Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:It's been going on...for months (Score 1) 112

I get that they have server maintenance to pay for;

Maybe I don't understand how Slingboxes work, but the general concept of a "home DVR you can access from anywhere" doesn't seem to require that the vendor maintain a server or stay in business for that matter for the basic DVR and remote-viewing functionality to work.

This whole thing is really too bad. If I get to the point where I need to remote-view my DVR, shenanigans like this are going to make a home-brew box attractive by comparison.

Comment Put some informaiton into offline storage (Score 1) 36

There is some information that really shouldn't on "live" storage until there is a specific request, and once it is "made live" it should be purged after a reasonable period of time if it isn't still being accessed.

For example, the feds could keep most records of former employees and very-sensitive records of current employees "offline" unless there is a specific need to have that record immediately available. If an employee or government agency needs immediate access to a routine, not-very-sensitive record such as hire- and termination-dates, tough - they will have to wait 5 minutes for the human being who keeps the "offline" data to retrieve it and put it "online." For more sensitive data, the wait may be longer.

"Offline" doesn't necessarily mean "on a disk, in a locked drawer." It could mean "on an isolated, secure system which only a small group of people have access to."

Bottom line:

If an adversary gets in and tries to do a wholesale data dump, either he's going to only get the stuff that happens to be online, or he's going to create a huge volume of data-retrieval requests which will get unwanted attention.

Comment National police and private contractors (Score 1) 56

How many nations are setting up front group "contractors" and "private sector" teams that are a direct link back to their own military counterintelligence units? [emphasis added]

If they are smart, "zero."

If they are smart, national police who set front groups will make sure it's done indirectly enough that it will be hard to tie the "front" group back to the government entity in question.

As to the number of nations whose police forces use private groups as fronts in some way, shape, or form? The answer is probably close to or equal to the total number of nations with police forces. Sigh.

Submission + - Japan falsified whale hunting data in 1960s, according to study (sciencemag.org)

sciencehabit writes: Like fishermen, whale hunters sometimes alter the details of their catch. In the 1960s, Soviet Union (USSR) whalers illegally killed almost 180,000 cetaceans, but reported taking far lower numbers. Now, it seems that Japanese whalers in the North Pacific also manipulated their numbers around this time, according to a new study. The finding, which comes as Japan is readying to hunt whales for what it says are research purposes, raises new concerns about the country’s current endeavors; it also may invalidate several past studies on whale demographics and conservation, the authors say.

Comment Simplest to maintain (Score 1) 173

It will cost you some bucks, but the simplest-to-maintain connection would be a dedicated machine at the far end to act as a firewall that forces all traffic through a VPN, and some box at your end to receive the VPN's traffic and route it wherever it needs to go.

Doing it this way means there is no special software to install on the clients and nothing will "break" when Windows 10 or Raspberry Pi's next OS revision comes out.

For appliances like these, I would recommend you consider one of the specialized distributions that are built with this kind of thing - and the security that goes with them - in mind. A decade ago I would've said OpenBSD but there may be something better out there now.

Submission + - Pluto's ices may snow down on its nearby moon (sciencemag.org)

sciencehabit writes: Today, the New Horizons team released a false color image of Pluto and its moon, Charon, which shows the different materials that blanket each body. The team also offered an intriguing theory for Charon’s reddish polar cap. Although it lacks an atmosphere of its own, Charon orbits through and picks up gas molecules of ices that sublimate from Pluto’s surface and then escape from its atmosphere. Some of these stray molecules may bounce around Charon until they end up at a place cold enough to freeze out and stay put: the pole. The reddish regions on both Charon and Pluto thus offer an intriguing hint of a material connection between the two bodies.

Submission + - NASA algorithms keep unmanned aircraft away from commercial aviation (networkworld.com)

coondoggie writes: It is one of the major issues of letting large unmanned aircraft share the sky with commercial airliners: preventing a disaster by keeping the two aircraft apart – or “well clear” in flight. "The most difficult problem we are trying to solve is how do we replace the eyes of the pilot in the cockpit? We have developed, and are currently testing, detect-and-avoid algorithms. We're also running multiple research experiments to support the validation of this technology," said Maria Consiglio, who leads the NASA Langley Sense and Avoid/Separation Assurance Interoperability.

Submission + - Why it will take New Horizons 16 months to transmit its data to Earth

StartsWithABang writes: The speed of light requires a little over four hours to send a signal from Pluto to Earth. With NASA's New Horizons having just completed its flyby the morning of July 14th, you might think that it's only a short matter of time before we have everything it has to offer. But in reality, when it begins data transmission, it will take a full 16 months to transfer the full suite of its data to us. Here's the science of why.

Submission + - Google accidentally reveals data on 'right to be forgotten' requests (theguardian.com)

Colin Castro writes: From the article: "The Guardian has discovered new data hidden in source code on Google’s own transparency report that indicates the scale and flavour of the types of requests being dealt with by Google – information it has always refused to make public. The data covers more than three-quarters of all requests to date." Followed by: "Less than 5% of nearly 220,000 individual requests made to Google to selectively remove links to online information concern criminals, politicians and high-profile public figures, the Guardian has learned, with more than 95% of requests coming from everyday members of the public."

Submission + - ProxyHam Talk pulled from DEFCON -- Here's how to build it and why you shouldn't (hackaday.com)

szczys writes: Use WiFi anonymously from a mile away? It's obvious why the ProxyHam talk got a lot of interest when it was announced as part of this year's DEFCON line-up. Yesterday the talk was cancelled and no reason was given for doing so.

From photos and what little information is available, Brian Benchoff explains how you can build your own ProxyHam without it ever being presented. There are a few caveats, the radio and encryption technologies combined will have you breaking a few laws, and there's really no reason to go to these lengths.

Submission + - Critical Internet Explorer 11 Vulnerability Identified After Hacking Team Breach

An anonymous reader writes: After analyzing the leaked data from last week's attack on Hacking Team, Vectra researchers discovered a previously unknown high severity vulnerability in Internet Explorer 11, which impacts a fully patched IE 11 web browser on both Windows 7 and Windows 8.1. The vulnerability is an exploitable use-after-free (UAF) vulnerability that occurs within a custom heap in JSCRIPT9. Since it exists within a custom heap, it can allow an attacker to bypass protections found in standard memory.

Slashdot Top Deals

Those who can, do; those who can't, write. Those who can't write work for the Bell Labs Record.

Working...