Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - Slashdot experiences total loss of Internet viewers over April Fools

JohnnyDoesLinux writes: There were many warnings about the April Fool's day stories, but nobody believed them. A witness says, "It was if the new beta had taken over the minds of the people running the site, and they just shrugged off good advice".

See for yourself:
http://www.slashdot.org/
So now people are mourning the total loss of Slashdot as a viable website for Nerds, now it is "News for Nincompoops".

Comment Re:Delete stuff. (Score 1) 279

claiming something doesn't make it false -- in this case it would be true.

However, the gear isn't theirs -- as I originally pointed out, it's the company's, which is why it is being respected as the company's gear, and is being reimaged to be in compliance with company policy.

However, this doesn't work as well with BYOD, which is increasingly common. In those cases, you need other ways of fencing off company data from personal data.

Comment Re:Do It, it worked in AZ (Score 1) 886

Ah; but 1) I don't stand on the female golfer at all
and 2) I *can* have it both ways, as these things are open to context and interpretation.

Since there's really nothing differentiating a male golfer from a female golfer other than gender, I see no problem with her joining. On the other hand, there's lots of other clubs she could have joined.

So I'm on both sides, and feel that they should have been able to amicably work it out between them instead of bringing it to court. There are always exceptions to the rules.

Comment Re:Copyright (Score 1) 100

The point here is that in order to sell new games, they would need to advance the progress of science and the useful arts. That's what copyright is all about.

A new game that's like an old game, but can run on different hardware, with slightly improved graphics, slightly improved sound, and in-game purchases, does not advance the progress of science and the useful arts.

Basically, history shows that people are willing to pay for products that achieve what copyright sets out to achieve. People tend to find alternate ways of preserving their societal history when copyright is used as a means of artificial monopoly for the sake of holding our social heritage hostage.

Comment Re:Copyright (Score 4, Insightful) 100

This one's easy: Nintendo still sells games. They're afraid that if people start playing conversions of their old games (or even just start watching videos of other people playing old games), they'll have no incentive to go out and by their newer games/consoles.

The reality probably includes that, but also includes the fact that since IP goes so deep, any Nintendo games are likely to include IP licensed from others, with specific contract details outlining how the IP can be used. If some third party starts duplicating/redistributing this IP, things get messy.

Not the way it *should* be, but it's the way it *is*. Shortening copyright to 14 years for digital works would fix a lot of this.

Comment Re: Delete stuff. (Score 1) 279

I think you've just proven that it's good advice in the UK too -- because if the email is personal rather than business, you will be in a lot of trouble via the privacy act if you let those personal emails fall into the hands of the co-workers of the individual who left. So you MUST back up everything (without looking at it to see what's personal and what isn't) and MUST then clear out all the personal email before allowing other co-workers to look at the archive. Failure to do either is a criminal offense in the UK.

Comment Re:Delete stuff. (Score 1) 279

You summed this up nicely -- including my propensity to use closely matched mnemonic clauses :) I almost switched from "on the company time" to "the company's business" but it sounded clunky, and I figured everyone already knew what I was talking about and just needed a friendly reminder.

Obviously at least one person needed it spelled out in more detail :)

Comment Re:Remove access ASAP (Score 2) 279

Security is already done or not when the notice goes in... but shutting off access, as the GP pointed out, is done as a simulated test environment. Basically, it's a "What would things be like if he wasn't here?" while he's still around to help out if it turns out something was missed. The alternative is assuming that everyone has a perfect memory and that all systems have been adjusted appropriately, all project migrated properly, and no further questions need to be asked (in which case, why not give him 2 weeks paid vacation, if he isn't needed anymore?).

Comment Re:Delete stuff. (Score 4, Insightful) 279

And beyond this... if it's on the company computer, it's on the company's time, and is the company's business. A lot of people forget this and use company systems for personal stuff, but it's still company data, and has been proven to be so in court.

So yeah; back up everything now, and then provide a sanitized version for others to look through as need arises.

The truth is, even if there's something critical in the backup, it's likely that nobody will ever know its there and so have reason to go looking for it. But CYA is always important for IT.

Submission + - Angry Boss Phishing Emails Prompt Fraudulent Wire Transfers (securityledger.com)

chicksdaddy writes: Lots of studies have shown that assertiveness works (http://www.ncbi.nlm.nih.gov/pubmed/8056571) in the professional as well as personal sphere. It turns out to work pretty well in the cyber criminal sphere, also (https://securityledger.com/2015/03/wire-transfer-scam-shows-assertiveness-works-with-phishing-too/).

Websense Labs has posted a blog warning of a new round of spear phishing attacks that rely on e-mail messages posing as urgent communications from senior officers to lower level employees. The messages demand that the employees wire funds to a destination account provided in the message. (http://community.websense.com/blogs/securitylabs/archive/2015/03/30/Assertiveness-is-a-valuable-quality-for-the-C_2D00_Level-and-cyber-crooks-alike.aspx)

According to Websense, these attacks are low tech. The fraudsters register “typo squatting” domains that look like the target company’s domain, but are subtly different. They then set up e-mails at the typo squatted domain designed to mirror legitimate executive email accounts.
Like many phishing scams, these attacks rely on the similarities of the domains and often extensive knowledge of key players within the company, creating e-mails that are highly convincing to recipients.

The key element of their attack is – simply – “obeisance,” Websense notes. “When the CEO or CFO tells you to do something, you do it.” Specifically, the attackers sent emails to lower level employees that appeared to come from executives. The messages were brief and urgent, included (phony) threads involving other company executives and demanded updates on the progress of the transfer, making the request seem more authentic. Rather than ask the executive for clarification (or scrutinize the FROM line), the employees found it easier to just wire the money to the specified account, Websense reports.

Websense notes the similarities between the technique used in the latest phishing attack and the grain trading firm Scoular in June, 2014. That company was tricked into wiring some $17 million to a bank in China, with employees believing they were acting on the wishes of executives who had communicated through e-mail. (http://www.reuters.com/article/2015/02/04/usa-grain-scoular-idUSL1N0VE2NX20150204)

Comment Re:Complete fail (Score 1) 55

http://store.apple.com/us/brow...

Now that that's out of the way... I've got devices from 2009. I can't find any way to even trade them in.

Back in 2011, I had an iOS device failure out of warranty, and I got a $50 value for bringing in the back cover of my previous device. Didn't need to bring in the rest, just the back cover, and I got $50 off the replacement. This probably kept me from going with an Android device at the time, and now I'm locked into the iOS App walled garden.

So not sure about how they've adjusted the program now, but the old way definitely has affected my buying decisions.

Comment Re:Results? (Score 1) 61

Well why not automate the process? SCIgen should just subscribe to the SciDetect source repo, and auto-update its copy when the trunk updates. SciDetect should then subscribe to the SCIgen source repo, and ensure that it detects any newly missed sets.

Leave this system alone for a while, and we won't need to write articles anymore, as SCIgen should do a better job of producing insightful but unintelligible drivel than you'd get from any peer-reviewed journal -- and it would detect itself to boot!

Slashdot Top Deals

UNIX was not designed to stop you from doing stupid things, because that would also stop you from doing clever things. -- Doug Gwyn

Working...