Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Google

Submission + - Google not losing $1.65M/day on YouTube after all (securityandthe.net)

secmartin writes: "A report by Credit Suisse released earlier this year claimed that Google was losing up to $1.65M per day on YouTube. This was widely considered to be a huge overestimate; now a new report by research firm RampRate provides a better estimate that takes into account that 73% of Google's traffic flows via peering agreements, leading to a more realistic figure of $477k/day.

What both analysts appear to be missing it the fact that Google is working hard to create a completely transit-free IPv6 network; as Google puts it in their IPv6 FAQ:

To qualify for Google over IPv6, your network must have good IPv6 connectivity to Google. Multiple direct interconnections are preferred, but a direct peering with multiple backup routes through transit or multiple reliable transit connections may be acceptable.

What do you think? Do these new figures sound more realistic, and would it be a good or a bad thing if Google didn't have to pay for their internet bandwidth at all?"

Comment What Linux needs to hit mainstream is (Score 1) 710

... a good powerpoint viewer. One that supports all powerpoint slideshows perfectly, no matter how much multimedia is embedded. A lot of home users receive annoying powerpoint presentations with some stupid joke or something, and they LIKE it.

They aren't supported very well in linux. Some are, many are not. Especially when sound is embedded. And Average Joe will open a presentation, notice it isn't what it is on Windows, and then believes Linux is no good.

Security

Submission + - MD5 proven ineffective for app signatures (win.tue.nl)

prostoalex writes: "Marc Stevens, Arjen K. Lenstra, and Benne de Weger have released their paper 'Vulnerability of software integrity and code signing applications to chosen-prefix collisions for MD5', which describes a reproducible attack on MD5 algorithm to fake software signatures. Researchers start off with two simplistic Windows applications — HelloWorld.exe and GoodbyeWorld.exe, and apply a known prefix attack that makes md5() signatures for both of the applications identical. Is it the end of signed software? Not quite, researchers point out: "For abusing a chosen-prefix collision on a software integrity protection or a code signing scheme, the attacker should be able to manipulate the files before they are being hashed and/or signed. This may mean that the attacker needs insider access to the party operating the trusted software integrity protection or code signing process. An attacker with such access can most probably do more harm anyway, without the need for chosen-prefix collisions, to get official digital signatures on malware.""

Slashdot Top Deals

Lots of folks confuse bad management with destiny. -- Frank Hubbard

Working...