Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Wikipedia names them (Score 1) 307

A list of companies still holding an entire /8 block, culled from the Wikipedia article List of assigned /8 IPv4 address blocks and verified against https://www.arin.net/ and https://apps.db.ripe.net/searc... on 7/2/2015:

3 - General Electric
4 - Level 3*
8 - Level 3*
9 - IBM (partially *)
12 - AT&T Services*
15 - Hewlett-Packard
16 - Hewlett-Packard (inherited from Digital Equipment Corporation via Compaq)
17 - Apple
18 - MIT**
19 - Ford
20 - Computer Sciences Corporation
32 - AT&T*
34 - Halliburton
38 - PSINet*
44 - Amateur Radio Digital Communications***
48 - Prudential Securities
53 - Daimler AG (via RIPE)

This list does not include military, postal, or other government entities.

* Network service provider

** Educational institution

** Special-use, mostly unreachable, see Wikipedia's article on AMPRNet for details

Comment It won't work that way (Score 2) 307

The way it MIGHT work is that ARIN would take the 3 block and in a controlled manner that won't break anything convert it into a bunch of /9 through /16 or even smaller blocks based on what GE is currently using. It would give GE a short period of time - maybe 30-90 days - to justify why it should be able to keep the blocks it is not currently using. If they give a good reason, they keep them. If they give no reason ("we have plans to use them in the next year, we'll show them to you if you sign an NDA" would be a good reason), they lose them. If they give a lame reason then it goes to some dispute resolution, effectively allowing GE to keep them for the duration of the dispute process.

Frankly, I'm surprised that ARIN didn't foresee this ages ago and ORDER anyone with a block bigger than, say, /12, to attempt to split up their address range, consolidate if practical, and return any unused blocks that were /16 or bigger. If this had been done, say, 10 years ago the process could have been be repeated 5 years ago but with the order applying to anyone with a range bigger than /16 to split, consolidate, and return any /25 or larger unused block. A year ago the same order could go out to everyone with a block bigger than /24 with an order for them to return all unused /24 blocks. I don't know if it's feasible for blocks smaller than a /24 to be handled by ARIN, but if it is, then they should start requesting those ultra-small blocks as well.

Oh well.

Submission + - The Tale of How the U.S. Supercomputer Police Patrolled Chinese Weather Systems (theplatform.net)

An anonymous reader writes: When IBM sent Zaphiris Christidis on an international assignment to China to manage the supercomputing division for climate and environment applications, he would be part of an over 50,000 strong force in China managing weather forecasting and research. While some were part of IBM or other technology vendor teams, it was striking to him how many people in the country were devoted to operational weather forecasting, not to mention how complex each of the regional centers that radiated off the main Beijing sites were...

Submission + - XKEYSCORE: NSA'S Google for the World's Private Communications (firstlook.org)

Advocatus Diaboli writes: "The NSA’s ability to piggyback off of private companies’ tracking of their own users is a vital instrument that allows the agency to trace the data it collects to individual users. It makes no difference if visitors switch to public Wi-Fi networks or connect to VPNs to change their IP addresses: the tracking cookie will follow them around as long as they are using the same web browser and fail to clear their cookies. Apps that run on tablets and smartphones also use analytics services that uniquely track users. Almost every time a user sees an advertisement (in an app or in a web browser), the ad network is tracking users in the same way. A secret GCHQ and CSE program called BADASS, which is similar to XKEYSCORE but with a much narrower scope, mines as much valuable information from leaky smartphone apps as possible, including unique tracking identifiers that app developers use to track their own users."

also

"Other information gained via XKEYSCORE facilitates the remote exploitation of target computers. By extracting browser fingerprint and operating system versions from Internet traffic, the system allows analysts to quickly assess the exploitability of a target. Brossard, the security researcher, said that “NSA has built an impressively complete set of automated hacking tools for their analysts to use.” Given the breadth of information collected by XKEYSCORE, accessing and exploiting a target’s online activity is a matter of a few mouse clicks. Brossard explains: “The amount of work an analyst has to perform to actually break into remote computers over the Internet seems ridiculously reduced — we are talking minutes, if not seconds. Simple. As easy as typing a few words in Google.”

Submission + - TracFone Finally Agrees To Allow Phone Unlocking (itworld.com)

jfruh writes: While most Slashdot readers probably enjoy the latest and greatest smartphones and heavy-use data plans, millions of Americans use low-cost, prepaid featurephones, and many of those are sold under various brand names owned by TracFone. Today, after much pressure from the FCC, TracFone admitted that its customers also have the right to an unlocked phone that they can port to a different provider, including those low-income customers who participate in the government-subsidized Lifeline program, widely (though incorrectly) known as "Obamaphone".

Submission + - Why Software Development Isn't A Straight March Forward (itworld.com)

jfruh writes: In Pali, the term for which is paiccasamuppda ('mutual arising') means that every action contains the seeds of unknown others, including ones that work toward its own destruction. We can see this in our national political life — when, for instance, a young white man who tried to start a race war by killing nine black people spurred a movement to remove Confederate flags from statehouses instead. And, according to webmaster Sasha Akhavi, we see it in software development as well, where our actions cause nowhere near the linear march towards success that we would like.

Submission + - Saber-tooth teeth grew at lightning speed (sciencemag.org)

sciencehabit writes: The fearsome saber-toothed cat, Smilodon fatalis, roamed North and South America from about 700,000 years to 11,000 years ago. Its daggerlike canine teeth, which protruded up to 18 centimeters from its upper jaw, could easily shred any bison, camel, or other prey that crossed its path. Using a new technique that combines isotopic analysis with x-ray imaging, scientists have found that the permanent canines of S. fatalis grew at a rate of 6 millimeters per month, about twice as fast as an African lion’s teeth--and almost twice as fast as human fingernails.

Submission + - Giving buildings a cosmic CT scan (sciencemag.org)

sciencehabit writes: Subatomic particles that naturally bombard Earth could be used to make 3D images of industrial equipment akin to medical CT scans made with x-rays, a new study suggests. The technique could reveal the corrosion of pipes or the degradation within thick layers of concrete. It could also enable routine inspections of pipes and valves that are buried, wrapped in insulation, or otherwise inaccessible, even while the equipment is in use—and even if it lies deep within a heavily shielded nuclear reactor, scientists say.

Submission + - Exploring the Relationships Between Tech Skills (Visualization) (dice.com)

Nerval's Lobster writes: Simon Hughes, Dice's Chief Data Scientist, has put together an experimental visualization that explores how tech skills relate to one another. In the visualization, every circle or node represents a particular skill; colors designate communities that coalesce around skills. Try clicking “Java”, for example, and notice how many other skills accompany it (a high-degree node, as graph theory would call it). As a popular skill, it appears to be present in many communities: Big Data, Oracle Database, System Administration, Automation/Testing, and (of course) Web and Software Development. You may or may not agree with some relationships, but keep in mind, it was all generated in an automatic way by computer code, untouched by a human. Building it started with Gephi, an open-source network analysis and visualization software package, by importing a pair-wise comma-separated list of skills and their similarity scores (as Simon describes in his article) and running a number of analyses: Force Atlas layout to draw a force-directed graph, Avg. Path Length to calculate the Betweenness Centrality that determines the size of a node, and finally Modularity to detect communities of skills (again, color-coded in the visualization). The graph was then exported as an XML graph file (GEXF) and converted to JSON format with two sets of elements: Nodes and Links. "We would love to hear your feedback and questions," Simon says.

Submission + - Lithium, Beryllium and Boron are the only three elements not made in stars

StartsWithABang writes: From helium up through uranium continuously, every element in the periodic table can be found, created by natural processes, somewhere in the Universe. (With many trans-uranic nuclides found as well.) Yet out of all of those, only three of them aren't created in stars: lithium, beryllium and boron. Boron in particular is necessary for life as we know it, as without it, there would be no such things as plants. Here's the cosmic story of the only three heavy elements to exist that aren't made in stars.

Submission + - Hundreds of Dark Web mirror sites 'booby-trapping' Tor users (thestack.com)

An anonymous reader writes: Tor users are being warned about hundreds of fake and booby-trapped .onion websites after the founder of Dark Web search engine ahmia.fi noticed a clone of his own site online. Juha Nurmi, who operates an open source .onion search engine, found over two hundred fake replicas of Dark Web pages, including the popular Tor version of DuckDuckGo. In a Tor-Talk post [https://lists.torproject.org/pipermail/tor-talk/2015-June/038295.html] he suggests that there are several copies of the targeted websites, each with similar addresses. Unlike on the traditional World Wide Web, unindexed Tor pages are typically located through directories rather than across search engines and often have complicated URLs – thus making it easier for fake addresses to go unnoticed. Nurmi added that the fake sites are working as transparent proxies to the real pages, allowing hackers to launch attacks against their targets.
 

Slashdot Top Deals

An authority is a person who can tell you more about something than you really care to know.

Working...