Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:Neville Chamberlin was not available for commen (Score 2) 230

Germany was spending far more on their military during that time than Britain was. If Britain and France had stepped in earlier, Germany would have been totally unprepared and the war would have ended quickly. Not to mention all of the horrors of the Holocaust that would have been prevented.

If Britain and France had managed to delay the war to "prepare" even more, say a few years, the Luftwaffe would have been dominated by jets, German ballistic missiles would have been longer range and more precise, and they might even have become a nuclear power. I really don't think this is the analogy you're looking for.

Comment The "wheel" group is an admin group (Score 4, Informative) 118

Truth: some Linux distros have a "wheel" group.
Truth: this group is used as a list of people with elevated permissions
Truth: one of the elevated permissions often assigned to this group is the ability to become root, especially with sudo
Falsehood: all users on a Linux system are members of the "wheel" group
Falsehood: one can add oneself to the "wheel" group without having permissions already elevated above regular user status

tl;dr: someone misunderstands groups and called it a vulnerability

Comment Re:Grinch is not a flaw - has no CVE!!! (Score 5, Informative) 118

About 3/4 of the way down the "article" they explained the vulnerability:

To control administrative access, Linux keeps a list of all the registered users on a machine, in a group typically known as “wheel,” who can be granted full root access (usually through the Unix sudo command).

A knowing attacker could get full root access by modifying the wheel group, either directly or by manipulating an adjoining program such as the Polkit graphical interface for setting user permissions, Alert Logic said.

This is patently stupid. Yes, if you give a badguy administrative access, bad things can happen--even if you use a fancy GUI to give the bad guy administrative access. The only thing that is even slightly newsworthy here is that maybe a novice admin won't understand the purpose of the wheel group and could be tricked into giving permissions, but there are a lot of ways you can trick a dumb admin, there's no need to single this one out.

Comment Re:Never attribute to stupidity (Score 1) 580

Propaganda campaign by who? I think Singer needs to check his haughtiness at the door:

the ability to steal gossipy emails from a not-so-great protected computer network is not the same thing as being able to carry out physical, 9/11-style attacks in 18,000 locations simultaneously. I can't believe I'm saying this. I can't believe I have to say this."

Except, of course, for the fact that the prime suspect is the hand-picked hacker squad of the Hollywood-obsessed leader of a nuclear armed state with ICBMs, whose family's Hollywood obsession has gone to such extremes in the past as kidnapping filmmakers and forcing at them at gunpoint to make movies for them. I can't believe I'm saying this. I can't believe I have to say this.

Comment Re:Hmm (Score 1) 81

That's not all that different from how he got started with Tesla. He had no intention of starting a car company (he already had SpaceX), he just wanted AC Propulsion to build him a copy of their t-zero - but they had no interest, even for a small fortune. But then they pointed him to this guy named Martin Eberhard who had this wild idea to commercialize the t-zero's tech base on a Lotus Elise body and was looking for funding... and thus Tesla was born.

Comment Re:Pretty sad (Score 1) 156

g++ supports it with __restrict__. And if you're writing high performance code but not having support for the features of modern compilers, you're an idiot. In appropriate situations, the performance difference for using restrict or not is huge. Array-heavy tasks like image processing often get a 2-fold or more benefit with using restrict. There's very few places in the coding word where a single keyword can raise your performance that much.

Comment Re:Backups are not secure (Score 1) 173

This is really not a good approach to using public key crypto. The private key shouldn't be on the servers, it should be on the client. I know it's a pain to handle per-file backups and especially deltas when everything is encrypted, but that's the tradeoff for proper security. In fact there's really no need for expensive public key crypto here at all. Just have the client use a cheapish symmetric key (AES256 perhaps) and send only encrypted data to the servers. There's no need at all for the servers to ever have the data in the clear.

Slashdot Top Deals

No man is an island if he's on at least one mailing list.

Working...