Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Congrats... (Score 1) 1123

Who is trying to assert authority over you???

The discussion is about scientists hiding their beliefs because of perceived hostility towards those beliefs. You appear to have plenty of that hostility.

Groups with deep beliefs always push for laws to be interpreted in line with those values. This is true if you're the ACLU trying to get a cross removed from public land (or formerly public land) because you feel it is akin to state-sponsored religion or if you're a church group arguing that freedom of religion is not freedom from religion. Both are acting in a way consistent with their beliefs and ostensibly working for the greater good. People can disagree completely and still respect one another.

You seem to be in the angry minority who sneaks in during the night to tear the cross down.

Are you angry that people believe in God when you do not? Are you angry because you think God doesn't believe in you? Or are you one of those types who just like to froth at the mouth while tilting at windmills?

Grow up.

Security

New "Spear Phishing" Attacks Target IT Admins 134

snydeq writes "A new breed of 'spear phishing' aimed at IT admins is making the rounds. The emails, containing no obvious malicious links, are fooling even the savviest of users into opening up holes in their company's network defenses. The authentic-looking emails, which often include the admin's complete name or refer to a real project they are working on, are the product of tactical research or database hacks and appear as if having been sent by the company's hosting provider. 'In each case, the victim remembered getting a similar sort of email message when they first signed on with a service and, thus, thought the bogus message was legitimate — especially because their cloud/hosting providers keep bragging about all the new data centers they're continuing to bring online.' The phishing messages often include instructions for opening up mail servers to enable spam relaying, to disable their host-based firewalls, and to open up unprotected network shares. Certainly fodder for some bone-headed mistakes on the part of admins, the new attack 'makes the old days of hoax messages that caused users to delete legitimate operating system files seem relatively harmless.'"

Slashdot Top Deals

One good reason why computers can do more work than people is that they never have to stop and answer the phone.

Working...