Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Despite all of the complaining about it... (Score 1) 627

Where ALSA fails in it's most basic configuration is it's ability to handle multiple simultaneous audio streams. One stream going directly to an ALSA device, locks that device for playback thereby preventing any other application from using it.

This is only true if you have a shite sound card which doesn't support multiple audio streams.

Comment Re:Brain discrimination (Score 1) 187

It's not illegal to discriminate against people on the basis of their brain activity. Should it be? Can you judge someone on the basis of their biology? Is it really that person's fault anymore if a part of their body predelects them to wrongdoing? Where does liability start? Can you fix people? Should you?

Too many questions about really understanding the brain that our primitive moral system could begin to address.

Does it really matter whose "fault" something is? Discrimination based on assumptions, regardless of the basis, should certainly be illegal. However, discrimination based on objective, observable things shouldn't be. For example, it should be illegal to discriminate against potential employees based on ethnicity. It should not be illegal to discriminate against people with a measurably low IQ when the job can be shown to require a higher IQ. It doesn't, or shouldn't, matter that a person's intelligence quotient isn't exactly their fault.

Comment Re:Good (Score 1) 459

This information was on a public webserver without any type of authentication. If a large company like AT&T is irresponsibly handling customer data in this way the public should absolutely be informed immediately. Mr. Aurenheimer could have handled the situation better, but I do not think his actions should be criminalized at this level. Did he endanger people by blowing a whistle? Yes. Did he compromise a secure computer system to do so? No. IMHO this should fall more under "creating a panic" or something.

Comment Re:YAWN (Score 1) 242

Wake me when American military hackers are targeting Chinese civilians.

Is it so hard to believe that something like that may actually be happening already? Afterall, many of the operations conducted by our intelligence agencies (namely the CIA) are aimed at people many would consider civilians.

If I'm a national intelligence service and I want to create a botnet for military purposes, I also want to have plausible deniability. So, I construct my botnet the same general way criminals do. I hijack civilian computers, I purchase services through stolen credentials and fake ID's, etc.

Comment Re:What if.. (Score 1) 242

Or maybe they hacked our Internets and burned down our firewall? Seriously, IP spoofing is not as useful as the movies make it out to be.

Spoofing IPs is easy, but it's only effective in a few situations, such as when you're sending a message with no expectation of a reply (e.g. spam e-mail, DDoS attack, etc.). If you're trying to break into someone's system, you need to be able to get a response back, and that means providing an IP address you can be reached at to your target. Now, you may try to anonymize your IP address somehow, such as through the use of proxies, VPNs, and other such technologies that can allow you to hide behind or within someone else's system, or you may spoof an IP address of a zombie computer you control and can use to route return packets to you, but at some point, an IP address you control needs to be provided to someone else, otherwise you have no way of getting back a response, and that address can be traced.

I think the point still stands that it's possible for an attack to appear to originate from a location different from where it actually did. What is to stop someone from using a hijacked wifi access point to attack servers in, let's say France, and then use those French servers to launch attacks on Australian businesses?

I have personally witnessed an attack where computers owned by an American company were infected with a persistent agent designed to infect computers in a specific business in China (during a visit of the American execs to the Chinese location), for the purpose of then using the hijacked Chinese computers to conduct industrial espionage against another American company which also conducted business with that Chinese company. The actual attackers were neither American nor Chinese.

Comment Re:About time. (Score 1) 242

How do you know China isn't simply counting a hacked home box sitting on a cable connection as a governmental hack?

Perhaps we should be asking the same of our government? Whose to say that many of these "Chinese hackers" we keep hearing about aren't, in fact, hackers from elsewhere using compromised machines on Chinese networks?

Comment Re:Thou shalt not steal (Score 1) 116

The plea bargain system in particular is appalling. Either accept a lesser charge or we'll hit you with everything and nail you to the wall somehow. And indeed that is what is happening here.

In addition to that, many people fail to realize that sentencing modifications made in a plea bargain are generally not binding. The prosecution can recommend whatever, but the actual sentence is entirely up to the judge.

Comment Re:He's a pathetic snitch who will have no friends (Score 1) 116

If you're willing to break the law as an activist then be prepared to go to prison for as long as necessary. That is something that hacktivists and activists need to start thinking about and planning for.

Part of what is being protested here is the legal system itself and the (often) ridiculous sentences it doles out. Yes, activists should be prepared to face the consequences of their actions, but should not be expected to be quiet about them.

Comment Re:Why... (Score 1) 154

The CFAA makes it a crime to violate the Terms of Service of a web site. A ToS is a form of contract between the site and the user, and should fall squarly into civil law. A person who violates the ToS of a website or provider should be held accountable (in civil court) if their actions caused some sort of damage. Criminal charges and incarceration should only ever be on the table when such damage was caused with the intention of causing damage.

One of the issues here is the lack of mens rea in the CFAA. While Aaron admittedly breached JSTOR's ToS, he did not do so in a manner intended to cause damage to anybody. JSTOR's servers buckled under the load, but that shouldn't make this criminal as it wasn't Aaron's intention to overload them. Imagine if you were arrested on Federal felony charges because a water main broke while you were filling your swimming pool.

What Aaron did by utilizing the premises of MIT without consent is definitely tresspassing (at the least), but there is no reason his actions should have carried the possibility of so much prison time.
China

Submission + - China Claimed Millions of Computers Hacked by U.S.-based Servers (xinhuanet.com)

hackingbear writes: While we have heard reports of computers being hacked from China almost every other day, China's National Computer Network Emergency Response Centre identified 7.8 million computers in China had been hacked in the first six months of last year, with the most common location of the attackers being in the US (pay wall). According to CNCERT, 73,286 overseas IPs were involved in hacking China’s 14.19 million IPs, among which 10.5 million received attacks from US-based servers, 780,000 from South Korea and 778,000 from Germany. Apparently, as neither side can prove their claims or disprove the other's claims with absolutely indisputable evidences, the war of words will keep going.

Slashdot Top Deals

Beware of Programmers who carry screwdrivers. -- Leonard Brandwein

Working...