rubbish. Each one these sites that ask for all sorts of personal information like DoB, Schools, Work places, IM handles, Blog URLs, Home town, home address etc. Fill out each profile on every site in as much detail as you can. Only use your real name. Everything else should be borrowed. Next time a marketer buy *your* profile information, they will get junk. Anyone who Google's you will get five different people with your name who actually do not exist (if you fill out all info on five different sites like FB, flickr, MySpace etc). Make sure you fill out different information on each site. Spread the information geographically as much as possible so like you were born in Ethiopia, studied in Russia, worked in France and now live in Japan. For work places, pick companies that are now bankrupt and liquidated.

Comment Generic security info (Score 2) 97

"In chapter 1, the authors note that a smart grid is not a single device, application, system network, or even idea. And that there is no single authoritative definition for what a smart grid is. With that, the initial chapter sets and defines the various aspects to smart grid."

Read - we took generic security concepts and replaced "computer network" with "smart grid" in the text.

As someone who has worked for a successful smart grid company, there is very little known outside of these start-ups about how smart grids work. Most talks you see around *smart grid* security at blackhat or defcon are centered around decade old meters and technology. Those are ancient!

Comment Real vigilantes do not (Score 5, Insightful) 429

1. Attack Amazon's infrastructure from their home computer
2. Post about it on twitter
3. Make videos of the attack and blog
4. Try to recruit sidekicks
5. Brag about it on IRC and the interwebs

You do any or all of the above, and you are not a vigilante or a cracker. You are just another idiot you got his/her paws on a computer.

Comment Re:Still getting over penis-shock. (Score 1) 609

To be precise, airport security in India is not handled by Indian Military. The organization in-charge for security at airports is CISF or Central Industrial Security Force. They are trained and equipped more like a para-military force and are trusted with guarding civilian commercial installations like airports, civilian nuclear sites, power plants or other government owned critical infrastructure. Local police also have some presence at airports but that is on the periphery like making sure traffic around airports is maintained, taxis queue up properly and any arrests are processed by the police. http://en.wikipedia.org/wiki/Central_Industrial_Security_Force

Comment Useless security theater (Score 2, Informative) 109

First, as an Indian, I am least shocked at what the government is trying to do. This is what bureaucrats in India do best, that is, fleece money from businesses by pulling up arcane/useless laws and regulations. Behind closed doors, RIM must have bribed dozens of bureaucrats in at least half a dozen government departments. My father worked for an Indian company and was in charge of setting up a power generation plant. He said he had to bribe a dozen different ministries just to get the paperwork moving on prospecting for the site. What's the value of Indian law enforcement agencies being able to tap into RIM? Zilch, squat, none, nada, nil, shunya! After all the circus around this issue, what brain-dead criminal will use blackberry to cover up tracks? This will mostly be used by politicians to settle scores, dig up dirt on each other and sell trade secrets of one business to other or harass them. As any Android or iPhone owner will know, just go to Android market place or iTunes store and there are dozens of apps for encrypting text messages and files. Not happy with closed source apps? Use openssl, gpg or half a dozen other opensource tools to encrypt communications such that no law enforcement agency can crack it in a timely manner to help with an investigation. Much less Indian law enforcement agencies that can barely use computers much less have access to super computers to do any cracking. As for Indians, they are mostly pro-government on this issue. Why? Because RIM acceded to similar demands by UAE and Saudi Arabia so now their national pride is hurt when a foreign company complies with laws of tiny Emirates but not their mighty nation. People in India are tired of a non-functional government that does not take foreign corporations to task for even mass murder (read Bhopal Gas leak). So when they see a government department screw a foreign corporation, they cheer like this will somehow help. It WON'T!!!

Comment Re:what a joke (Score 4, Funny) 187

Here's how iris scanners can help fend off an attack. When attacked: 1. Throw an iris scanner real hard at the attacker. Don't worry if you miss, there are plenty more around you. 2. Offer an iris scanner to the attacker (should sell well on ebay) 3. Point iris scanner at the attacker and threaten to vapourize them. 4. Quickly hack into the iris database, delete attacker's identity. This will lead the attacker to question his existence and the attacker will simply implode. 5. Run! of course, iris scanner plays no role here.
Image

Girl Seeks Help On Facebook During Assault 417

A 12-year-old girl who was being assaulted by her mother's ex-boyfriend used some quick thinking by sending a message on her iPod to a friend's Facebook account for help. The friend was able to contact the girl's mother who then contacted the police. 42-year-old Raymond Ernest Cesmat was arrested and charged with two counts of criminal sexual conduct in the first degree. He is being held at the Dakota County Jail on $175,000 bail.

Slashdot Top Deals

Trying to be happy is like trying to build a machine for which the only specification is that it should run noiselessly.

Working...