Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Layers (Score 1) 333

+1 for multiple layers.

If this is a serious project, you should definitely consider getting a security pro involved to conduct a proper risk assessment. This will give you a good idea of what will be required to meet security expectations throughout the entire life cycle of your system.

Physical security, Network security, Policy/Legal requirements etc will likely require to be assessed if not already done.

Comment Re:applicants (Score 1) 229

20/20 vision? Incredible shape? This is slashdot, that means none of us qualify.

TFA is not entirely accurate. If you look at the actual job posting, they say "Must be correctable to 20/20". This means you can wear glasses or have an eye surgery to meet 20/20.

Comment Re:Polygraphs are nothing but BS. (Score 2) 238

If you read about the actual history and accuracy of polygraphs, you will find that they are not "lie detectors" at all, but merely tools of intimidation. (I could cite many, many sources. While not authoritative, the Penn & Teller show "Bullshit" has a very informative episode on the matter. And yes, the show is called "Bullshit" for a reason. Polygraphs are bullshit.) Polygraphs are used as tools for intimidation in order to interrogate. By themselves, they are worthless. They are security theater, much like the TSA. I really hate to see our country run by people who believe in (or pull) this kind of BS.

Sure polygraphs are far from perfection but is your normal job interview perfect at assessing if you are the best candidate for the job? Is a 2 hours exam best way to assess your technical skills? Or reference checks? To me its just another step in what is a subjective process anyway.

Comment Re:My letter to Maged (Score 1) 231

There is certainly a great number of important details we are missing in this story but as much as I would like to defend this guy it appears to me he clearly stepped the line if he indeed tested with 568 statements. Your analogy in this case is not accurate as he didn't had to access 568 different accounts to prove his point. A better analogy could be something like this. If you find a way to access all hotel rooms without proper keys, do you have to physically open 568 rooms to prove the owner that you know how to bypass his door security? I don't know the law in Australia but it is possible that this institution will now have to contact each affected account and inform owners about this unauthorized access even if the offending party had no malicious intentions. That is not good for your PR and will cost them $$$. Without having more details it is difficult to say more but it looks to me like both sides could have handled this in a better manner.

Comment Re:Impressive compared to what? (Score 2) 68

The real money is in the black market of 0days. That is where Intelligence agencies and criminals compete for new vulnerabilities and are willing to throw some major money depending on the severity. If you are fortunate to find a critical 0day - think remote exploitation in a popular OS/application without user interaction then you may pocket 6 or even 7 figures for a single bug. White hat reporting is mainly done as a hobby and/or advertisement of your personal skills or your company and is not really meant to be a full time job.

Comment No human intervention? (Score 1) 95

Lets assume for a second this voice stress analyser can actually detect deception at a very high rate (it can't). What prevents someone from pre-recording all answers from themselves or someone else at the time when they are telling the truth then play when required? I suspect results of this stress analyser have no or very little bearing in the final outcome. This is all smoke and mirrors with hopes that those who believe in lie detectors wont attempt to apply.

Slashdot Top Deals

Computers are useless. They can only give you answers. -- Pablo Picasso

Working...