Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment More details please (Score 1) 413

So, out of interest, how are you securing this unpatched XP machine? I can understand that if it's firewalled, with no open ports, it may be resistant to direct connections from outside but that's not enough for a typical machine doing useful work. If the machine makes network requests, or works on data from removable media, it is way more than likely to be vulnerable to some buffer overflow type response that can be fed to it. You know, the type of vulnerabilities that turn up every few weeks or so and (hopefully) get patched.

Comment Re:Glory to Arstotzka! (Score 2) 131

Only 3? I've been the sys admin for a small number of web servers (for hobby and small business projects) for nearly 15 years and I see break-in attempts (*) from numerous IPs on a near constant basis; every few minutes a new, offending IP ends up getting blocked by my firewall. Nowadays, something close to 95% of these 'attacks' originates from China, where as only a few years ago the attacks were reasonably well distributed across the globe, with places like the Ukraine and Russia appearing highest on the list of offenders. Of course, the source IP may just be a proxy for the true source of the attack, so it is hard to say for sure where most originate from.

* The vast majority of break-in attempts I see are simple password guessing attempts for widely used account usernames. Disabling root login, enforcing use of SSH keys and using something like Fail2ban takes care of these with ease.

Comment Re:What evidence do you have that you're being DoS (Score 1) 319

What is there besides MAC address and IP address to latch on to?

When you are assigned a different IP address by your ISP, does a reverse DNS lookup for your IP show the same or a different FQDN? I'm pretty sure I've seen at least one ISP update rDNS entries so a customer specific domain name always points to them, regardless of assigned IP. If that's the case, you can change your IP as often as you like but you'll always be reachable by the same FQDN.

Comment Google, please don't make everything social (Score 1) 172

Google employee Nikhyl Singhal wrote in a Google+ post that 'Hangouts is designed to be the future of Google Voice.'

I wish Google weren't insistant on melding their existing services with their social platform, or dropping them altogether to concentrate on Google+ alternatives. I'm not particularly interested in Google+ and definitely won't be coerced to use it in order to use some of Google's otherwise very good services.

Facebook won the social game before Google ever entered it and there's not a chance in hell Google will overturn them now. Concentrate on your core services and keep your users happy, or you will lose them.

Comment Re:MariaDB? (Score 1) 203

In the telecoms lab I worked at 15 years ago or so, we used Visual Basic to control many of our GPIB test suites and they all spat out data as CSV files that could then be imported into Excel for quick and easy graphing, etc. It was maybe not the most elegant of solutions, but it was perfect for the task at hand. We could write new tests very quickly and the data could be easily emailed to anyone with Excel to analyse. There are not many things I'd suggest using Visual Basic for, or CSV for that matter, but for some jobs that simplicity is wonderful and a more 'professional' solution would have slowed the process down drastically.

Slashdot Top Deals

Software production is assumed to be a line function, but it is run like a staff function. -- Paul Licker

Working...