Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:And no one will go to jail (Score 2) 266

One of the many problems with our Constitution is the simple fact that many laws, particularly about government, have no penalties. Pass a law that establishes a religion? No punishment. Ignore a Supreme Court ruling? No punishment (just ask President Jackson) You are an on duty police officer, illegally engaged in electioneering (i.e. supporting a politician). No punishment.

Submission + - Is there an app that ignores stupid headlines 1

gurps_npc writes: You know the ones I mean "This one trick...", "You won't believe...", ANY headline that asks a question (and you know the answer is 'no' because it always is), anything headline that tells you to 'never' do something, any headline that describes someone that invented something using a family word (dad, mother, son, etc.)

Yes, we know that humans are attracted to these headlines and pay attention to them.

Similarly, we pay attention when someone yells "FIRE" in our face. That doesn't mean it is ever appropriate to do so.

If we can't outlaw the idiots using this 'one genius trick — that I never believe', is there an addon that blocks these crap-lines from google news and other aggregators?

Comment Re:Headline trifecta (Score 3, Insightful) 81

Also, competition stabilizes the market by allowing your competitors to market the need (i.e. the Tesla is a novelty at best, not a serious product; when Chevrolet and Honda stop dicking around with their novelty cars and start telling us all how much we need electric cars, the Tesla suddenly becomes a serious product).

Comment Incredibally useful (Score 5, Insightful) 32

And not just for "gradient" bonding. You can use non-gradient, sharp boundaries to create parts that touch but are NOT bonded. Want to create a machine with two interlocking gears? Make one gear out of steel and the other out of titanium. They won't bond even though they are touching each other.

Right now, you basically can't build a machine that can build itself, because almost all machines need multiple metals AND needs parts that touch but are not bonded. A simple motor for example needs metals that are magnetic and non-magnetic and also needs something that can spin.

With this technology, a machine may actually be able to create a copy of itself that does not need any other parts added, nor will it need human assembly.

Comment Re:Trusted network zones (Score 1) 348

Yes, but that's what a separate database zone is: you make your /24 subnet break down into /28, you VLAN it, break down the firewall rules, and have groups of 14 nodes. Databases (3 x MongoDB, 3 x PostgreSQL), application servers (might be one server, or might be 3 subnets), HTTP servers, your SSL concentrators, etc.

Your DMZ is going to be an isolate bubble: even the production LAN can't get into it, except for services offered. So even if you have one DMZ on a /24 that's got HTTP, database, SSL concentrators, and so on, your situation isn't as bad as you suggest. VPN? Either the VPN has SSH access to all your databases (i.e. your on-database-server firewall allows SSH from internal, and the VPN isn't trapped in a firewall that blocks SSH) or it doesn't. Either it has database access or it doesn't.

I really did mean "Trust Zones". DMZ is a trust zone, and you are trusting it to interact with your Private LAN trust zone in a specific way. No matter where you put the firewalls, it interacts the same way. Firewalls on that host in particular aren't necessarily useful: why is it exposing Console Character Service or CUPS Print Service if it's not supplying print services to its own subnet? Configure that shit off, or bound to 127.0.0.1 or a local socket. If it's supplying those services to the subnet it's on, then your border firewall shouldn't allow those services through to that subnet--from private LAN, from Internet, or anywhere else.

The old idea of "The Internet" versus "The Private LAN" is obsolete. We group things on subnets and put firewalls between the subnets now.

Comment Re:11% fuel efficiency improvement (Score 1) 138

True, but my point is that 'ugly' is not and never has been a reason not to make or sell a product that has an efficiency advantage over another product.

Pretty/Ugly only affects otherwise equal products.

Or are you telling me that you do don't think an ugly computer would sell, if people had the chance to buy a pretty version with half the RAM? (all other things being equal)

Comment A random freebie with comparison program (Score 1) 258

That is, if you already own app A that does (x) then you can sign up to randomly get a random app B that also does x.

If you agree to rate and compare both of them, then at the end of one week, you can if you desire, trade in app A for app B for free if A costs more than B (or the price differential if B costs more than A.)

When buying apps, these ratings would be shown next to the regular ones, and be sortable.

The app creators (and the app store) would have to agree to this program, giving up their products for free in exchange for this rating system.

Comment Re:Dark? (Score 4, Informative) 119

It's not just the visible spectrum, it's all radiations levels.

Different amounts of mass result in different star types which give up different types of light. non-star objects - dust, planets, etc. block light and radiate out the energy they absorb as heat.

So by looking at any point, we can tell how much mass it has by the amount and type of light it gives off, including the non-visible spectrum, i.e. heat.

There are a few assumptions made, but it makes a lot of sense, mathematically.

None of it would have been possible before we understood the formulas behind fusion.

Comment Trusted network zones (Score 4, Informative) 348

If your database is in a trusted network zone, it's fine.

If you have a bunch of assets outside the corporate firewall, you're doing it wrong. These belong behind a DMZ firewall, blocking any ports not strictly necessary, possibly with PNAT and coalescence (i.e. an FTP, Web, and Mail server, natted to the same address, ports 80, 443, 25, 21, and FTP PASV going to different addresses behind that).

Within that DMZ, servers provide whatever services they're going to. MySQL on port 3306 will provide MySQL on port 3306; if you add a local firewall, you will have a firewall that blocks all non-listening ports and leaves port 3306 open, so no difference. If you're worried about ssh, use an IP console card (DRAC, etc.) on a separate subnet, or put the database servers behind another firewall. It is, in fact, common to create trust zones for front-end, application, and database, such that i.e. your Web servers connect through WSGI to a CherryPy application, which connects back to a Database, through a firewall in each step. You can do this with vlans and broken-down subnets, one switch, and one firewall.

You have to consider everything when you design secure network architecture.

Slashdot Top Deals

Work is the crab grass in the lawn of life. -- Schulz

Working...