Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Risk Management (Score 1) 236

Risk management is not simply about the probability of an event occurring; it must also take into account how damaging the event would be. For example, events that are very likely to occur but have little consequences might be safely ignored. Events that are very unlikely to occur but have catastrophic consequences merit some effort to prevent.

Comment Not uncommon in my world :) (Score 2) 104

I usually figure out that a cert has expired when something breaks. For example, I like to use free certs from StartSSL on Exchange Servers. When they expire, people get warnings when accessing OWA, or smartphones stop connecting.

If it happens to be on an SBS Server it can really be a pain, however, since it will stop working as a Terminal Services Gateway, making it difficult to log back on and replace the cert.

Comment Re:FFS (Score 2) 72

Wow. You sound inordinately passionate about April 1st. If such articles are so much to your liking, perhaps it's you who needs to go elsewhere. May I suggest America's Finest News Source?

As for this site, the motto used to be "stuff that matters". When April Fools articles become so numerous, it's no longer amusing. It's like the same joke being told over and over again. April Fools is not a "huge holiday". It's a day literally intended for fools, and only a fool finds the same joke funny time after time.

Comment What are the actual risks to your network? (Score 1) 114

OK, this is clearly a bad thing, but I don't think it means that your private LAN is immediately accessible to people all over the world does it? Multiple routers using the same keys means you could be tricked into logging in to someone else's router without knowing, but that would still require some way of directing your traffic to the imposter's device to begin with, such as DNS hijacking.

Knowing someone's keys would also allow you to encrypt/decrypt traffic as that device, facilitating a man-in-the-middle attack, but still, you need a way to get in the middle between two devices. This is not something that's trivial to do from one arbitrary location to another.

I'm not suggesting this isn't a serious problem, but I don't think it's as bad as, say, remote administration being enabled with a known default password.

Slashdot Top Deals

To do nothing is to be nothing.

Working...