Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:NSA leaking (Score 1) 162

"NSA leak was the most damagind and biggest tech fail. They still don't know what was taken".

Given the size of the organization and number of people that have access to NSA 'secrets', I wouldn't be surprised if the Russians don't already have the files ..

Submission + - Unhappy with your government? Start a new one. 11

An anonymous reader writes: Stories like the NSA revelations (among many others) suggest that modern governments may be getting the sense that they exist of their own right and independent of the people who allegedly democratically control them. When faced with trying to "fix" this situation, individuals are daunted by the scope of the task. The institutions of government are huge and difficult to imagine changing. However, apart from changing from the inside or revolting against the system, there is a very different alternative: just set up a new government. Of course current governments frown on that, but there are ways around it. Seasteading advocates creating new nations in newly-created lands (i.e., on the seas). Open source governance advocates setting up new, internet-based communities with their own governance system and allowing those communities to gradually push out the antiquated systems. What's your plan for living in democracy in the coming year?

Comment If your machines have been owned .. (Score 1) 215

"Applebaum spoke about why the NSA's program might lead to broader adoption of open source tools and gave a hot tip on how to know if your machines have been owned."

Where could the code be hiding .. the BIOS, the PCI BIOS, the Video Card, the NIC, the PXE ROM or buried in the CPU microcode ...

Comment Certs are next to useless .. (Score 1) 228

"To what extent does a CMMI certification determine a successful project outcome? CGI Federal, the lead contractor at Healthcare.gov"

Certs are next to useless in determining project outcome, all they do is generate revenue for the lawyers. How many PCI Compliant Credit Card clearing houses have been knocked off - hundreds. For a successfully project what you need is a small core team of top-notch programmers. Apart from getting awarded certs can you name any large-scale projects CGI Federal worked on that could be declared a success by reputable programmers and the end-users.

Comment Computer hacker shut lights off with malware? (Score 1) 396

'When U.S. officials warn about "attacks" on electric power facilities these days, the first thing that comes to mind is probably a computer hacker trying to shut the lights off in a city with malware'

Just who in their right mind would connect the power facilities directly to the Internet .. oh wait ....

Submission + - Unintended Consequences: How NSA Revelations May Lead to Even More Surveillance (vortex.com)

Lauren Weinstein writes: "This then may be the ultimate irony in this surveillance saga. Despite the current flood of protests, recriminations, and embarrassments — and even a bit of legal jeopardy — intelligence services around the world (including especially NSA) may come to find that Edward Snowden’s actions, by pushing into the sunlight the programs whose very existence had long been dim, dark, or denied — may turn out over time to be the greatest boost to domestic surveillance since the invention of the transistor."

Comment When it comes to modern firewalls .. (Score 1) 259

"When it comes to modern firewalls for corporate computer networks, the world's second largest network equipment manufacturer doesn't skimp on praising its own work"

Firewalls are next to useless given todays Oss that require randomly open ports and remotely downloading scripts/code in order to function, the security model is fundamentally broken ..

Submission + - IPv4S coming soon? IPv6 is dead? (acostasite.com) 2

An anonymous reader writes: After a secret meeting almost a week in Switzerland, major hardware and software manufacturers worldwide took the drastic decision not to continue with the development and implementation of IPv6. Alternatively they unanimously decided to use the same IPv4 protocol and create a new concept of sub-IP (IPv4S).

Technical details are described as follows: "Let's use a bit that is reserved in the IPv4 header from source (RFC 791), the bit to be on the hosts will read the data fields indicating more IPv4 addresses, ie, is a subset of IPv4 ". According to the TNIV PhD Freq: "This is something that should be done long ago."

Submission + - Hacker took over BBC server, tried to 'sell' access on Christmas Day

An anonymous reader writes: A hacker secretly took over a computer server at the BBC, Britain's public broadcaster, and then launched a Christmas Day campaign to convince other cyber criminals to pay him for access to the system.

It was not clear how the BBC, the world's oldest and largest broadcaster, uses that site, ftp.bbc.co.uk.

Slashdot Top Deals

Real Programmers don't eat quiche. They eat Twinkies and Szechwan food.

Working...