Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment 1 user, 1 key (Score 1) 148

This is why such services that let users store data in their "cloud" should enable user-specific encryption keys - the user's public key encrypts the data, and ONLY the user's private key can decrypt it. Then if "authorities" want access to the data, they would have to ask each and every user for their key. Sure, as in I'm convinced I would do that!

Comment Time to upgrade your creds. (Score 1) 237

You might be lucky to get a position in a research institute and/or university, but without at least a masters degree that will be very difficult. My advice? Apply for a graduate program in your chosen field. With a doctorate, or at the least a masters degree, your chances are much higher to achieve your goals, though success is never guaranteed! :-) Good luck!

Comment Time to see an attorney (Score 1) 480

If you have old copies time-stamped by the operating system that pre-date the versions of the usurper, then have your attorney threaten them with theft of copyright. They can put your name back as originating author, and themselves as enhancers/updaters, but failure to do so should be accompanied by legal sanction. FWIW, always have a good attorney as a personal friend. I do, and it has served me well in such cases. I do his tech support pro-bono. He does my legal work pro-bono as well. A good quid-pro-quo situation.

Comment There are two faults here... (Score 1) 284

There are two faults here. One is yours in that you left your equipment connected to the network such that external access was allowed. The other is the supplier/vendor of the equipment who performed a modification of the equipment without your explicit approval. IMO, the supplier is fully responsible/liable for ALL of your costs and/or losses caused by this action on their part. I think an attorney would agree, unless there is a clause in your support or purchase/license agreements that allows for this, in which case, caveat emptor! As for a network connection timeout, this is not really feasible. However, proper configuration of your network firewalls (I assume you have such?) should mitigate this sort of unauthorized access. If the equipment doesn't need local network access for management/monitoring purposes, then simply disconnect it. If it does, then the firewall rules have to be adequate to block remote access without your permission and intervention.

Comment Use virtual machines (Score 1) 212

On a modern OS, such as Windows or Linux (preferable), you can use a virtual machine to run older DOS and such operating systems, passing the RS-232 ports of the host though to the virtual machine. Works great for me, and I use that for dealing with similar embedded systems all the time. FWIW, my preferred host OS is a clone of Red Hat Enterprise Linux (RHEL) 6, Scientific Linux (SL). CentOS is another such clone, and widely used in industry. I use SL because I personally know the maintainers of SL at Fermi National Laboratory in Illinois (my wife is a staff scientist/physicist there), so if I have an issue, I can contact them directly. My preferred virtual machine manager tool is currently VirtualBox (open source, from Oracle/Sun), but KVM will also work very well for this. That said, I prefer the GUI and configuration tools provided by VirtualBox.

Comment Engineering/Science == math (Score 1) 656

If you want a degree in either software engineering or computer science, then the math is part of the (pardon the pun) equation! I do performance engineering (actual job title is Senior Systems Engineer) for a tier-one Fortune 50 company. Without the math (3rd order differential equations at the least), I could not do my job. No, I don't need that on a daily basis, but I DO need it from time to time, such as when developing predictive analytics algorithms to properly analyze system performance and time-to-failure (Kalman filters anyone?). FWIW, my previous job was developing risk analysis (real-time) software for the options trading industry - keeping the portfolios of traders and market makers properly balanced, using (primarily) the Black-Scholes risk algorithms - again, 3rd order differential equations. :-) So, want a position that is just something more than being a code monkey? Then math is your best friend!

Comment Quid Pro Quo (Score 1) 196

Now the banks have an inkling of how we feel about them stealing us blind in the mortgage fiasco! I only wish these hoods got away with about $4.5B instead of a paltry $45M. Then, the results would have been more equitable... :-(

Slashdot Top Deals

"The one charm of marriage is that it makes a life of deception a neccessity." - Oscar Wilde

Working...