Forgot your password?
typodupeerror
Businesses

Cisco To Acquire Sourcefire For $2.7 Billion 38

Posted by timothy
from the billions-with-a-b dept.
Orome1 writes "Cisco will acquire Sourcefire, a provider of intelligent cybersecurity solutions. Under the terms of the agreement, Cisco will pay $76 per share in cash in exchange for each share of Sourcefire and assume outstanding equity awards for an aggregate purchase price of approximately $2.7 billion, including retention-based incentives. The acquisition has been approved by the board of directors of each company. Once the transaction closes, Cisco will include Sourcefire into its guidance going forward. Prior to the close, Cisco and Sourcefire will continue to operate as separate companies."

Comment: Re:Elections in Australia (Score 1) 127

Of course, making their policies so easily accessible makes it easy to decide that it would be crazy for me to vote for the LDP above *any* of the major parties :).

Their perhaps laduable views on some social policy does not make up for their fetishization of property rights and the free market, along with their other economic views that they propound.

Comment: Re:Elections in Australia (Score 1) 127

And indeed, in the last Australian Federal election, a minor party managed to win the seat of Melbourne demonstrating that a vote for them was definitely not wasted :).

(Sufficient people put them first on their voting papers that one of major parties was eliminated in the "instant-runoff" before them. Now the Greens are probably the biggest minor party and there were some details which favoured them, but nevertheless, Melbourne strikes me as the leftmost city in Australia, so the result doesn't appear too unusual.)

The Military

US Sentinel Drone Fooled Into Landing With GPS Spoofing 647

Posted by timothy
from the here-droney-droney-droney-droney dept.
McGruber writes "Following up on the earlier Slashdot story, the Christian Science Monitor now reports that GPS spoofing was used to get the RQ-170 Sentinel Drone to land in Iran. According to an Iranian engineer quoted in the article, 'By putting noise [jamming] on the communications, you force the bird into autopilot. This is where the bird loses its brain.' Apparently, once it loses its brain, the bird relies on GPS signals to get home. By spoofing GPS, Iranian engineers were able to get the drone to 'land on its own where we wanted it to, without having to crack the remote-control signals and communications.'"

Comment: Re:Seriously (Score 1) 294

by CyberPack (#37019466) Attached to: Google Accuses Competitors of Abusing Patents Against Android
As noted by one of the article commentators, jointly holding a patent doesn't allow you to use it defensively against the other joint holders, and it might be difficult to use it to protect other manufacturers building, say, Android phones. So, this could be the reason that joint bidding was dimissed by google.

Comment: Re:Sounds great in theory (Score 1) 407

by speedwaystar (#36876330) Attached to: Massive Solar Tower Planned For Arizona

but as Reagan pointed out:
"80 percent of air pollution comes not from chimneys and auto exhaust pipes, but from plants and trees." Presidential candidate Ronald Reagan, in 1979.
and
"Trees cause more pollution than automobiles do." -- Ronald Reagan, 1981
http://www.allhatnocattle.net/reagan%20quotes.htm

Comment: Re:Frederic Mitterrand ? (Score 1) 151

by speedwaystar (#36241158) Attached to: EFF Co-founder Faces Copyright Heavyweights At EG8

that's actually completely incorrect. there's no suggestion at all of forcible assault or beating, nor has there ever been. read the case documents. they're all available online.

do you think ANYONE, let alone high profile politicians, would support Polanski if he had used violence? do you think his victim would be calling for an end to the witch hunt (as she has for over a decade now) if he'd used violence?

Comment: yes/no dialogue when restricted ability first used (Score 1) 279

by speedwaystar (#35344464) Attached to: Infected Androids Run Up Big Texting Bills

my biggest peeve with the Android security model from day #1 is that this kind of thing is even possible.

every Android application has to be specifically granted a set of permissions on installation, including "able to make phonecalls that cost you money", "able to access the internet", etc. the problem is that the user only ever see this list once, fleetingly, during installation, and as everyone knows, familiarity breeds contempt so after the first couple of apps, most people stop reading the list and just click "yes". even if they read the list, once it's been authorized the application can do anything on its permission list at any time, without user intervention. this opens the gate to applications that can take photos doing so silently while the screen is off, applications that can make phonecalls doing so invisibly and undetectably, applications that can use the internet and use gps phoning home at any time with your exact location, etc. it simply shouldn't be possible.

whenever an application attempts to perform a restricted task, the OS checks that it has been granted the permission to do so and either silently permits the task, or silently disallows it. that's great, but it shouldn't stop there. the first time it's attempted a dialog box should alert the user that "steamy windows is attempting to make a phone call to that can cost you money. do you want to authorize this? yes/no/ [ x ] remember my answer and don't ask me again".

clearly "steamy windows" is going to get a "no and don't let it do it in future response", whereas the user is likely to grant "mywonderSMSclient" indefinite permission.

if there's a reason why this isn't practical, i'd like to know about it.

Mathematics deals exclusively with the relations of concepts to each other without consideration of their relation to experience. -- Albert Einstein

Working...