Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Who will get (Score 1) 360

Not that I don't think the US govt. is abusive enough to do this on no evidence, but why not suspect Sony? They're also abusive enough, and have shown willingness to attack innocent parties without even pertended evidence. (Not that N.Korea is innocent of much, but I've heard of no convincing evidence that they are actually behind this.)

OTOH, it could be a third (unmentioned) group playing "Lets you and him fight.".

Comment Re: Marketing? (Score 1) 239

If this was a targeted attack, then forbidding outbound connections isn't sufficient. That keeps data from being transmitted out, but it doesn't keep malignent distorters from operating. Randomly changing a few bits every once in awhile could do quite a bit of damage, even invalidating backups, and be quite difficult to detect.

Comment Re: Marketing? (Score 1) 239

More to the point, in a case like this you need multiple nested perimeters. The media *is* the value of the company, so that should be stored on read only media, in multiple copies at different (secure) locations. Possibly encrypted, but then you need a somewhat similar protection for the keys.

Access to the media doesn't need to be available to anyone whose job doesn't involve editing it. So that another perimeter separate from that of the main company. If some management honcho says that he needs access, give him read only access. If he demands read/write access, have him work on a copy.

And, yes, this isn't perfect. Perfection is not available, so you nest near perfection. Now within each perimeter you also need those intrusion detection mechanisms you were talking about, but that doesn't suffice. Too much can happen too quickly.

Comment Re:Get Out of Your Bubble (Score 1) 275

What do you mean "held accountable"? When was the last time a major political figure was prosecuted for his crimes, rather than becaus his opponents found prosecution a convenient stick? The last time I can think of is Nixon, and I'm not certain about that. (I don't consider sex with consenting women that you aren't married to to be a crime. So don't bring up Clinton. That was clearly political action rather than prosecution.)

Comment Re: Do tell (Score 1) 275

He's saying that the phrasing of the headline reveals a bias in the submission. Perhaps he's right. (I don't watch either Dish or Fox, and I haven't followed their dispute, so this is based purely on his argument and your response...with some guidance from other posts both in this story and in past stories.)

It's a reasonable argument whether or not its true in this particular case.

Comment Re:You forgot something... (Score 1) 275

The problem is that if you go back to when unions were relatively powerful, the ones who were powerful were the management of the unions. And they often didn't do well by their members. (Other times they did, but ran afoul of some law or other, some times a reasonable one.)

Centers of power tend to become corrupt, because corrupt people are attracted to them more strongly than those who are not corrupt.

Comment Re:Fundamental failure of process design (Score 4, Informative) 212

That is pretty much how industry works. There is a right way to shut down a plant, and it involves a lot of things done in the right order. You can do an emergency shut down, and that will not kill anyone, but you will at minimum have to throw a lot of the stuff away that was going through the plant at the time.

Steel works are about a worst-case example of this. Lose power at the wrong time and you have no-longer-melted steel stuck in all the wrong places with no way to remove it. Removing this risk is impossible.

Slashdot Top Deals

Real Programmers don't eat quiche. They eat Twinkies and Szechwan food.

Working...