Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Red Hat Software

Submission + - Red Hat dismisses threat posed by Oracle and MS

Rob writes: Red Hat Inc's executive vice president of worldwide sales, Alex Pinchev, has dismissed the impact that Oracle Corp's entry into the Linux support business could have on Red Hat, insisting Oracle does not really know what it is doing. Pinchev also described Microsoft's recent interoperability and patent peace deal with Novell Inc as a "non-event" and dismissed the suggestion that Linux users are at risk of a patent infringement lawsuit from Redmond.
Google

Submission + - Get Your Text Message Answered By Google

match22 writes: "Who doesn't love Google? They have grown at an astonishing pace and have developed technology that has enriched our lives by bringing millions of pieces of information to our fingertips. Everyone communicates via texts these days so let me run you through how to get answers from Google via text messaging (SMS) them."
Software

Submission + - How do you do your enterprise inventory/document?

An anonymous reader writes: I'm curious as to what tools fellow /.ers use to inventory and document their networks? What got me thinking about this is the part VMWare has really been taking in data centers. You've got your SAN, various physical and logical networks, various VMs, and so forth. It just adds a new layer of complexity in terms of documentation. I'm curious as to what people have been using as for doing things like documenting how their backups work, LAN settings, FW settings, where and what runs what services,etc. Basically a blueprint if you will of your entire IT infrastructure that someone brand new could start and figure out what does what.
Encryption

Submission + - how secure will cyphers be in the future?

GillBates writes: "Lets say we have a cypher that takes e.g. 3*10^6 years to break. What can be said about the same cypher in 10 or 20 years, when new cryptoanalysis methods are found and Moore's law applies? How long would it take to brake that cypher? How much does the different method's ladder play role in the future (in the future we have many more analysis methods to apply to a cyper)? Thanks for Your attention. Hope to receive an answer."
Security

Submission + - Federal Agency releases network security LiveCD

An anonymous reader writes: Heise news reports that the german "Federal Agency For Security In Information Technology" (BSI) has released the second version of it's network secruity LiveCD for download. The "BSI Opensource Security Suite (BOSS)" includes a bootable Linux LiveCD and includes among others Nessus, Ethereal, Nmap, chkrootkit and some guidance about how to use the LiveCD to test your local network for security issues.
Spam

Submission + - Emails intercepted by SORBS

rated-r writes: "Recently, I have found that some of my emails are not getting through to their intended recipients. I initially thought that my hosting company's server was a bit screwed and that it would eventually correct. However, I've spent the last little bit of time investigating and have found that the destination server (Sympatico, in this case) has subscribed or is using a services called SORBS (Spam and Open Relay Blocking System). This service maintains a black-list by IP Address and gives a Go/No-Go response to the subscribed server. Am I the only one that thinks this system is inherently flawed?? My hosting company has 7 or 8 different servers (maybe more), in which each machine hosts many, many domains. My SMTP server is on one of them and it appears that someone on my server has done something to get the server's IP address into this database (my SMTP server requires that I logon before sending, so it is not allowing relaying). Now, whenever I send an email to someone with a Sympatico address (for example), it gets bounced back. On top of this, it seems this company (SORBS) wants ME to shell out $50 bucks (USD) to get it de-listed. Doesn't this smack of extortion? "We're hijacking your email until you pay up!" And if I was stupid enough to pay this "fine" (as they call it), what guarantee would I have that someone else (or even the same guy) gets my IP listed again? How can this be fair? I understand that this service wants to try and conquer spam (as we all do), but do they have to punish "the little guys"?? Has anyone else heard of this particular system and have they been successful is getting their server de-listed?"

Slashdot Top Deals

Any circuit design must contain at least one part which is obsolete, two parts which are unobtainable, and three parts which are still under development.

Working...