Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Taking bets here.. (Score 1) 103

Yeah - that was my first thought. Kind of like when a bully is beating a weak kid with his own arms. "he was hitting himself"

Wasn't that the definition of "the letter" - the one that companies aren't allowed to acknowledge they received?! Maybe they aren't allowed to even say that they heard of the program.

Comment Re:Laughable (Score 1) 260

I didn't interpret her words in that manner. She seems to be suggesting that we would NOT come to a common place for *all* interactions. Ever been to a company party with your parents? You probably don't know many of the other kids - and the adults are a bit different too from the ones who came to your house for a BBQ. We all interact differently, even with the same people, when the context is different.

When I was in college there was a bar/pub that "everyone" hung out at on Friday nights. There were two guys who played Irish songs in sing-along fashion - we'd all sing and drink and otherwise socialize. But after last-call we'd all head our separate ways - until the next weekend. Sunday morning I would meet other friends at a different location to play games.

Different places for different kinds of interactions - I believe that is her point. We don't all go to FB for everything.

Even now I use other web-forums for things like car racing, or software-architecture, or other hobbies. Gosh - that's almost the design of meetup.com - a board for like minded people to find each other - and then they meet externally in a place conducive to the theme of the meetup.

Last time I saw a company on the web try to be everything - we later laughed at it. It was called AOL.

Submission + - Microsoft Shares Untold Story Behind Security Development Lifecycle (securityweek.com)

wiredmikey writes: Microsoft launched a new web site dedicated to sharing the untold story behind its Security Development Lifecycle (SDL). The Security Development Lifecycle, a process for writing more secure software, is now mandatory within Microsoft, and was the work of early security teams and the impact of Bill Gates’ Trustworthy Computing (TwC) memo in 2002.

The dedicated site, hosted at SDLstory.com, provides never-before-seen video footage and photos from many of the SDL’s key players, and uncovers a collection of little-known anecdotes. For example, Microsoft said that in the early 2000s, the company had to bus engineers to the customer support call center to keep up with high call volumes coming in as a result of security incidents. Microsoft also said that in early February 2002 the entire Windows division shut down development and diverted all developers to focus on security.

Submission + - Take me to your leader: Who will control the facebook robots? (ssrn.com)

alisonuw writes: Facebook is reportedly buying Titan Aerospace for $60 million, following Amazon and Google into the drone-o-sphere. The idea being that they'll use the drones to provide wireless internet to the developing world and therefore expand their market of potential users.

But the laws governing these robots are the same laws that govern the internet, despite the difference in technology/use. Simply put, the laws haven't caught up with the technology. The skies above Africa aren't exactly a no man's land of cyberlaw, but they're close.

Professor Ryan Calo has has written a new paper called Robotics and the New Cyberlaw that looks at the new legal challenges posed by these new technologies and the ways that the law needs to evolve to catch up to the pace of innovation.

"Two decades of analysis have produced a rich set of insights as to how the law should apply to the Internet’s peculiar characteristics. But, in the meantime, technology has not stood still. The same public and private institutions that developed the Internet, from the armed forces to search engines, have initiated a significant shift toward robotics and artificial intelligence...

Cyberlaw can and should evolve to meet these challenges. Cyberlaw is interested, for instance, in how people are hardwired to think of going online as entering a “place,” and in the ways software constrains human behavior. The new cyberlaw will consider how we are hardwired to think of anthropomorphic machines as though they were social, and ponder the ways institutions and jurists can manage the behavior of software. Ultimately the methods and norms of cyberlaw — particularly its commitments to interdisciplinary pragmatism — will prove crucial in integrating robotics, and perhaps whatever technology follows."

Comment Well gosh darn (Score 1) 1

How would employees know that such a system was installed?

I can understand a company needing to monitor for leaks - and granted they do own everything. Yes - my cell phone is my "trusted" way out to the internet that my employer can't snoop on (and I'm not using their resources).

Seriously though - how could anyone know the difference between "good" vs "bad" MITM ? Could DNSSEC be fooled in this same way?

Please - get back to work. Nothing else shall be tolerated.

Submission + - Hackers Paying Attention to Microsoft EMET Bypasses (threatpost.com)

msm1267 writes: Exploits bypassing Microsoft’s Enhanced Mitigation Experience Toolkit, or EMET, are quickly becoming a parlor game for security researchers. With increasing frequency, white hats are poking holes in EMET, and to its credit, Microsoft has been quick to not only address those issues but challenge and reward researchers who successfully submit bypasses to its bounty program.

The tide may be turning, however, if the latest Internet Explorer zero day is any indication. An exploit used as part of the Operation SnowMan espionage campaign against U.S. military targets contained a feature that checked whether an EMET library was running on the compromised host, and if so, the attack would not execute.

That’s not the same as an in-the-wild exploit for EMET, but that may not be too far down the road, especially when you take into consideration two important factors: Microsoft continues to market EMET as an effective and temporary zero-day mitigation until a patch is released; and the impending end-of-life of Windows XP in three days could spark a surge in EMET installations as a stopgap.

Submission + - Researchers Discover Einstein's 'Lost' Model Of the Universe

Hugh Pickens DOT Com writes: Dick Ahlstrom reports that Irish researchers have discovered a previously unknown model of the universe written in 1931 by physicist Albert Einstein that had been misfiled and effectively “lost” until its discovery last August while researchers been searching through a collection of Einstein’s papers put online by the Hebrew University in Jerusalem. “I was looking through drafts, but then slowly realised it was a draft of something very different,” says Dr O’Raifeartaigh. “I nearly fell off my chair. It was hidden in perfect plain sight. This particular manuscript was misfiled as a draft of something else.” In his paper, radically different from his previously known models of the universe, Einstein speculated the expanding universe could remain unchanged and in a “ steady state” because new matter was being continuously created from space. “It is what Einstein is attempting to do that would surprise most historians, because nobody had known this idea. It was later proposed by Fred Hoyle in 1948 and became controversial in the 1950s, the steady state model of the cosmos,” says O’Raifeartaigh. Hoyle argued that space could be expanding eternally and keeping a roughly constant density. It could do this by continually adding new matter, with elementary particles spontaneously popping up from space. Particles would then coalesce to form galaxies and stars, and these would appear at just the right rate to take up the extra room created by the expansion of space. Hoyle’s Universe was always infinite, so its size did not change as it expanded. It was in a ‘steady state’. “This finding confirms that Hoyle was not a crank,” says Simon Mitton. “If only Hoyle had known, he would certainly have used it to punch his opponents." Although Hoyle’s model was eventually ruled out by astronomical observations, it was at least mathematically consistent, tweaking the equations of Einstein’s general theory of relativity to provide a possible mechanism for the spontaneous generation of matter. The fact that Einstein experimented with the steady-state concept demonstrates Einstein's continued resistance to the idea of a Big Bang, which he at first found “abominable”, even though other theoreticians had shown it to be a natural consequence of his general theory of relativity.

Submission + - Ask Slashdot: Does your employer perform HTTPS MITM attacks on employees? 1

Matt.Battey writes: I was recently on-site with a client and in the execution of my duties there, I needed to access web sites like Google Maps and my company's VPN. The VPN connection was rejected (which tends to be common, even though it's an HTTPS based VPN service). However, when I went to Google Maps I received a certificate error. It turns out that the client is intercepting all HTTPS traffic on the way out the door and re-issuing an internally generated certificate for the site. My client's employees don't notice because their computers all have the internal CA pushed out via Windows Group Policy & log-on scripts.

In essence, my client performs a Man-In-The-Middle attack on all of their employees, interrupting HTTPS communications via a network coordinated reverse-proxy with false certificate generation. My assumption is that the client logs all HTTPS traffic this way, capturing banking records, passwords, and similar data on their employees.

My question: How common is it for employers to perform MITM attacks on their own employees?

Comment Re:I had something similar as a kid (Score 1) 231

Yes - Calculus can be taught visually, that's how my father taught it to me. I was a wiz at geometry, I can bisect lines and draw tangents in my mind.

Here's what I didn't understand though....what does the area under the curve have to do with anything? The line on graph paper was a line - what value was the area? To me the line was continuous - it didn't end, it was a function - so how could the area have bounds?

When I was given min-max problems in College the area/vol was always something concrete (e.g. land size, a rectangle, or a water bottle). I had a difficult time with Calc in college because I just couldn't relate these "areas under the curve" to anything real. I could do the mechanics (integrate, derivatives etc) and understood acceleration/speed. It wasn't until I was older that some of these area/volumes started to make sense (What is "work?" :-D )

My suggestion - I can't be alone in this problem - is to relate these areas to things. Answer the question: why is the area equal/equivalent/describe X ?. I had to take it on faith - my Dad said so. Can this be shown or described and be shown to "be really the answer" -- Why is it that?! A bit more concrete evidence that this is true.

I may not be an abstract thinker in math. This is why I program computers ;-)

Submission + - A vast surveillance network runs across America, powered by repo men (betaboston.com)

v3rgEz writes: Even as some police departments curtail their sue of license plate scanning technology over privacy concerns, private companies have been amassing a much larger, almost completely unregulated database that pulls in billions of scans a year, marking the exact time and location of millions of vehicles across America. The database, which is often offered to law enforcement for free, is collected by repo and towing companies eager to tap easy revenue, while the database companies than resell that data, often for as little as $25 for a plate's complete recorded history.

Submission + - Is This The Rumored AWD Tesla Model S?

cartechboy writes: Tesla is already on the record saying an all-wheel-drive version of the Model S electric car is coming, and soon. That car will share its drive system with the upcoming Model X crossover, based on the Model S platform. But now prototypes have been spotted with some mysterious testing equipment. Notably, two prototypes appear to ride slightly higher than a standard Model S. Tesla's said the all-wheel-drive system in the Model S will be "an efficiency-neutral option," which means it won't reduce the car's rated electric range. Or is this a Model X "mule," given its heavy roof rack? Or some kind of autonomous Model S prototype? Whatever the answer, Tesla's up to something...

Submission + - Meetup.com under DDOS after refusing to pay $300 ransom.

realized writes: Social media site Meetup.com is currently fighting off a DDOS attack after the company refused to pay a $300 ransom to not go through with the attack.

According to reports, the company's CEO, Scott Heiferman, got an email that said “A competitor asked me to perform a DDoS attack on your website. I can stop the attack for $300 USD. Let me know if you are interested in my offer”.

Before Heiferman finished reading the email the company started getting attacked.

The attack has been going on since last Thursday.

More information can be found on meetup’s official blog

Comment Re:Still should be hands free (Score 1) 142

Handsfree does not lead to less-distraction. The very conversation, hands-free or not, is still a problem. How much of a problem? I don't understand yet.

Most states that I've traveled are hands-free. Although a few are anti-texting only. Fewer yet have no restrictions. I haven't seen any that restrict usage in all-forms (except for specific classes of drivers, such as young/new).

Personally - it's the pushing of "buttons" that causes me pain. Using Google maps on my iPhone is a PITA (finding the "start route" button generally is hard). When hands-free I use Siri and Apple maps (for good or bad) - or having to Unlock the damn thing to make a modification (Siri, stop route, "sorry Dave, I can't do that") I bring my Garmin GPS with me whenever possible as it has the best UI - purpose built for in-car use (actually - navigation in general). I only use my phone for looking around or finding something very specific [planning phase]... then plug it into my Garmin and go. Plus, I tend to find myself in No-signal zones a lot. And of course - Siri has failed me multiple times with bogus routes or wrong address locations (arggg, sorry - breathe, breathe, take a slow breath)

NY has a rule that the driver may not operate a hand-held phone (although observationally few adhere to the law). When I went to CA last week the airport announcement was that CA restricts using any device that was not *specifically designed* for hands-free operation (or in car use?). I just remember the Specifically Designed statement.

VT has an anti-texting law (after a spate of joggers being run down & killed by folks texting and driving). Although they are currently considering upgrading that to hands-free because the Police have said that they can't tell if people are texting or dialing their phone, or using some GPS app. It all looks the same to them so enforcement is complicated. People under a certain age (17?) already may not use a cell phone at anytime in any manner while driving.

And WI or MI has restrictions on where the GPS unit may be mounted (must be mounted on the dash - not on the glass, I assume to keep it low in the field of vision). I can't remember which state - I just know that it caused me to buy a dash-mount for my GPS.

My null position is that I assume every state has a hands-free rule. Keeping with the spirit that Distracted is distracted. But commanding my phone to do my bidding seems like a fair risk to take.

Slashdot Top Deals

HELP!!!! I'm being held prisoner in /usr/games/lib!

Working...