Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

Submission + - SCADA: 10 Years Behind Enterprise IT Security (securityweek.com)

wiredmikey writes: A recent burned out water pump at a public utility has once again put SCADA and Industrial Control Systems security in the spotlight.

Several experts have chimed in on the matter, with some saying that SCADA Security is typically a decade behind other large enterprise security systems.

Why? These Industrial Control Systems were never intended to be connected to the Internet, and lack many of the security controls and features that most modern IT systems have in place. Additionally, many critical infrastructure systems are running older operating systems such as Windows 95 – something that brings its own set of security issues.

Another expert said the security problems with SCADA software are twofold: One is the prospect of security vulnerabilities in the software itself; the other is improper configurations and bad security around the software.

The challenges are exacerbated by such systems being connected to the Internet, which can be discovered and potentially breached....

Oracle

RIP, SunSolve 100

Kymermosst writes "Today marks the last day that SunSolve will be available. Oracle sent the final pre-deployment details today for the retirement of SunSolve and the transition to its replacement, My Oracle Support Release 5.2, which begins tomorrow. People who work with Sun's hardware and software have long used SunSolve as a central location for specifications, patches, and documentation."
United States

Submission + - Web 2.0 & Honesty in Sex, Politics and Religio

jg21 writes: Till now the best known example of what is technically known as 'the online disinhibition effect' is probably what's more colloquially called "web rage" – brutal rudeness, racism, flamings and the like. But this article suggests another, sex-related example: the new world of Web 2.0 is fast altering the human psyche, with social network users often, in a safe fantasy setting, "transgresssing" into a new sexual identity that has no necessary day-to-day link to their personas in 'real life.'

[From the article: 'Web 2.0 permits the construction of personal identity at different levels of 'personal privacy'...Internet culture now allows someone to express an 'abnormal' part of themselves (often a very minor part) without being obliged to include it in the self-identity that is designed to accomodate social or community expectations.']
Education

Submission + - Getting involved with writing open source licenses

bulio writes: I'm planning on studying civil law, and would like to gain some experience in the field by helping to write and revise licenses such as the GNU Free Documentation License, and licenses such as Creative Commons (and its derivatives). My question is, how does one help to revise and improve licenses like these? Is there a mailing list or IRC channel that I could visit? On another note, how would one go about writing his own documentation license?
Networking

Submission + - Flash based PC for ssh-based router?

iansmith writes: "I have an internal network I reach through a Linux box by using ssh to tunnel in via the internet.

The problem is I want to be able to reach this network even if the linux box(es) crash or get powered down.

Are there any flash based linux boxes (like the linksys wireless router) that have at least two ethernet ports to allow me to connect two networks together? It does not need to be fast or full featured, I just want a single service (ssh) running without needing to worry about an entire computer.

I'd use an old Cisco router (don't we all have a box of those in a closet?) but without firmware updates, no way will I put one on my network."
Security

Submission + - Malware Self-Defense Technologies Evolution (net-security.org)

An anonymous reader writes: This article explores how malware has developed self-defense techniques and how these techniques have evolved as it has become more difficult for viruses to survive. It also provides an overview of the current situation. In order to avoid confusion about what is considered a self-defense technology and what is not, it examines only the most popular and obvious means of malware self-defense. First and foremost this includes various means of modifying and packing code, in order to conceal the presence of malicious code in the system and to disrupt the functionality of antivirus solutions.
Security

Submission + - The IT department as corporate snoop (networkworld.com)

coondoggie writes: "As if we needed more proof that insiders are a seriously worse threat to your corporate jewels than any malicious hacker, a study released today says that one in three of IT employees snoop through company systems and peek at confidential information such as private files, wage data, personal emails, and HR background. The survey, which claims to reveal "the hidden scandal of IT staff snooping," is from Cyber-Ark Software, a company that, naturally specializes in password protection. As if that weren't bad enough, the survey found that more than one-third of IT professionals admit they could still access their company's network once they'd left their current job, with no one to stop them. http://www.networkworld.com/community/?q=node/1573 1"
Censorship

Submission + - Domain Registrars Censoring the Internet

An anonymous reader writes: Domain registrars and hosting providers routinely take sites off line when the contain illegal content, or are involved in spamming or fraud. These companies assert an absolute right to make these decisions without oversight, and we just assume they are right.

So, what happens if they are wrong?

Writing here the owner of a bittorrent site describes how two different Registrars/DNS Hosts have blocked the site, even though the actual host has no problem with it.

No big deal, right? Because bittorrent is illegal, and anybody using it must be involved in piracy. At least that is apparently the logic of the DNS providers DynDNS and Sitelutions.

In fact, the owner, who goes by the handle "Dr.E," says that the site is a "bittorrent news site. We do not operate a tracker, we do not host any torrent files, or directly link to any torrent files." He says that "I personally am a strong advocated for copyright law reform, and the site does encourage users to take full advantage of their rights to use material within the law, but those positions are completely legitimate, and espousing them is constitutionally protected free speech."

There is a big difference between opposing piracy and supporting censorship, and when some of the largest registrars are actively involved in censoring the internet, it should make people take notice.
Encryption

Submission + - Engineer Discovers 'Thermal Noise' Encryption (pcworld.com)

techitout writes: "PC World ran an article that Laszlo Kish of Texas A&M University devised a way to encrypt messages using the natural noise caused by electrons flowing along a wire. When data is sent intermittently (using a $100 device), it can be camouflaged by this 'thermal noise.' To snoopers eavesdropping on the line, it just appears that the thermal noise level varies randomly. It has an edge over another proposed encryption solution, quantum key distribution (QKD) technology, with a lower cost, a 99.98 percent message reception accuracy, and 2,000 km delivery distance."

Slashdot Top Deals

So you think that money is the root of all evil. Have you ever asked what is the root of money? -- Ayn Rand

Working...