Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment: Re:anonymous kidnapping? (Score 1) 76

>> How can a system at the same time aggregate and make data anonymous

Given existing PC-driven redaction of police reports, I'd expect it to read something like this:

(race redacted) (gender redacted) (age redacted) adult or child wearing (clothing redacted) and (method of transportation redacted), possibly named (name redacted) wanted as a person of interest in the alleged (incident redacted) that was reported on (date/time redacted) at (place redacted). If you have any information about this alleged incident or this person, please call (main, overloaded and disinterested dispatcher phone number with 30-minute hold time) and remember to obey all police commands at all time.

Comment: Yahoo is still a "tech" company? (Score 1) 192

by xxxJonBoyxxx (#49531483) Attached to: Yahoo Called Its Layoffs a "Remix." Don't Do That.

>> influx of skilled developers and engineers, Yahoo still struggles to define its place on the modern tech scene

If it helps put it in context, I recently left a Midwestern tech job and advertised a yahoo email address (rather than one that would have highlighted my moonlighting - ahem) for people who wanted to stay in touch. The number of people who showed up on Twitter to give me shit for still having a Yahoo address was telling.

Comment: Re:Not sure this helps... (Score 1) 189

by xxxJonBoyxxx (#49528667) Attached to: Microsoft Announces Device Guard For Windows 10

>> how does the external malware know what certificates your organization allow

The same way hackers with malicious HTTPS sites do today. They look at the ungodly-long list of default Microsoft CA certs, find a "broken" CA in that list that can be corrupted or whose issuer doesn't really care, and get a signed certificate that looks legit to 99.9% of all corporate users today.

(So far the signing system for Microsoft has also used the Microsoft Certificate Store; the certificates used to allow signed executables just have a different role.)

Comment: Not sure this helps... (Score 3, Insightful) 189

by xxxJonBoyxxx (#49527407) Attached to: Microsoft Announces Device Guard For Windows 10

Unless Microsoft's changed something, you can still change the code in (non-device driver) SIGNED executables. (Try it today by flipping a few junk bits in a signed app and see if Microsoft notices the difference.) If that remains true, this isn't much of a deterrent to malware at all.

Furthermore, some of the biggest recent hacks (e.g., Sony) used a SIGNED commercial device driver (running in trial mode) to circumvent NTFS permissions; a default scheme that allows only signed executables wouldn't stop that down either.

Comment: Public education creates, private company profits? (Score 1) 67

by xxxJonBoyxxx (#49519087) Attached to: USPS Shortlists 'HorseFly' Octocopter Drone Delivery Service

>> Workhorse Group Inc....their octocopter drone delivery system, developed by the University of Cincinnati College of Engineering and Applied Science.

Can someone explain this part? On the surface it just looks like "public education creates, private company profits."

Comment: Funny way of saying "SQLServer Pricing Doubles" (Score 2) 110

>> Microsoft has evolved so much under Satya Nadella

That's a funny way of saying "your SQL Server and other Server pricing went through the roof"

The whole Microsoft "open source" strategy seems to be based on getting as many software applications and developers ("it's free!") to depend on the Microsoft crown jewels of AD, SQL Server and Windows Server (2012) as they can, and then squeeze cash (e.g., core pricing vs. CPU pricing) from IT departments as they try to build out a stable backend to support all these apps. That's Balmer's "developers developers developers" plan anyway...and I don't see Satya doing anything different yet.

Comment: Kind of a dup, but here's a link that explains it (Score 5, Informative) 113

This is a dup story, so here's my dup comment:
See DefCon 22's avionics preso from 2014 to see what you can and can't do from a hacker's perspective.
https://www.defcon.org/images/...
(Since the summary doesn't even often a link or name...this MIGHT even be exactly what the submitter is talking about.)

Comment: Seems like an intentional leak (Score 1) 148

by xxxJonBoyxxx (#49464395) Attached to: Nearly Half of <em>Game of Thrones</em> Season 5 Leaks Online

Hmmm...this sounds like an intentional leak by HBO to me.

1) Story is out the day the season debuts
2 ) "Equivalent to standard-definition TV, not HD"
3) "Episode four ends on a heck of a cliffhanger"
4) HBO confirms leak but can't find the leaker

Anyway, meh. I'll still download the HD version of episode 1 tomorrow from some pirate site like 50% of the rest of GoT viewership - "standard TV" doesn't do it for me anymore.

"I have just one word for you, my boy...plastics." - from "The Graduate"

Working...