Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Truly sad (Score 1) 359

Africa is a good example. At least 40% of the people who get Ebola are likely to survive it

However, in Europe, who knows?

There is a reasonable chance a significant portion of the West African population has some degree of immunity. There is NO chance the same is true of Europeans - It may well turn out like when the Spanish invaded South America. - or plague in Europe in 14th century.

Sure we might be better prepared, but with incubation of 20 days or so, who did you shake hands with three weeks ago? Come on, make a list - we need to interrogate them NOW!

Comment Re:Does it matter? (Score 1, Interesting) 65

An American would think that. Citizens from other countries may well disagree there. Especially because of that unthinking American preference for Americans in charge everywhere.

Really? Do tell us about all the governments that would rather have Iran or North Korea in charge of ICANN. Please :)

Comment Re:MUCH easier. (Score 3, Insightful) 239

You are speculating on a system that would be able to correctly identify ALL THE OBJECTS IN THE AREA and that is never going to happen.

It doesn't have to identify all the objects in the area, it simply has to not hit them.

Actually, since the whole question of TFA is about ethical choices, it does have to identify them. It can't view a trash can as being equal to a child pedestrian, for example. It will have to see the difference between a dumpster (hit it, nobody inside dies) and another car (hit it, someone inside it may die). It may even need to weigh the potential occupancy of other vehicles...a bus is likely to hold more people than a scooter.

The question at its heart is not about object avoidance in the article...it's about choices between objects. And that requires identification.

Comment Re:Alternatives (Score 1) 331

Your analysis seems to assume that there are apps, and that is it. But in reality there are apps that are virus hosts in themselves. VB within Excel. Javascript within browsers.

Actually, no. There are apps and there is the OS itself. But by the time you're talking about the security model, the OS already exists, and anything you add to that is, essentially, an application. Delivery operates the same way, dependencies can as well. The VB that is within Excel is no less an app than the app that requires .NET framework be installed, a javascript that executes in the browser, or a java applet that requires a JRE. The fact that it depends on something else doesn't change the model. And any app can be malicious or friendly; even a friendly app can be modified or tied with a pre-executed piece of malware.

Comment Re:us other engineers matter, too (Score 5, Insightful) 371

/. may be a software-centric site, but those of us in mechanical, electrical, optical, materials, and other branches of engineering are in the same basic position. But sadly, even in businesses which promote engineers into senior roles end up respecting people primarily on the basis of how many direct reports (that's the term for peons whose salaries they determine) they control. Until you're able to rate people by the quality/quantity of output regardless of altitude in the org chart, this problem will continue.

Indeed; the underlying basis of the article could really match almost any profession. Accountants, HR personnel, programmers, even admin assistants. Not understanding the role of a job invariably means not understanding its challenges or the value it brings. So what? This is not news. Hell, I've seen companies where they didn't understand the value of managers...and thus, promoted/hired people into such roles who had no skill at doing their jobs.

Comment Alternatives (Score 2) 331

There are currently two solid alternatives to traditional AV. Unfortunately, one is not suitable outside of a well-managed (i.e., corporate) environment and the other probably would not work in a full-featured computer environment.

1. Whitelisting: Application whitelisting is really, really effective. There are ways to circumvent it, but that's true of just about any technical security control. The problem with it is twofold: one, someone needs to develop exactly *what* that whitelist is, and the average home user isn't really up to the task. Bit9 (the leader in the space) has gotten around this to some degree with a cloud-based archive of "known good" files and processes, but your standard home user will still run into a lot of things they don't recognize when they install. And what if one of those things is actually an existing infection? Then they will probably add it to their whitelist...or, on the other hand, err on the side of caution and end up breaking valid software on their systems. The odds of them hitting it exactly right are very small. And even then, they have to maintain the whitelist...so if they're taken in by that "YOU NEED TO UPDATE YOUR VIDEO CODEC LOL" popup window, they'll invariably end up authorizing whatever file gets downloaded ("'Trojan_video.exe'...sounds legit to me!") and infecting their system anyways.

2. The "Walled Garden" Model: In a lot of ways, this is like whitelisting built into the underlying OS, with the OS manufacturer being the custodian of the whitelist. This is how iOS works, so it's actually a proven model. There's only been one discovered instance of malware that's slipped into the App Store, and that was easily eradicated with the press of a button back at the Apple mothership. But on the other hand, there are ancillary effects to forcing all devs to go through a single clearinghouse for software. Apple's cut of the profits, and their cut of any revenue passing through any app sold through the App Store, are obvious issues, but the antitrust risk of a PC OS with only one place to go for software is a latent...and larger risk, going forward. One court decision can break the model entirely; if Apple doesn't collect at least some money from developers, then there's no money to support the App Store and the activities around it. But if there's no central authority, then there goes the chain of trust that's necessary to maintain the safety of the OS. And there's complexity in a PC-based OS environment that you don't find in a tablet or smartphone; in the tablet/phone model, each application is an island, separate onto itself for the most part. You don't have browser plugins, underlying execution environments or interpreters (Air, Java, .NET, Python, Perl, etc.).

Either way, the "blacklist" approach doesn't work. It's all fine to point out that other things (firewalls, IPS, etc.) need to be in place, and that's true...but malware is its own threat, and cannot be fully addressed by solutions that only focus on the attack. Applications will have vulnerabilities; railing against this hasn't accomplished anything in two decades. People will make mistakes, or be social-engineered into doing things they should not do. Supply chains will become infected (remember cameras, USB drives, etc. that have come with malware?) and sometimes those mistakes will affect people besides the mistake-maker. So there needs to be a way to address malware itself.

There are two approaches that, while theoretical, also hold promise. The issue is that they are pretty much theoretical; there's no existing implementation of either of them on any scale, or as a deployable off-the-shelf technology today.

3, The Managed Immunological Response: Assume that malware will exist, and somehow get onto systems. Most complex organisms hold pathogens within themselves that are harmful...and in many cases, even contain them in a symbiotic relationship. Eradicate E. Coli from a human's lower GI tract and they'll develop problems, for example...but E. Coli outside of that part of their body causes major issues and is a health problem. Catch a cold, and you'll be sick for a bit...but your body will get over it. This is what some researchers are aiming towards, and the approach shows a lot of promise in theory. But it requires that the OS operate in a functionally different way, a way that does not currently exist. So...yeah, that's a ways off, if it will ever happen.

4, The Sandboxed World: This is where applications are walled from one another...this is another feature of the iOS model. And as with the Walled Garden, the challenges of this grow severely when you move to the PC world. If it's hard to exchange data between your email client and your word processor, you're going to have a hard time getting things done. This is already something of a nuisance in the tablet/phone world. But if you open up access to the file system, then you create an avenue for bad things, and punch holes in the sandbox walls. So I don't know if it can be fixed in a way that would suit PC users, or if, in a lesser implementation, it could support something akin to the Managed Immunological Response model.

Comment Re:No (Score 5, Insightful) 264

When the only tool you have is a hammer, everything looks like a nail. Now police's only tool are military-grade weapons, intended to kill.

And sometimes the situation changes how people is, like in this Standford prison experiment

Add to that how police cover up miscarriages and that you can't film the police, is not just who watches the watchers, but who watches the watchers that have military-grade weapons in the streets and are abusing of them.

Comment Re:Too much surplus (Score 0) 264

If we have this much surplus, clearly we're buying too much. I know that if I find myself giving away cans of green beans, I make sure I don't buy a whole pallet the next time I'm at Costco.

We just demobilized from one war, and are nearly done pulling out from another. Surplus is what inevitably happens as a result.

Look at it like this: when you get back from a camping trip, do you set the tent back up at home, and use the cook stove to cook your meals at home too? Of course not. And military equipment is usually better off sold rather than mothballed, especially since the threats keep changing and the cost of upgrades on gear that's in storage (don't forget the logistics) is greater than the cost of replacement, all other things taken into account.

That said, I wonder how much of this billion dollars is from MRAP donations. The military is giving nearly all of their MRAPs to law enforcement agencies, and they aren't exactly cheap. So that could be the bulk of this, easily.

Comment Re:Gettin All Up In Yo Biznis (Score 1) 419

Great dad, in my opinion. My kids grew up involved in hunting, fishing, and shooting sports - but a trip to a refugee camp would probably have cured them of the FPS BS faster than anything.

Fortunately, they were never really into videogames.

Aaaaand...what kinds of movies did they watch, perchance? Did their dad keep them on a strict diet of Barbara Striesand? No? A few action movies, then? Hm.

Games are one form of entertainment. If someone is going to condemn simulated (and unrealistic) violence in one medium, they really should do so across all media, don't you think?

Slashdot Top Deals

You knew the job was dangerous when you took it, Fred. -- Superchicken

Working...