Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Kaspersky did their job (Score 4, Informative) 232

The fault lies with the contractor who stole classified information, took it home, and put it on a personal computer where he had Kaspersky installed. I have a very hard time believing such actions to NOT be deliberate with the intention that the programs be scanned by Kaspersky, and possibly specifically by Kaspersky. I'm not saying Nghia Hoang Pho, 67, was flipped in his soviet client state homeland and sent to the US with specific pro-Russian instructions, but I mean, come on....

Comment Re:You Cannot Sue City hall... (Score 1) 185

Trump didn't issue an order. He signed H.R. 2810, "National Defense Authorization Act for Fiscal Year 2018" into law. That means Congress did it, not Trump. The relevant bit is section 1634, entitled "Prohibition on use of products and services developed or provided by Kaspersky Lab.", which is under Subtitle C, "Cyberspace-related matters".

(a)Prohibition
No department, agency, organization, or other element of the Federal Government may use, whether directly or through work with or on behalf of another department, agency, organization, or element of the Federal Government, any hardware, software, or services developed or provided, in whole or in part, by—

(1)Kaspersky Lab (or any successor entity);
(2)any entity that controls, is controlled by, or is under common control with Kaspersky Lab; or
(3)any entity of which Kaspersky Lab has majority ownership.
(b)Effective date
The prohibition in subsection (a) shall take effect on October 1, 2018.

(c)Review and Report
(1)Review
The Secretary of Defense, in consultation with the Secretary of Energy, the Secretary of Homeland Security, the Attorney General, the Administrator of the General Services Administration, and the Director of National Intelligence, shall conduct a review of the procedures for removing suspect products or services from the information technology networks of the Federal Government.

(2)Report
(A)In general
Not later than 180 days after the date of the enactment of this Act, Secretary of Defense shall submit to the appropriate congressional committees a report on the review conducted under paragraph (1).

(B)Elements
The report under subparagraph (A) shall include the following:

(i)A description of the Federal Government-wide authorities that may be used to prohibit, exclude, or prevent the use of suspect products or services on the information technology networks of the Federal Government, including—
(I)the discretionary authorities of agencies to prohibit, exclude, or prevent the use of such products or services;
(II)the authorities of a suspension and debarment official to prohibit, exclude, or prevent the use of such products or services;
(III)authorities relating to supply chain risk management;
(IV)authorities that provide for the continuous monitoring of information technology networks to identify suspect products or services; and
(V)the authorities provided under the Federal Information Security Management Act of 2002.
(ii)Assessment of any gaps in the authorities described in clause (i), including any gaps in the enforcement of decisions made under such authorities.
(iii)An explanation of the capabilities and methodologies used to periodically assess and monitor the information technology networks of the Federal Government for prohibited products or services.
(iv)An assessment of the ability of the Federal Government to periodically conduct training and exercises in the use of the authorities described in clause (i)—
(I)to identify recommendations for streamlining process; and
(II)to identify recommendations for education and training curricula, to be integrated into existing training or certification courses.
(v)A description of information sharing mechanisms that may be used to share information about suspect products or services, including mechanisms for the sharing of such information among the Federal Government, industry, the public, and international partners.
(vi)Identification of existing tools for business intelligence, application management, and commerce due-diligence that are either in use by elements of the Federal Government, or that are available commercially.
(vii)Recommendations for improving the authorities, processes, resourcing, and capabilities of the Federal Government for the purpose of improving the procedures for identifying and removing prohibited products or services from the information technology networks of the Federal Government.
(viii)Any other matters the Secretary determines to be appropriate.
(C)Form
The report under subparagraph (A) shall be submitted in unclassified form, but may include a classified annex.

(3)Appropriate congressional committees defined
In this section, the term appropriate congressional committees means the following:

(A)The Committee on Armed Services, the Committee on Energy and Commerce, the Committee on Homeland Security, the Committee on the Judiciary, the Committee on Oversight and Government Reform, and the Permanent Select Committee on Intelligence of the House of Representatives.
(B)The Committee on Armed Services, the Committee on Energy and Natural Resources, the Committee on Homeland Security and Governmental Affairs, the Committee on the Judiciary, and the Select Committee on Intelligence of the Senate.

Comment Re: Like a Medical Doctor (Score 1) 340

The only reason it seems hard is that people who are good at computers, and programming in particular, can often be very literal. The computers are, so after years of explaining everything in excruciating detail to a machine, the natural tendency is to talk about how to do it in excruciating detail to people who ask. Most people who ask donâ(TM)t really care. It is like asking âoehow are youâ and expecting âoefine, thank. And you?â, not âoeI have a raging case of herpes, thanks for asking!â

In the US in particular, questions about occupation are round-about questions about money and status. Thatâ(TM)s it. âoeIâ(TM)m a doctor/lawyerâ means âoei make considerably more than someone who answers highschool teacher.â

Unless someone asks folowup questions thst show an interest in your career, particularly young people who may be trying to figure out what they want to do, just answering the question that was asked and not projecting an actual desire to here about having issues with source code management or when functional programming techniques are appropriate is probably good enough. Then ask the asker and deflect. Let them talk about their job if they want.

Comment Re: Wholeheartedly agree (Score 2, Insightful) 750

Anyone who values their time or their money doesnâ(TM)t stand in line for 20+ minutes waiting to be served dirty water by a hippie. I mean, who really has time to get coffee at a coffee place in the morning? Probably not people with anywhere to be. Coffee trips are nice for a treat when Iâ(TM)m not on my way, or stopping on road trips. Weekday mornings? Not so much

Comment Re: market forces (Score 3, Interesting) 162

Around 1999-2002... in this post-columbine, post-9/11 world of fear weâ(TM)ve found ourselves in.

But also, as society has grown and the avenues for impersonating strangers have multiplied as more and more people move around a lot rather than live in the same area for generations, there is more to worrt about. And people are bad at estimating risk and blow things out of proportion as it suits them.

Comment Re:DJI - 36,000 !!!!!! (Score 1) 348

But the DJI is an index measuring the value of the stocks in companies followed by the index. It represents a weighted value of what owning shares in those companies is worth (oversimplification is simple). This is like people trading commodities and then running the value of the commodity up even though they have no interest in the actual value or usefulness of the commodity -- similar to the oft-referenced tulip situation in the Netherlands, with the pricing being run up by speculators who bought and sold tulips to other people looking to buy and sell tulip bulbs with none of them having any interest in actually planting the damned things and enjoying the flowers.

Comment Re: Indeed. "Nazi" is short for "National SOCIALIS (Score 1) 500

Except youâ(TM)ll find an awful lot of wanna-be Nazis that say the holocaust never happened, or some varying degree thereof. Many will say something like, âoeit never happened. But so what if it didâ. Some think it did and that it was awesome, but that just puts them into conflict with the revisionists in their ranks on that subject.

I think that for most of them, you canâ(TM)t look at it as political ideology any more than you can look at being a Crip as an ideology. Theyâ(TM)re gang members looking for belonging. Skinheads are just a white street gang. They happen to have found a gang that borrows imagery and savagery from a gang that one time got political power, but beyond âoejews bad,â most of them donâ(TM)t seem to really understand any of the philosophical roots of nazism either as political platform or as an esoteric semi-religion. Theyâ(TM)ve almost certainly never read any Italian fascist writings, donâ(TM)t understand the difference between Franco and the Falanage, or falangists and fascists, or why Spain stayed neutral in the war.

Of course, there are some who have done those things and do understand. There are, in any extremist movement or basic street gang, those who are able to manipulate and control people. Most of them are hurt, lost and looking for something and they got picked up by exploitationists who offer them belonging and purpose. But that comes with a massive outgrouping which continues into dehumanization. It isnâ(TM)t so much that the holocaust is what theyâ(TM)re clinging to so much as an extremely exclusive sense of identity. Even if they actually are politically motivated, the major difference between fascism and nazism is that while fascism in-groups the citizen, nazism places ethnic and racial limitiations on citizenship and then seeks to push all the newly-non-citizens out.

Comment Re: That's funny... (Score 4, Insightful) 300

Biometrics are not better than a password as a single method of authentication unless your data is worthless.

Passwords can be changed/rotated indefinitely. You only have one face, two eyes and 10 fingers.

Only idiots leave passwords on sticky notes. Literally everybody leaves fingerprints around, unless they donâ(TM)t have finger prints, in which case a finger print reader is useless to them anyway.

How âoeeasyâ it is to get you to give up a password depends on you. How easy it is to force your finger onto a finger print reader, less so.

Biometrics, being a physical characteristic of a person are great for indentification, i.e. as a replacement for a username. Theyâ(TM)re also perfectly reasonable as part of a multi-factor authentication. Iâ(TM)ll combine finger print + the HMAC SHA challenge-response from yubikey or PKI from a smartcard for accessing my laptops for instance.

Comment No way (Score 1) 141

Attribution is extremely difficult, especially if all you have to go on is forensic artifacts which are easily forged. I don't believe any private organization is going to be in a position to arrive at an attribution that would legitimize a hack back situation. That doesn't mean I don't believe in active defense. Beacons in documents, etc. which let you know if/when/where they have been opened is one thing. Launching a cyber assault based on that is another.

Hell, even most governments, short of corroborating SIGINT or HUMINT is going to be hard pressed to do attribution and it would take a lot for me to agree that a kinetic response were justified -- basically a confesion from the perps.

Comment Pay wall? (Score 4, Insightful) 69

Do they still paywall the stories? Do they allow you to log in? (Thus helping to deanonymize you on other onion sites)?

If they're giving easy text versions of stories, free from paywall, without the annoyance of comments (meta comment bashing comment...) then it may be worthwhile. Otherwise, like FB over Tor they are probably just going to do more harm than good

Slashdot Top Deals

It is not every question that deserves an answer. -- Publilius Syrus

Working...