Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Congestion by choice; game consoles (Score 2) 628

There are no gatekeepers on the internet.

Except for customers living in areas whose incumbent home ISP has decided to "slow-lane" any traffic that doesn't pay the prioritization toll. See previous stories about Comcast's "congestion by choice".

Anyone can publish anything at any time.

How can someone usefully publish any application at any time for an iOS device without the blessing of Apple, or any application at any time for a game console without the blessing of the console's manufacturer?

That's the old model. It's been discarded.

If the gatekeeper model has "been discarded", then why do iOS and the game consoles still use it? And why haven't end users "discarded" them en masse in favor of Android and living-room gaming PCs? I think I know why: consoles are easy.

What is with the defeatism? The only point to it is to prevent you from reaping the benefits everyone else is enjoying.

I'm trying to figure out the best way to jump in and reap benefits without running the risk of being bankrupted or worse. For example, I don't want to write a song and then get hit with a $150,000 copyright infringement lawsuit for having accidentally recreated something from decades ago.

Comment Copyright trolls (Score 1) 628

I love the freedom of being able to write and publish anything I want without making compromises with money issues.

Not if you have to pay hush money to copyright trolls who claim that your work is a derivative of theirs. And not if a monopolist gatekeeper or a cartel of gatekeepers controls the means of distribution of your art to the public, such as Apple or the major video console makers.

Comment Copyright clause preamble is a dead letter (Score 1) 153

"To promote the progress of science and useful arts" [...] so copyright is constitutional to the extent (and only to the extent) it is designed to satisfy that goal.

The US Supreme Court has consistently deferred to Congress on the question of whether "it is designed to satisfy that goal."

Comment Re:Is there any protection against SMB worm ? (Score 1) 177

Hacking activities are happening around us, from companies managing parking garages to Sony to Staples to whatnots ...

I've read Schneier's article which in essence telling us that there is no foolproof way to prevent hacking attempt

I do reckoned that "foolproof" in the IT field is nothing short of fairy tales, but still, I do think there ought to be ways, online and offline, that we can do, to at least cut down, to minimize, our companies' exposure to the (oft state-sponsored) hacking groups

Any link (or links), suggestion, recommendation, whatever, that you guys (and gals) can share?

Thanks !

Is there any protection against SMB worm ?

I've always considered SMB to be a steaming pile of crap for reasons that have nothing to do with security and this incident just adds another steaming shovel full of manure to that pile. The best protection agains SMB worms is not to use crap like SMB but pick something more secure instead, that is to say if such an animal even exists. In that case you can either try to find a vendor who offers a similar product and does a better job of testing and patching it than Microsoft does or go with an Open Source alternative which gives you the option of hiring a third party to test and patch it to your satisfaction. Mind you even if SMB is a pain to use the problem does not necessarily have to be with Microsoft. The problem could actually be with your systems department being lazy and negligent about patching their SMB software and the problem could also be with lax, amateurish or even non existent security policies or if you do have a proper security policy the problem could be a complete failure to enforce it. In that case you really only have one alternative and that is to light a fire under your people, fire them if they put up a fight and hire some proper sysadmins and a security chief with the same attitude toward instilling professionalism and security awareness in your employees and a marine drill sergeant has toward making proper soldiers out of every batch of teenage drama queens he is handed by the recruitment office.

Comment Re:Paywalls; HTTPS proxy (Score 1) 396

It's not a behind paywall, it's a free site.

Sites that do not require payment still need to distinguish between users that have registered and visitors that have not as well as between users, such as for comment sections (are you LordWabbit2 or someone who Firesheeped his session cookie?) or "free reg. req." policies.

What network administrator in his right mind would hand out the root certificate to the HTTPS proxy?

Anyone who wants his users to know they are connecting to the correct proxy. Remember that a root certificate contains only the public key, not the private key.

Comment Re:The Legit Bay (Score 1) 81

Hate copyright? Change the friggin' law.

How is that possible when all major TV news sources that cover candidates for federal office share a corporate parent with one of the members of the MPAA? Fox=Fox, CBS=Paramount, ABC=Disney, NBC=Universal, and CNN=Warner. A candidate for federal office who openly opposes the excesses of what copyright has become will draw smear campaigns from all five of these studios' co-owned news channels.

Comment Re:Definition: Secure systems keep working, no mat (Score 1) 343

SQL injection. My work place had a typical example:
INSERT INTO users SET fname='$fname', lname='$lname';

Apart from the fact that you're mixing UPDATE syntax with INSERT syntax, substitution is perfectly valid so long as each string has been sanitized in the correct manner for a particular database connection (that is, not addslashes()). For the MySQLi client library, it looks like this:

$fname = $db->escape_string($fname);
$lname = $db->escape_string($lname);

Don't get me wrong; it's bad practice to escape manually unless you're using operator IN on a database client library that supports neither array parameters nor named placeholders (such as MySQLi). But code that correctly uses $db->escape_string() (or the equivalent for other languages or database drivers) should be safe from SQL injection, just as code that correctly uses htmlspecialchars() should be safe from script injection.

With Clonebox, if a customer's web server is hacked or otherwise damaged, we can switch it over to a ~read-only mirror. Sure that protects against hackers, and some customers have been hacked and used the protection. More often, customers simply screw up and delete important files or databases.

But how long do you keep these mirrors around, in case there's a screw-up that goes undiscovered for a while?

Slashdot Top Deals

"The one charm of marriage is that it makes a life of deception a neccessity." - Oscar Wilde

Working...