Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:What was the state thinking?!? (Score 1) 173

It doesn't sound like you read the article, but your questions are still just as valid. TFA states that they had not exhausted all non-GPS solutions to tracking him. But then it fails to go on the say why they felt they needed to track him in ANY capacity in the first place.

...but if I show up on time during the week and do my job

The TFA does indicate the employee "filed improper time sheets" and eluded to the fact that a "...pattern of misconduct and the difficulty of constant in-person surveillance justified the technique". Guess what, folks? It is not justified. Someone should be fired for this.

Security

Submission + - Blackboard 0-days expose exams, tests and data (scmagazine.com.au) 1

mask.of.sanity writes: "Multiple zero-day security vulnerabilities have been found in world's most popular educational software — holes that allow students to change grades and download unpublished exams, whilst allowing criminals to steal personal information.

Vulnerabilities in the Blackboard Learn platform have the potential to affect millions of school and university students and thousands of institutions around the world.

The platform is used by the United States military to train soliders.

The holes will remain unpatched until at least the end of the year, the company said."

Submission + - Windows 8 Will Run From USB Thumb Drive (computerworld.com)

JohnBert writes: "Windows 8 will include a new feature that lets IT administrators provide workers with a portable Windows environment on a USB thumb drive. Called "Windows To Go," the feature seems aimed at enterprises that want to equip employees with "complete managed Windows images" that they can use to turn a PC into a doppelganger of a secured in-house machine.

It's not known whether individuals will be able to use Windows To Go for the same purpose, or if the feature is enterprise-only. It's also unclear whether Windows to Go comes with a price tag: One report, based on a briefing with reporters at BUILD on Monday, said that the feature will cost about $50 per seat.

Microsoft declined to provide more information about the feature, which was among those demonstrated to analysts earlier this week, according to Michael Silver of Gartner. Instead, a spokeswoman referred to the short summary of a session at the BUILD Windows conference, which kicked off Tuesday in Anaheim, Calif. with a two-and-a-half-hour demonstration of some of the operating system's key components and changes."

Comment Cynical (Score 1) 79

The vast majority of commentors I've seen on both /. and the article itself are all kinds of cynical and this does not help /., and it doesn't help the community. It makes me sad.

Yes, we realize that you are an amazing h4X0r capable of creating code devoid of buffer overflows, race-conditions, (all sorts of) injection attacks, etc. Perhaps you've forgotten there is a spectrum of programmers and like it or not, you are probably an AVERAGE coder. (They don't call it average because everyone thinks they are great.) A programmer will always make assumptions about the underlying environment and will always have to sacrifice security functionality in the name of time/resource-savings. And in case you haven't noticed, some systems do not actually require DoD-level security with zero vulnerabilities. They merely require a level of security commensurate with the environment it runs in. It's one thing to design a system for physical attacks or reachable through a public IP and another thing entirely to protect against measured threats within a managed network environment or air-gapped system.

There is a wide spectrum of security risks and a wide spectrum of programmers and development practices. Corporations generally match them up appropriately, which is why you don't see outsourcing of internal top-secret DoD systems out on rent-a-coder.

Comment Thanks cmdrtaco (Score 1) 1521

There's nothing I can say that others haven't already said. I was introduced to this site in 2000-2001 and by then the uids were already in the high 5 digits. I also remember actually being able to have an email conversation with cmdrtaco about some bug or another on /. and being a little amazed at receiving an actual response within 15 minutes. It was - it *is* - the seeming connectedness of us nerds on /. that makes it one of the true cornerstones of the Internet.

Comment Re:Ask them (Score 2) 182

You do realize that PCI compliance covers things like the PoS terminals and the like, right? PCI Compliance is a security guideline document that is supposed to be used if you receive customer credit card information at all.

Period.

Do you use a PoS to process those cards? Is it secured? Is it connected to an open network or on a dedicated line? Is the credit card number printed on the slip? Are those slips secured in a safe place? Does the minimum number of people have access to this slips? etc.

It is NOT a system just for web e-commerce, but most people seem to think that it is.

Comment Re:Letting it all out (Score 1) 55

"...most bugs I find are from running through some kind of manual procedure and noticing something "odd" that an automated system wouldn't have picked up."

This is a valid point and underlines that automated testing can only be as good as the test designers. If the test designers fail to take into account proper bounds-handling, error conditions, interactions, etc. between modules, then you can -- at best -- protect yourself from regression issues.

I think of testing as an evolutionary process: keep with the tried and true (automation), but throw in some mutations (manual testing) to ensure you are capturing the full spectrum.

Comment Tracking =/= cookie use (Score 5, Informative) 290

Cookies have legitimate uses that have nothing to do with "tracking". Perhaps the issue comes with trying to interpret the specific language used rather that knee-jerk "everyone must opt-in". If your cookies are not used to track -- if you do not use, for example, Google analytics -- then you are not in violation. The article basically states this.
Advertising

Submission + - Project Collabhq (projectcollabhq.com) 1

seangraham76 writes: "The advantages of the internet Project management software

Tasks big as well as little can usually benefit from applying some form of project management software software program to maintain the task promptly as well as below spending budget. Usual options that come with project management software software program consist of task development, arranging, job task as well as spending budget monitoring.

Whilst you will find a number of “canned” software programs obtainable that may be placed on group member’s computer systems, there's also a number of business degree software programs obtainable and some project management software programs which are utilized on the internet."

Slashdot Top Deals

We warn the reader in advance that the proof presented here depends on a clever but highly unmotivated trick. -- Howard Anton, "Elementary Linear Algebra"

Working...