Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Comment: Re:MITM or unencrypted (Score 4, Insightful) 70 70

Now, at my new job, I get to experience the joys of a locked down laptop that requires an RSA secrurid to log into the network, web is locked down, and no read/write access on the usb ports.

Just as an FYI, if a company is going to restrict local I/O resources to and from a computer, then using a computer is the wrong tool; they should be using thin-clients to a terminal server of some sort.

Comment: Re:Methamphetamines age you prematurely. (Score 4, Interesting) 234 234

It's stress; be it from the hard work in raising a family or a single person pushing 60+ hours a day with 5 hours of sleep or less. This kills the body, literally! Mental stress also shrinks the brain. I'm in my late 30s, and I can tell how much work related stress (you either have a job, or don't. There's no fucking balance in this world anymore to pay the mortgage/rent) has altered my health. I feel I've aged twice what I should have. I'm the only one in my family that has a few gray hairs early. 10 years go, people thought I was under 21.


Comment: Re:compensating? (Score 3, Insightful) 399 399

With massive unemployment and young men and women looking to start a new career; there will be plenty of opportunities to work for oppressive regimes at curtailing freedom for the established ruling elite. It's like the intellectual and societal form of the broken window fallacy.

World war can't come soon enough!

Comment: Re: Our saving grace, perhaps? (Score 1) 36 36

Yes and no. Malware such as CryptoWall goes after the user data specifically. It can run for days or months without detection. By the time you figure out something ain't right, the first task is to figure out how deep that rabbit hole to hell goes. You can't simply roll back to a previous snapshot without losing all subsequent productivity. You will have to perform some reconciliation with data due to undetected daily data destruction. It's not a fun day to deal with that!

Comment: Re:Antivirus is useless. (Score 2) 36 36

It's polymorphic, so yeah, AVs won't find it. It's executes random, in random memory, does it damage to files and drops a few HELP_DECRYPT.HTML files in whatever directory got hit. Then it terminates itself.

It does this to prevent reverse engineering and detection by AVs. Also, it won't run in VM environments so as a snapshot can be created to reverse engineer it too, so I've read. I haven't confirmed that part however.

I believe the payload is hosted in random Google Doc sites.

Comment: Re:BECAUSE IDIOTS PAY IT! (Score 1) 36 36

It will only go after AD if the Domain User account is a member of Domain Admins, Schema, etc. Even IT Administrators should have their own User account, and leave the one for Domain Admin as a utilitarian account. Because, if you're a member of those high level privileges and run the virus, it will run with whatever your account has access to!

Here's a previous article on the subject. Be sure to block and My_Resume.svg from e-mail in the meantime.

Yes, we will be going to OSI, Mars, and Pluto, but not necessarily in that order. -- Jeffrey Honig