Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment The software industry not the security industry (Score 1) 205

The title (of both the slashdot post and the original article) is misleading.

The article cites one Eugene Spatford who observes that, "software makers churn out products riddled with vulnerabilities." That's not the security industry's fault.

He goes on to tell us that law enforcement is inadequately equipped and that criminals protect themselves by bribing government officials. That's not the security industry's fault either.

Of the tools the security industry does use regularly he says that, "We’re using all these tools on a regular basis because the underlying software isn’t trustworthy." Again that's not the security industry at fault.

And the solution?

"... an investment in computer programming education and a major move by software manufacturers to embed software security concepts early into the development process."

Sounds reasonable to me. Also sounds like a task for the software development community generally, NOT just those specialising in security.

Comment There's nothing wrong with Perl ... (Score 4, Interesting) 283

... it's just the way people use it.

Perl was designed as a powerful, flexible, loosely typed scripting language for munging text files and streams, and that's exactly what it is.

It's great for those scripts that you write for a particular task and never use again after the few days it was necessary. It's also good for writing glue code on occasion, to tie the inputs and outputs of other applications together, and when shell scripting just won't quite cut it.

The trouble was that it was such a useful scripting language people started writing applications in it. Then they had to jump on the object-oriented bandwagon, which was done clumsily. Sort of like gluing a dog to your horse so it can fetch. And yes, it can be difficult to read, but it doesn't have to be.

Use Perl for the tasks it was originally designed for. If you're going to write real applications, use a more appropriate language. Don't kick your dog because he can't sing.

Comment Re:Lipstick on a Pig (Score 2) 135

What's surprising is that the same people who look down their noses at Wikipedia probably believe that the Encyclopedia Britannica was an accurate source of unbiased information.

There have been serious studies of the reliability of wikipedia as a reference compared with the Encyclopedia Britannica at least.

Although I am aware of irony of Wikipedia as a reference for the reliability of Wikipedia...

Comment Re:Shut up and take my money (Score -1, Flamebait) 163

Interesting. Illinois police certainly do have a repuation. I'm not actually from the U.S.A. but nevertheless Amnesty International sends me emails about petitions such as this one about the Chicago police .

Sorry if that looks like a shameless plug for Amnesty International (well I guess it is) but WTH, they do good work.

The Almighty Buck

Kim Dotcom Offers $5 Million Bounty To Defeat Extradition 253

heretic108 (454817) writes "Internet mega-entrepreneur, uber-gamer and now NZ political corruption-buster Kim DotCom has posted a bounty of $5 million to anyone who can dig up any dirt which saves him from extradition to the U.S.. This bounty would be payable not only to government employees, but also to anyone who can retrieve documents clearly proving corruption in the whole prosecution process. 'We are asking for information that proves unlawful or corrupt conduct by the US government, the New Zealand government, spy agencies, law enforcement and Hollywood', Dotcom told website Torrentfreak.com."

Submission + - $445 Billion Lost Due To Cybercrime? 1

An anonymous reader writes: Cybercrime has a significant impact on economies worldwide. A new report from the Center for Strategic and International Studies (CSIS) concludes that cybercrime costs businesses approximately $445 billion worldwide, with an impact on approximately 150,000 jobs in the EU and 200,000 jobs in the U.S. Studies estimate that the internet economy annually generates between $2 trillion and $3 trillion, a share of the global economy that is expected to grow rapidly. Based on CSIS analysis, cybercrime extracts between 15% and 20% of the value created by the internet.

Submission + - Have today's privacy policies made us a society of liars?

An anonymous reader writes: Companies often cannot or do not perform the necessary technology evaluations prior to implementation to ensure data privacy, while consumers assume businesses are taking the extra step for their safety. These actions are identified and disseminated to customers through documents such as privacy policies. This brings up two questions: First, can these legal forms serve as catchalls? Second, does the public really understand privacy policies?

Comment Re:A pretty low requirement (Score 1) 432

The bar itself is illusory. Intelligence is not a discrete quantized quality, and certainly not binary in nature. It's a continuum. There won't be a point in time where "real" artificial intelligence is created.

One day we will stop arguing whether true artificial intelligence can be created and start arguing about when it happened.

Submission + - Evidence of another world found on Moon 2

mrspoonsi writes: Researchers have found evidence of the world that crashed into the Earth billions of years ago to form the Moon. Analysis of lunar rock brought back by Apollo astronauts shows traces of the "planet" called Theia. The researchers claim that their discovery confirms the theory that the Moon was created by just such a cataclysmic collision. The accepted theory since the 1980s is that the Moon arose as a result of a collision between the Earth and Theia 4.5bn years ago. It is the simplest explanation, and fits in well with computer simulations. The main drawback with the theory is that no one had found any evidence of Theia in lunar rock samples. Earlier analyses had shown Moon rock to have originated entirely from the Earth whereas computer simulations had shown that the Moon ought to have been mostly derived from Theia. Now a more refined analysis of Moon rock has found evidence of material thought to have an alien origin.

Submission + - id Software's Softdisk games code being released under GPL (geek.com)

An anonymous reader writes: id Software has a long history of making games that stems back as far as 1991. A number of those games were published by Softdisk — the company where the id Software founders originally met. And those games remain the property of Softdisk, which is now owned by Flat Rock Software. Now it seems, Flat Rock is making the Softdisk code available for id’s classic titles.

Submission + - Who Must You Trust? (acm.org)

CowboyRobot writes: In ACM's Queue, Thomas Wadlow argues that "Whom you trust, what you trust them with, and how much you trust them are at the center of the Internet today."
He gives a checklist of what to look for when evaluating any system for trustworthiness, chock full of fascinating historical examples.
These include NASA opting for a simpler, but more reliable chip; the Terry Childs case; and even an 18th century "semaphore telegraph" that was a very early example of steganographic cryptography.
FTA: "Detecting an anomaly is one thing, but following up on what you've detected is at least as important. In the early days of the Internet, Cliff Stoll, then a graduate student at Lawrence Berkeley Laboratories in California, noticed a 75-cent accounting error on some computer systems he was managing. Many would have ignored it, but it bothered him enough to track it down. That investigation led, step by step, to the discovery of an attacker named Markus Hess, who was arrested, tried, and convicted of espionage and selling information to the Soviet KGB."

Submission + - FSF publishes Email Self-Defense Guide and infographic (fsf.org)

gnujoshua writes: The FSF has published a (rather beautiful) infographic and guide to encrypting your email using GnuPG. In their blog post announcing the guide they write:

One year ago today, an NSA contractor named Edward Snowden went public with his history-changing revelations about the NSA's massive system of indiscriminate surveillance. Today the FSF is releasing Email Self-Defense, a guide to personal email encryption to help everyone, including beginners, make the NSA's job a little harder. We're releasing it as part of Reset the Net, a global day of action to push back against the surveillance-industrial complex.


Submission + - NASA's Budget 'Victory' is Anything But

StartsWithABang writes: Earlier this week, attempts to cut NASA's budget were defeated, and it looks like the largest space agency in the world will actually be getting nearly a 2% budget increase overall. While common news outlets are touting this as a great budget victory, the reality is that this is shaping up to be just another year of pathetic funding levels, putting our greatest dreams of exploring and understanding the Universe on hold. A sobering read for anyone who hasn't realized what we could be doing.

Comment Re:Books aren't special (Score 1) 211

Nor has he shown that books are not fungible. He has only shown that books are not necessarily fungible between titles. (Of course even that is debatable, as it depends on the personal sensibilities of the consumer.) Two copies of the same book are clearly fungible. This is implicit in the fact that Amazon sells "the same book" to two different people in two separate transactions. Presumably the two readers don't care which book rolled off the press first.

Comment Re:Anti-Drone arguments are so frequently flawed. (Score 1) 433

The problem with the VAST majority of criticisms against drone warfare is this: /They don't cite alternatives./

This is the most blatant straw-man argument I have ever seen. You don't target the actual study named in the story, but some nebulous cloud of "... majority of [all] criticisms."

You imply this is a criticism of intervention policy generally.

Drones are incidental to the intervention policy...

It is not. It is a specific criticism of the current use of drones as a strategy.

And finally I take issue with your assertion that a criticism should be required to suggest an alternative.

I am wearing a dead toad around my neck to ward off the plague. You argue that all available statistical evidence shows that wearing dead toads has no effect on whether or not a person will contract the plague.

The fact that you don't provide an alternative to dead toads doesn't change the fact that my dead toad is completely ineffective.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...