Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:Blocks vs. sub-blocks. (Score 1) 619

Because of this requirement: How many people live in the house (so far as the world can tell, it's one). With NAT, do I have one IP-enabled device or twenty in my house? Which devices are the chattiest? The least chatty? Which one is always doing SMTP, and which one is always doing web browsing? And what if I need to work with multiple subnets, or with DHCP servers? Like the other person that replied to you said, I don't have control over the network in the same manner I do with NAT.

NAT is a very clear demarcation: that side is your side, this side is my side, and I can do anything I want on my side, without anyone knowing what I'm doing.

I guess it comes from a particular ideology. Just as no one needs to know what's going on in my physical house, no one needs to know what's going on in my network. Some people will talk to census takers, because what's the harm in telling the government how many people live in your house and what their ages are and other demographic information? Other people, like me, fail to see how someone else having that knowledge is worth giving up that privacy.
Security

Submission + - Social engineering: Are your ID badges showing? (csoonline.com)

SarahS writes: "Johnny Long (of Google Hacking fame, interviewed here) claims that the easiest way to "hack" into a company isn't with a computer — it's by putting on a fake ID badge and walking in the door like you mean it. If no one at your company is actually verifying badges, then too bad for you, the social engineer just got inside. In this excerpt on CSOonline.com from Long's book, No Tech Hacking, the author explains — with photo proof — why it's so easy for social engineers to create fake ID cards. "Traveling in tech circles, I've seen my share of lanyard clutter, but this nice lady took the prize for most neck-flair toted by a female. As I drew closer, I realized that her badge was decidedly governmental in appearance. ... As she continued chatting into the phone, I swung around to the other side of her and stepped in as close as I could without triggering her (admittedly impaired) stalker detection system. Less than a foot away from her, I snapped the photo below. This particular badge is issued to government employees stationed at the Pentagon. The Post-It note reminds her to "bring a copy of yesterday's all hands to DSS H.Q.'""
Microsoft

Submission + - Microsoft not gaining ground in search

klblastone writes: Despite Microsoft's massive investment in promoting and improving web-based search, the company still has less than ten percent of search engine marketshare. By comparison, Google is hitting about 50 percent, and still growing. Obviously, gimmicks like the interactive Ms. Dewey aren't helping Microsoft compete with Google in the search arena. Microsoft's deep pockets don't seem to be of much use in the highly competitive and dynamic web services market. As the web 2.0 revolution pushes more and more software online where open standards dominate and Microsoft can't leverage its desktop software monopoly, will the company start lose relevance?
The Internet

Submission + - FFII warns Parliament: Don't put yourself in jail

podmokle writes: Members of an European Parliament Committee are voting on a criminal measures directive aimed at combatting intellectual property rights infringements. Precise context: counterfeit and piracy cases. The FFII found out that the websites of two Members of the Committee infringe copyright (deep links to rolex image, use of unlicensed Apple icons) and they would become criminals under the amendment provisions they propose. I think its real fun to watch boomerang legislation. Usually they are very experienced in causing 'collateral damages' for others.
Networking (Apple)

Submission + - OS X unable to write to large volumes using Samba?

groovemaneuver writes: "I'm the IT Manager of a small/mid-sized college network that consists mostly of GNU/Linux servers with a near 50/50 split of Apple OS X and MS Windows XP workstations. We have a Samba-based file server with a 4 TB RAID, and the WinXP boxes connect, read, and write normally. However, the Mac boxes can connect and read, but they see every share that is hosted on the RAID as having 0KB available, and refuse to write. As a test, we created an identically-configured share hosted on the server's OS drive (about 80 GB), and the Macs connected just fine. We also have a few GNU/Linux workstations, and they can all connect to the shares without issues. Is there a limit to how large a Samba share can be before Mac clients crap out? Are we the only ones dealing with this? Is there a known solution? (my Google skills are usually pretty good, but I couldn't find anything)"
Television

Submission + - Living room HDTV for PC Gaming?

Goosey writes: "With the major purchases of a new HDTV, HTPC, and gaming PC setup in the near future the thought occurred that I could combine my needs (and save some money) by putting high end hardware in the HTPC and using the it with the HDTV for gaming. Big screen gaming sounds like a dream come true, but having never done any PC gaming outside of a computer desk some concerns do pop up. What little information I could find has been pretty lacking, so I ask: do any slashdotters have experience with PC gaming in the living room? Is it a viable option using a large HDTV with 1080p native resolution or does the large view distance make the experience unbearable? Is text unreadable without inducing eye strain? Are there any mouse/keyboard solutions suitable for use on the couch?"
Software

Submission + - Software Deletes Files to Defend Against Piracy

teamhasnoi writes: "Back in 2004, Slashdot discussed a program that deleted your home directory on entry of a pirated serial number. Now, a new developer is using the same method to protect his software, aptly named Display Eater. In the dev's own words, "There exist several illegal cd-keys that you can use to unlock the demo program. If Display Eater detects that you are using these, it will erase something. I don't know if this is going to become Display Eater policy. If this level of piracy continues, development will stop." Is deleting user data ever acceptable, even when defending one's software from piracy?"
Windows

Submission + - Vista network folder hell

An anonymous reader writes: A reader at The Register has reported that there are issues with renaming folders or files created on network drives with Vista. The affected systems contain pre-installed editions of Vista shipped on new PCs and Laptops. A number of manufacturers are affected and these issues have been reported in this thread on Microsoft's Technet forum well before Vista shipped to retail channels.
Red Hat Software

Raymond Knocks Fedora, Switches to Ubuntu 608

narramissic writes "After 13 years as a loyal Red Hat user, Eric Raymond, co-founder of the Open Source Initiative, is switching to the Ubuntu distribution. In a message distributed to Linux mailing lists and news organizations, Raymond cited technical issues with Red Hat, such as the way repositories are maintained, the submission process and 'stagnant' development of Red Hat's packaging technology, as well as governance problems, the failure to gain desktop market share and the failure to include proprietary media formats. 'Over the last five years, I've watched Red Hat/Fedora throw away what was at one time a near-unassailable lead in technical prowess, market share and community prestige,' Raymond wrote. 'The blunders have been legion on both technical and political levels.'"

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...