Forgot your password?
typodupeerror

Comment: Not a fan, but... (Score 4, Interesting) 405

by MidnightBrewer (#46803833) Attached to: In a Hole, Golf Courses Experiment With 15-inch Holes

Golf is about getting your balls into the hole in as few strokes as possible. It's as simple as that.

I'm not a golf guy, but I can appreciate that the original game is fine the way it is. Seriously, 15-inch holes aren't going to magically enable you to get a hole-in-one. The challenge of hitting the traditional hole is something I respect; making it feel like I have training wheels on to pander to me is just going to alienate me further. I think most prefer things tight, not loose. You have to feel like you've succeeded.

+ - Snowden Used Low-Cost Tool to Best N.S.A.->

Submitted by mendax
mendax (114116) writes "The New York Times is reporting, 'Intelligence officials investigating how Edward J. Snowden gained access to a huge trove of the country’s most highly classified documents say they have determined that he used inexpensive and widely available software to “scrape” the National Security Agency’s networks, and kept at it even after he was briefly challenged by agency officials.

Using “web crawler” software designed to search, index and back up a website, Mr. Snowden “scraped data out of our systems” while he went about his day job, according to a senior intelligence official. “We do not believe this was an individual sitting at a machine and downloading this much material in sequence,” the official said. The process, he added, was “quite automated.”

The findings are striking because the N.S.A.’s mission includes protecting the nation’s most sensitive military and intelligence computer systems from cyber attacks, especially the sophisticated attacks that emanate from Russia and China. Mr. Snowden’s “insider attack,” by contrast, was hardly sophisticated and should have been easily detected, investigators found.'"

Link to Original Source

+ - LA building's lights interfere with cellular network, FCC says-> 5

Submitted by alphadogg
alphadogg (971356) writes "When a certain Los Angeles office building lights up, it's a dark day for nearby cellphone users, according to the Federal Communications Commission. Fluorescent lights at Ernst & Young Plaza, a 41-story tower near the heart of downtown, emit frequencies that interfere with the Verizon Wireless 700MHz network, the agency said in a citation issued against the building owner. The FCC's message comes through loud and clear in the filing: the building owner could be fined up to $16,000 a day if it keeps using the interfering lights, up to a total of $112,500. The alleged violation could also lead to "criminal sanctions, including imprisonment," the citation says."
Link to Original Source

+ - ReactOS 0.3.16, the Windows clone has got a new Explorer->

Submitted by KingofGnG
KingofGnG (1319253) writes "On the long, long road that leads to its final target, ReactOS continues to grow and evolve thanks to the hard work made by developers contributing to the project. The latest, important changes help the system to actually advance toward the aforementioned final target, ie to reach full compatibility with software and drivers made for Windows operating systems based on the NT architecture."
Link to Original Source

+ - Is Whitelisting The Answer To The Rise In Data Breaches?->

Submitted by MojoKid
MojoKid (1002251) writes "It doesn’t take a rocket scientist to figure out that cyber criminals are quickly getting more sophisticated than current security, intrusion detection and prevention technology can defend against. And you have to wonder if the computer security industry as a whole is willing to take the disruptive measures required to address the issue head-on. One way to tackle the surging data breach epidemic is with a technology called “whitelisting.” It’s not going to sound too sexy to the average end user and frankly, even CIOs may find it unfashionable but in short, whitelisting is a method of locking-down a machine such that only trusted executables, DLLs and other necessary system and application components are allowed to run – everything else is denied. A few start-up security companies are beginning to appear in this space. The idea is to start with a known, clean system installation and then lock it down in that state so absolutely nothing can be changed. If you follow system security, regardless of your opinion on the concept of whitelisting, it’s pretty clear the traditional conventions of AV, anti-malware, intrusion detection and prevention are no longer working."
Link to Original Source

Comment: Re: If you like it (Score 1) 171

You blame him for the health insurance providers taking the opportunity to use him as a whipping boy and take out their aggravation that their golden goose isn't looking too healthy?

In other news, Reagan said that trickle-down economics would work, and George W. showed up on an aircraft carrier claiming victory over a war that wasn't over yet, which we started because of falsified intel. Clinton said he didn't have sex with that woman, either.

Comment: Re: And That, Ladies and Gentlemen ... (Score 4, Insightful) 194

by MidnightBrewer (#46002901) Attached to: Adware Vendors Buying Chrome Extensions, Injecting Ads

Your theory flies in the face of history. Spam now represents the majority of email sent and they only need a fraction of a percent in return in order to reap a significant reward to justify their efforts. This particular clever exploit has been around how long undetected? And all they have to do is take the same code and inject it into the next extension they buy, or roll out. This is even better than spam.

Google's main reason for getting involved in this one is that it's leeching off of their core business. I guarantee that's not something they'll let slide.

The confusion of a staff member is measured by the length of his memos. -- New York Times, Jan. 20, 1981

Working...