Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Note: You can take 10% off all Slashdot Deals with coupon code "slashdot10off." ×

Comment Re:Microsoft Windows strikes again :) (Score 1) 40

This is a lot more of an important question ask than you think. A friend of mine runs a DDoS protection service, and they recently got hit by a 60 gigabit attack (Syn-flood, unamplified obviously) that was from a botnet of surveillance cameras. Shit be whack yo.

Comment Re:Get over it (Score 0) 190

As an ISS professional I'm looking forward to the advent of chip-and-pin in the US. All the extra mandatory PCI-compliance auditing, and pen-testing contracts are going to be great.

I'm so excited for all the data breaches after attackers are able to leverage the card as a means to compromise the point of service.

Also the nostalgia of seeing all these super-micro pieces of malware combined with "interesting" hardware hacks is probably going to make me tear up a little bit.

Comment Re: wha? (Score 1) 65

Odd, all of the PRs for my software are functionality are my changes. Almost as if it's not an issue of "haters gonna hate," and that 40 vulnerabilities in that period of time is insanely unacceptable.

Then again it's corporate IT, and a ridiculous amount of that "community" are still running highly vulnerable IIS servers, so par for the course I suppose.

Comment Re:Seriously...? (Score -1) 241

Ask hackers and other cybersecurity experts, and they'll tell you that the entire idea of a âoebackdoorâ is a bureaucratic fantasy with little basis in technical reality.

The entire idea of a "backdoor" is fantasy? What the actual fuck are you smoking man.

  So...what do you call a command interpreter listening on the port of an unsuspecting user's machine exactly?

How about a modification of hosted files to allow an attacker to bypass authentication on a page in some highly unlikely/impossible set of conditions he/she can emulate?

All great discoveries are made by mistake. -- Young