Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Slashdot Deals: Prep for the CompTIA A+ certification exam. Save 95% on the CompTIA IT Certification Bundle ×

Comment Re:I wouldn't even ask for read access (Score 2) 196

An architect (and one that is trying to be forward thinking and implement all sorts of fascinating new gear) is wasting time learning the admin interface for every box he/she specifies.

And if an architect is having trouble getting away from daily ops, not having any access to the boxes at all will help with that transition. (Not to mention that the architect will inevitably get pulled into ops problems, leaving less time to do the actual job.)

Well, for his situation, I think he needs it. The scene he sets is that of someone new to the job, the currently architected system held together with bale wire and duct tape, and a staff that's resistant to change. In that kind of situation, it's not unreasonable to insist on sneak and peek access to everything. The alternative is having to work harder to get information you need, the risk of that information being incomplete or inaccurate, and the only recourse is to blame other people. That is not going to impress the folks offering the position, nor is it going to lead to a harmonious working relationship with the ops staff.

Comment Re:In other words. (Score 1) 283

The District Court that ruled in favor of the state was ruled on by an elected official.

Seems maybe like a conflict for an elected official to rule for or against a case that deals with elections results, no?

As opposed to an appointed official? Likely appointed by an elected one? That could potentially be an even larger conflict

Comment Re:In other words. (Score 1) 283

I did read that the secretary of state considered that the records aren't subject to the Kansas open records act. In my eyes any such avoidance of disclosure means that there's something to hide.

If the disclosure of voting records is specifically prohibited by statute, as the summary would seem to indicate, that is not indicative of any kind of coverup in and of itself. Non-federal government officials who ignore the dictates of the legislature tend to not fare well. The first step would be to get the legislature to amend or repeal said statute in order to legally make the records able to be disclosed. If they still refused, then it would be a matter of whether or not a coverup was happening

Comment As an Ops wonk.... (Score 4, Insightful) 196

I don't want leadership, management or anyone with any kind of oversight responsibility making changes on the live gear. That's the entire point of having an operations staff.

However, I see absolutely nothing wrong with read only access. The ability to change things - Not Good. The ability to gather information, that I would deem to be necessary for someone who's going to handle the care and feeding of the system going forward.

It also sounds like you need to clean house if your ops staff is pushing back at designed changes, however. Putting in a competent staff that will follow your dictates and provide you with the information you need would go along way to making access to the actual gear unnecessary

Comment Re:Glad they didn't read the books (Score 1) 194

Martin is, essentially, writing historical fiction. The themes borrow very heavily from the War of the Roses, with some high fantasy elements thrown in.

Now, I don't know if you've ever taken a look at how people have historically treated each other, but what happens in the books and whats shown on TV is pretty lightweight compared to some historical shit. From crucifixion, to the auto da fe, to the rack, humans have been doing nasty shit to each other all throughout history. I don't think they're really going for sensualization of the content, merely accuracy within the context of the story.

Martin writes characters that feel real, and as such, it makes you feel. Whether you love a character or hate them, you're engaged, and that's the hallmark of a good entertainer. Because of the shit that Ramsey did to Theon and Sansa, I will enjoy it all that much more when he's given the opportunity to say what up to Joffery in the afterlife

Comment Re:Entire US... (Score 1) 253

Actually, they don't compete with Time Warner Cable and never did.

This is about holding GOOGLE at bay. So you can expect this everywhere that Google might open while the others will be mostly ignored.

Actually it's about holding AT&T at bay. Google is not a big enough player yet to be concerned about.

On the other hand, Comcast competes with AT&T pretty much everywhere, and AT&T has made a big deal about the billions they're sinking into their network. Their acquisition of DirectTV just makes them that much more of a competitor. They're the enemy, not Google, or TWC, or Cox, or Charter

Comment Re:No Way In Hell. (Score 1) 198

I use my ISP provided modem/router only as a gateway. They have no access or control over my wifi network. They have no need to know which or how many devices I have connected to my network. They are only the gateway. If I used their router they would have a presence on my wifi's subnet.

I take it a little bit further. The router connected to my cable modem is only a border router/firewall. It connects back to my central switch, which handles all the internal routing. The only packets it will ever be possible for them to see is ingress/egress WAN traffic, and as much of that is encrypted as possible.

On the other hand, my home network is just a wee bit bigger and more complex than your average home users.

Comment Re: No Way In Hell. (Score 1) 198

Personally I am not a fan of ISP provided gateways/routers for three reasons:
- ISP can modify settings at will, quite literally their own back door into your network
- software cannot be upgraded or fully configured by myself
- usually of poor hardware quality, with 100M ports, poor wireless range, etc

Yup, only thing I want from my provider is a layer 2 handoff. The CPE they provide me should just be a media converter for whatever last mile access method they're using. I'll handle layer 3 and above on my side.

Comment Re:Ulterior motive implied (Score 1) 198

Not proven. Yay speculation!
As piss poor as home wifi is I say let Google give it a shot. They are talking about making it have QoS that doesn't suck so I'm interested.

I'm not saying Google is doing naything evil, but of course they have an ulterior motive. They're not a non-profit, sheesh.

While this may benefit those who use the product, rest assured, that it also benefits Google in some manner.

Comment Re:Stupid post, but... (Score 1) 57

I stand corrected... There's a "upgrade rom-monitor file ..." privilege command that allows upgrade from the standard sources (tftp/ftp/http/flash/etc) on most platforms, thus it would trivial to upgrade with administrative access. One would assume a reboot is still necessary, which might raise suspicions, but once installed it may have counter measures to prevent removal or even detect it's installed.

If you're playing the long game, you don't even necessarily need to reboot it. As long as you can cover the tracks of the file being installed, you can just lie in wait until the next maintenance cycle that calls for a reboot of the device. Now, that could be a very long time. For example, rooting a Comcast Cisco router, you could lay in wait for years before it gets rebooted.

That, or just have the fel image tell IOS that it rebooted because of a power failure. Folks see that as the reboot reason, and they go swap the PEM's.

Comment Re:"after gaining administrative or physical acces (Score 2) 57

Unless of course there's a way to do it remotely using a built in security hole like a default password.

And then it becomes a whole let less "no shit, Sherlock" and becomes a lot more of "what the fuck were they thinking?".

If there was a backdoor password, someone would have spilled it by now, or it's the best kept secret in the black hat community.

The Cisco advisory is basically saying 'hey, if someone has root, they can do bad shit'. And yeah, that's no shit sherlock

Comment Re:"after gaining administrative or physical acces (Score 2) 57

You don't actually need physical access, you just need access to the console port. Most folks don't access their console ports by going around and plugging in rollover cables, they hook the console ports into terminal servers and get remote console access that way.

So yeah, all you really need to is find a way onto the management network and obtain some admin credentials.

A commune is where people join together to share their lack of wealth. -- R. Stallman