Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Article got it wrong (Score 5, Informative) 101

Almost all the reports are getting the gist of the paper wrong -- any press summation that doesn't go into the paper to understand it will get it wrong. The paper goes into deep detail that Apple has several services that, while protected by several layers of security that could be bypassed, can transfer data in the clear. There are also several services that don't have any obvious connecting software.

It's a rather deep hacker-style dive into iOS.

A good video about this is by TWiT Network. At http://twit.tv/sn465 Security Now ep 465 has expert Steve Gibson explain the actual paper.

Comment The commits are funny into themselves. (Score 4, Informative) 379

A Tumblr site popped up a few days ago called OpenSSL Valhalla Rampage. The blogger there is going through all the commits and posting the juicy funny comments there. This includes killing... and rekilling... VMS support (which reminds me of Maxim 37: there is no such thing as overkill...), stripping out now-stupid abstractions and optimizations of the unoptimizables, and more.

Comment Or, free Mathematica with $35 purchase of a Pi* (Score 2) 99

An offer of over $300 in value! Get yours now!

* Based on purchase of a Model B from direct authorized sellers. Does not include shipping or purchase at authorized resellers. Must be run from a Raspbery Pi computer board. Storage, display, keyboard, mouse, and power supply not included. Model A does not include Ethernet.

Submission + - Hyperloop's Math just doesn't add up (greatergreaterwashington.org)

strredwolf writes: Elon Musk's Hyperloop looks like a winner on the face of things... but if you get down to the details, you'll find that the math just doesn't add up in comparison to California's High Speed Rail. Hyperloop's only 10% capacity of HSR and can't run every 30 seconds safely... and the construction and location details leave much to be desired.

Comment Levels of escalation (Score 1) 247

1. Open up the compromizing email's headers. Locate the first ISP beyond yours -- 99% of the time it's not there's. Contact THAT company.
2. File a complaint with the FCC. They are getting more active against exploits.
3. Locate your Attorney General's office and ask if there are any state laws against spam. There is one in Maryland that is compatible with CAN SPAM, and has been tested in the courts. If you got one, lawyer up and sue the company -- some companies only respond by judicial inquiry.
4. Blacklist the company publicly.

Comment There is a reason you are listed. (Score 5, Insightful) 279

There is a reason you are listed:

* You have spam originating from your system for too long of a time.
* You are unresponsive to reports.

So, your entire network range is listed. Everyone is bouncing emails. Everyone is complaining to you, and you've noticed. You've been forwarded the site, and you're contemplating just paying them off... except that it just won't work. You'll be relisted again, and with reason -- someone on your network spammed and nobody's listening.

Thus:

* If you haven't done so, open up abuse@ and point it to somebody with the power to diagnose, disable, and close accounts.
* If the guy behind abuse@ doesn't have said above power, GIVE IT TO HIM.
* If the guy behind abuse@ does, but doesn't use it, FIRE HIM.
* If you haven't done so, disable outbound port 25 at your border router with the exception of an out-bound SMTP server.
* Put an outbound spam filter in place.

If you are unwilling to do the above, then there is one last thing you will eventually do: CLOSE SHOP.

Slashdot Top Deals

It is easier to write an incorrect program than understand a correct one.

Working...