Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Own less stuff (Score 3, Insightful) 249

Why not take this opportunity to simplify your life by owning less stuff? It would save you from having to pack, ship, track, and store everything.

There are far more opportunities available if you're mobile enough to fit your life into a couple of suitcases and leave the bulky/sentimental stuff with relatives. More importantly, your spending will naturally shift from things to people and experiences that can't get damaged or lost in transit.

Security

Ask Slashdot: Actual Best-in-Show For Free Anti Virus? 515

First time accepted submitter paperclipman writes "I'm on the college student budget and want to make sure that my recent investment in an Acer laptop will last me a good long while. I like to think of myself as a reasonably competent CPU user so I'm no adventurous link-clicker, but I do download some music as a recent SoundCloud devotee. My Kaspersky antivirus will be expiring shortly and I don't particularly care to renew with that steep of a fee — any advice from fellow thrifts?"
Google

Dremel-Based Project Accepted As Apache Incubator 45

itwbennett writes "The technology behind Google's BigQuery analytics as a service is based on the company's in-house ad hoc query system called Dremel that can store and search trillion-row datasets without the complexity and batch limitations of Hadoop. Today, Hadoop vendor MapR announced a new open source iteration of Dremel called Drill, which is now an incubation project with the Apache Softare Foundation. First up for the Apache Drill project: getting a consensus on Drill's APIs so that other vendors can work with it, says project leader Tomer Shiran."

Comment Re:Cloud (Score 1) 227

> or buy one of the numerous premade systems.

Better yet, buy two and sync one as an off-site backup, not because you want an off-site backup, but because most consumer NAS devices lack enterprise build quality. Drobo devices are the exception.

Also, be sure to examine the firmware before making a purchase, by downloading the source from the manufacturer's website. The NAS boxes cobbled by the hard drive manufacturers tend to be based on older versions of (possibly insecure) open source NAS tools, with some in house garbage on top to implement custom features.

For example, on one particular brand of web-enabled NAS by a famous hard drive manufacturer, the URL to reset the configuration settings *for all models in the line* is widely available in support forums. This gets you remote admin. The web host for their custom scripts runs as root, and contains several locations where unsanitized strings from the URL get passed directly into an exec(). Some of the cloud-sounding services that enable you to remotely access your firewalled NAS are so poorly secured that it's possible to Google for particular strings appearing on the NAS remote admin configuration pages.

(Yes, the manufacturers know about all this. No, they're mostly not interested in fixing these problems in unsupported use modes: "The manual says not to connect these devices to the Internet.")

Comment Re:I don't know the best way (Score 5, Insightful) 634

One could show Star Trek without Star Trek, by staring with good stories.

TNG: Darmok
DS9: The Visitor
VOY: Blink of an Eye
TOS: The Devil in the Dark, The City on the Edge of Forever

(and a few others)

Such stories are accessible to new viewers since they do not depend on much cannon or story arcs or character history to be fully enjoyable. The major cannon episodes that series fans enjoy for being loaded with many intersections of individual motivations, big conflicts, implicit story, and consequence (e.g., "The Best of Both Worlds") would be lost to anyone who had not been exposed to the big players and landmarks. Starting with character development episodes would bet too much on new viewers caring about the characters on first exposure, and similarly with arc development episodes.

Comment Re:anonymous is a bunch of childish kids.... (Score 1) 203

> Best indication of a government agency a 24 hour attack rather than a cycling attack.

FTFA: "However, for the last 24 hours the site has been largely inaccessible world wide"

The attack does not appear to have been sustained in a constant way.

> Individual users will still want to use the computers and bandwidth for other things.

*Distributed* denial of service attack. If the attack is successful, each individual user does not need to devote more than a small fraction of whatever broadband access they have, since their victims would not successfully communicate back.

> Even botnet controllers will want to get back to money making spam.

They could also make money by renting out their botnets...

> The only people who can keep it up solid had computers and bandwidth to waste

Or non-government entities such as botnet operators, as you mention, telecommunications companies, multi-national organizations...

> and obviously will want to work the divide and conquer angle.

Successfully taking out one site (even a highly connected one) wouldn't be dividing anything except that site from all the strongly connected others. This attack created no salients against which to deploy any kind of conquering tactic, and this kind of attack cannot possibly do so against such a highly redundant network.

Slashdot Top Deals

Software production is assumed to be a line function, but it is run like a staff function. -- Paul Licker

Working...