Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment I'm not bothered by break-in attempts (Score 1) 241

I watch my daily security logs from time to time, but the only remote login attempts I see are my own. I can attribute this to several layers of security:

  • I'm using a dynamic IP address.
  • Access to my home network is gated through my router. Any incoming SSH connection is directed to a specific IP address on the inside, which is only configured when my computer happens to be running Linux.
  • ACL's on the router prohibit SSH connections from everywhere except specific source subnet's I've opened up, and some of those (like work) are only open at certain times during the day.
  • I'm subscribed to my Linux distributor's security updates, and apply them on a regular basis.

I won't claim that it's perfect protection, but one of the best things you can do to secure a system is to shut out all access by default and then only open tiny pinholes for the specific connections you need.

Comment This means very little to me (Score 3) 121

I've seldom trusted consumer reviews, not because they might be fake, but because "consumers" often lack enough experience with large enough numbers of competing products for their opinions to hold any weight. When I'm looking for reviews of a product, I want professional reviews from journalists who are dedicated to researching the genre.

Comment Easily worked around (Score 1) 126

The problem with claiming "innovation" in the pharmaceutical industry is that they can easily bypass existing patents simply by tweaking the processes or non-essential ingredients in creating a drug to make it just different enough to claim it as a different product. That doesn't really help society at all. The rate of discoveries of "high social value" has not risen significantly in the presence of patents. See Boldrin & Levine: "Against Intellectual Monopoly", Chapter 9.

Comment RAID + bacula (Score 2) 304

I have been using RAID for many years — RAID-1 at work as I only have two drives and don't need much storage space, and RAID-5 at home. A couple of years ago when I upgraded my computer at work, I downloaded at least three different backup systems to try out. The goals were simplicity of use, keeping historical versions of files, and relatively low storage space.

After setting up bacula, I never bothered with the other backup applications.

I found bacula to be highly flexible, adapted very well to the set of many virtual machines I use, and is the easiest to maintain. I just set it up once (or after any major re-partitioning) with a specific list of files and directories to back up or exclude, then practically forget about it. It's saved my files a number of times already from accidental deletion or overwriting, and I used it once for a full restore at home after upgrading my computer including a new RAID array.

At work my excess hard drive space is enough to store all my full and incremental backups locally, but I also have it back up critical files to a corporate NFS server. At home I use LTO-4 tapes, which provide plenty of backup storage for over 2 terabytes of data; and whenever it runs a full backup I take the used tapes off-site for extra security.

Comment Re:Patents should promote innovation (Score 2) 249

I've read evidence that industrial patents do not promote innovation, but hinder it instead. The most effective tools for profiting from either a product or a process are secrecy, complementary manufacturing, and market lead time. (Boldrin & Levine, [2008], "Against Intellectual Monopoly")

Comment Can't trust closed source apps (Score 1) 179

This is part of the reason I don't trust close-source applications that require Internet access. At least with open source I can take a look at the code and see, "hey — this program is running a key logger!" I can then modify the code and permissions and run the application without the offending network activity.

(I actually did that with one program, found on code.google.com no less. It was written with a key logger that uses a closed-source library called FlurryAgent.)

Security

How To Stop the Next WikiLeaks 191

Hugh Pickens writes "Eli Lake reports that the U.S.'s 16 intelligence agencies are using a program called SureView that makes it easier to spy on the spies and catch whistleblowers early in the act. SureView is a type of auditing software that specializes in 'behavior-based internal monitoring' that monitors the intelligence officer's computer activity. If the officer acts like a potential leaker, sending an encrypted email or using an unregistered thumb drive, the analyst might push a button and watch a screen video of the officer's last hour of work. Once a case is made that a leak might be imminent, it is checkmate: the agent is thwarted. 'Had SureView been on Bradley Manning's machine, no one would know who Bradley Manning is today,' says Ryan Szedelo, manager for Raytheon's SureView software. The intelligence community has had auditing software for years. SureView came on the market in 2002. But the programs were buggy and often prone to false positives, alerting a network administrator too often to routine behavior. 'The technology has gotten substantially better in the last year,' says Jeffrey Harris, a former head of the National Reconnaissance Office. 'The problem with audit files was it took an army of people to understand them. Now we have rule-driven systems and expert systems that help us reason through the data.'"
Space

Submission + - Saturn's Rings Formed from Large Moon Destruction (spacefellowship.com)

Matt_dk writes: The formation of Saturn's rings has been one of the classical if not eternal questions in astronomy. But one researcher has provided a provocative new theory to answer that question. Robin Canup from the Southwest Research Institute has uncovered evidence that the rings came from a large, Titan-sized moon that was destroyed as it spiraled into a young Saturn.
Microsoft

Submission + - Ubuntu: we won't moan to EU about Microsoft (pcpro.co.uk)

Barence writes: The company behind the Ubuntu Linux distro says it has no plans to follow Opera's lead and file a complaint against Microsoft to the EU. Ubuntu 10.10 is the most "consumer-friendly" version of the Linux distro to date, but it faces an uphill battle against Microsoft's marketing machine. Even high-profile supporter Dell has dropped Ubuntu machines from its website in recent months, while continuing to remind visitors that "Dell recommends Windows 7" at the top of every PC page. However, Canonical won't take inspiration from Opera and complain about anti-competitive behaviour to the EU — a move which saw Microsoft forced to offer rival browsers to Windows users across Europe. "I don't think we've ever considered it," said Steve George, vice president of business development at Canonical. "The improvements we're making to Ubunutu... are a better route for us to reach out to users and get a bigger user base."

Slashdot Top Deals

I tell them to turn to the study of mathematics, for it is only there that they might escape the lusts of the flesh. -- Thomas Mann, "The Magic Mountain"

Working...