Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:How do they Root your Box? (Score 1) 539

Yeesh, if they're trying to do cleanup behind themselves rather than e-mail you to let them know they'd rooted the box, it's time to switch. This goes double if (and, you may have specified regarding this; apologies if you have) you've already asked them in writing to never jump into your box without asking you first.

As others have said, if the provider has physical access, you can not expect mathematically no chance of them breaking in and grabbing or (worse) changing stuff.

Focus on what you are providing and just how secure it needs to be, and act accordingly.

The Courts

Groklaw Summarizes the Lori Drew Verdict 457

Bootsy Collins writes "Last Wednesday, the Lori Drew 'cyberbullying' case ended in three misdemeanor convictions under the Computer Fraud and Abuse Act, a 1986 US Federal law intended to address illegally accessing computer systems. The interpretation of the act by the Court to cover violations of website terms of service, a circumstance obviously not considered in the law's formulation and passage, may have profound effects on the intersection of the Internet and US law. Referring to an amicus curiae brief filed by online rights organizations and law professors, PJ at Groklaw breaks down the implications of the decision to support her assertion that 'unless this case is overturned, it is time to get off the Internet completely, because it will have become too risky to use a computer.'"

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...