Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:5th Amendment (Score 1) 885

If the person is on US soil, then its a federal or local law enforcement issue. The military is barred by federal law from being used on U.S. soil for domestic law enforcement. If it was Canada or Mexico, they would have extradited him to the US and there would have been a trial. You are getting all paranoid trying to rap your head around this issue. He might have been a US citizen, but he join a foreign military/terrorist organization and lead/planned attacks on US citizens and other countries. He did not refute this, so in my mind he is fair game if he gets hit in an air strike again a terrorist safe house. Don't forget that they got a couple other terrorist at the same time.

Comment Re:Seriously? $60? (Score 1) 372

Yeah, probably had a username and password the kid didn't have so the laptop was a brick without a reinstall disk he didn't have. So he sold it to the teacher who reformatted it by buying a disk most likely. That isn't unusable, it just not suppose to be used by anyone that is unauthorized, which was the both of them.

Comment Re:Just that pesky Constitution (Score 2) 949

But they aren't taxing interstate commerce, just commerce done in their states by companies in their states. This puts the internet companies on the same playing field as the mom and pop shops that don't go over state lines. Otherwise, there will never be any mom and pop shops anymore, just order everything you need online.

Comment It's a TRAP! (Score 1) 94

They might not censor what is in that data center, but they sure as hell will monitor what goes in and out of it. If you think its a cheap way to out source your cloud computing you better be ready to have some of your info stolen by the Chinese Gov't as all wires in and out will be tapped.

Comment Re:From my understanding of Android (Score 1) 384

6 in one hand, half a dozen in the other, you are saying the same thing he is saying. That the Apps from the app store are poorly written, take up to many resources, and cause the device to have poor performance. People that get poor performance from a device and the apps they install return the device because they believe it has to be the devices fault, because the programs where made for the phone since they were in the app store for that device. Remember, the normal user are not rational and don't associate the poor performance with the apps, but with the device. These are the same people that have 50 things starting up when they turn on their PC, and then complain about how slow their computer is and they need a new one. Even though their PC is only a year old.

Comment Who are you hosting with? (Score 1) 182

What type of hosting are you getting? Shared hosting where you don't have the ability to do anything but setup a database, or you getting bare metal hosting where you can choose the OS and how to setup every detail of it, or you supply the hardware and routing equipment to a hosting facility . I suggest getting the bare metal or sending your own hardware, then using the docs you can get from the NSA on securing the servers. http://www.nsa.gov/ia/guidance/security_configuration_guides/operating_systems.shtml Like many people have said, make sure that you don't have direct access to the MySQL server from the outside, and that it only talks to the webserver to give data from the database. Even setup a management server where you can do WSUS and remote desktop stuff from if you are going Windows, or another Linux box that you can SSH into to then access all the other servers. If you do your own hardware you can supply your own firewall and setup VPN connection to it. Blah Blah Blah, you are getting the idea from what everyone is posting. So you should hopefully have a good starting point.

Comment Re:Disconnect from internet? (Score 1) 211

Question, does that mean a content infringer can be found by their IP Address? Because that is the holy grail of defenses for everyone here at Slashdot when someone is being sued by the RIAA/MPAA using their IP Address.

That aside, I think the same thing, give a listing of IPs to each ISP for those computers that are infected and have the ISP reach out to their users and not have it be the FBI.

Slashdot Top Deals

Anyone can make an omelet with eggs. The trick is to make one with none.

Working...