Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:No difference (Score 0) 105

I agree completely. When I first started using an dreaded (an old LG keyboard phone with a JavaME spun reader I had hacked on to it) I found reading a bit of a chore. It took me a few days to get really comfortable with the seemingly small and yet ultimately pricing differences. Now I regularly read books on my smartphone and tablet without a hitch, and have noticed no recall problems.

Comment Re:I call bullshit (Score 4, Interesting) 89

The hospital had an Internet-facing router that was accessible via SSH or HTTPS?

If they were stupid enough to do that, then someone else had probably stolen all their data already.

What if it was a Juniper SSL VPN Appliance? TFA is a bit vague; but if the system has VPN access and Juniper gear it seems pretty likely that they might be using that, which would necessarily involve SSL on an internet facing device, though not necessarily SSH or HTTPS.

Comment Re:nuke it in orbit... (Score 4, Insightful) 117

what makes you so sure it is of terrestrial origins?

Unless this is Star Trek, where the entire biodiversity of the galaxy can be accounted for by face paint and is sexually interoperable with starfleet captains, we can make an overwhelmingly likely inference based on the chemistry. If its DNA and assorted important chemistry closely matches a terrestrial species it is very likely to be from around here.

Comment Re:I hope it's just me (Score 1) 748

Is it really a 'hostile takeover' if the management voluntarily decide to do it for their own interests(whether perceived quality, ad revenue, subscriber base, or some combination of the above)?

Between the first amendment and the explicit immunities specified by section 230 of the Communications Decency act, a site operator is pretty damn ironclad even in the case of absurdly nasty forums (so long as the copyright infringement is kept to a dull roar and the service isn't linked to too many gruesome murders). If they wanted to take a stand on the matter they would have little difficulty doing so. Apparently they don't see that as worth the trouble.

Comment Re:Ubiquitous Common Denominator (Score 3, Interesting) 235

There is still some faxing going on at our office, but the ubiquitousness of easy-to-use scanners means more and more of the documents that we used faxes for are just being sent via email. We won a contract a few years ago and literally had the hundred page document faxed to us, and then we signed and witnessed the back sheet and sent it back via fax. The last amendment was done via email. When even the lawyers are walking away from fax machines, it is definitely a technology on the wane.

Comment Re:Reduced rights (Score 1) 166

Well, there have been a whole host of attacks associated with vulnerable versions of Flash and Java that could at least cripple a profile. I ran up against one of them around 2010. One of the staff at one of our remote locations suddenly had all their files supposedly disappear, desktop wiped out and the like, and a notification about a ransom if they wanted the files back. The user had no admin privileges, so I checked, and sure enough, the other profiles were untouched. What had happened is the auto updater for the workstation had failed.

Now, while it's true that the operating system itself was not compromised, and no other systems or users on the network were compromised, certainly there was enough control to potentially view confidential data on shared drives. While this was relatively unsophisticated ransomware, it did teach me than merely obsessing about privilege escalation does not lead to a secure system. User profiles and directories can still potentially be vulnerable even if the malware can't root the system.

Slashdot Top Deals

A meeting is an event at which the minutes are kept and the hours are lost.

Working...