Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Re:The problem, as always... (Score 1) 329

Then girls think, "maybe I don't belong because I don't love them like the boys do."

And they'd be right. Why do they belong at a company passionate about technology if they aren't passionate about technology?

If people only did what they were passionate about, civilization would collapse. If these girls would be good at CS, they shouldn't give up just because of some lack of self-confidence ("I'm not passionate, so I'll fail").

Comment Re:Frankly (Score 1) 146

I hate to be an advocate for security through obscurity, but I figured these things would be ultra super restricted, and "laboratory tests" would be irrelevant because they had access to a device that attackers do not have access to.

"The system's designers seem to have assumed that attackers would not have access to a Secure 1000 to test and refine their attacks'"said Hovav Shacham, a professor of computer science at UC San Diego.

And yet these machines are in public places. If the attacks involve wifi, they're available for pen testing by bad guys. For the low tech smuggling techniques, they're not just available for testing; they're foisted upon anyone with a ticket. If you have more manpower and money than scruples, you can send tester after tester through with items and figure out the ways to get through.

Comment Re:Flaws? (Score 2) 203

GURPS strongly suggests a limit on disadvantages, and there are "disadvantages" like truthfulness, sense of duty, code of honor, etc. that restrict actions but are heroic in nature. Of course a friend of mine has a pirate campaign where there is no disad limit and players usually start as physically disfigured outlaws with psychological issues, some who owe allegiance to captains of other ships. But that's pretty normal for pirates.

Comment Re:The suck, it burns .... (Score 1) 179

Gee, I don't like Micro$oft as much as the next Linux Zealot, but let's be fair here... M$ is darned if they do and darned if they don't.

Unless you said the bolded portion gleefully while grinning and rubbing your hands together, you don't really hate Microsoft as much as the next Linux Zealot.

/Linux sorta-Zealot

Comment Re:Next stop? (Score 2) 100

It's already close to 99.99%. Set up ssh on port 22 and don't block it. Check your security log. Valid logins versus failed attempts to access root, admin, or other common usernames. Even with fail2ban or denyhosts and ignoring slow distributed attacks like in the article, the number of failed attempts can sometimes dwarf valid logins. I remember the "Web 2.0" just prior to captchas. It was tough finding content that wasn't written by a spambot.

Comment Re: There we go again (Score 2) 383

Sort of like how a destroyer is easier to lift with one's bare hands than the Empire State Building?
The real bad part about a grammatically correct sentence is memory mutation.
"I'm going to take my dog, Spot, to the park."
"I'm going to take my dog to the park today."
"I'm taking my dog, Spot, to the park today."
"#&@*!!! What was that passphrase?"

Comment Re:Before leaving the server (Score 1) 116

Why do it to a file and not to the block device itself?
dd if=/dev/zero of=/dev/sda

(I can never remember the argument for setting the block size.)

the block size setting is a lot of bs. (bs=)
You can't be guaranteed to escape a kernel panic or general screwiness when the system tries to use swap space or access a file. That's why I suggested a "run from RAM" distro.
Also dd dead stops if it hits a bad block. You're better off using shred or ddrescue to overwrite stuff when going directly to device.
You can target other partitions like say, /home , /data , /var , etc. if you've actually partitioned them separately. You can also turn swap off and target it. But like I said, you're best off nuking from RAM.

Comment Re:Before leaving the server (Score 1) 116

An OS reimage with 'doze and use sdelete.exe from Sysinternals Suite. http://technet.microsoft.com/e...
Or 'nix, dd a huge file and shred it (remember to restrict the passes with -n since the default is "a lot")
Neither is perfect, but better than delivering your data to the next schmoe on a platter (pun intended).
If you can request the specific OS image, send them a copy of a memory-resident linux installation configured to auto-wipe the HDDs with shred.

Comment What can I do ... (Score 1) 637

"What can I do to supplement my Java-oriented studies?"
Learn C. Learn C++. Learn Assembly. On the other end of the spectrum: Learn LISP. Learn Prolog. Learn learn learn.
BTW, I heartily agree that Java should be a second-year type of language. "Now that you know all about pointers and how to use them to make the data structures we discussed in CS 190, we'll let the computer handle memory management so we can focus on algorithms."

Slashdot Top Deals

1 + 1 = 3, for large values of 1.

Working...