Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Re: Socalim is organized psychopathy (Score 1) 278

"overpaid" exec here...chief information officer. If I got to work 60 hours it would be a blessing. Most executives work literally twice the hours, and cause 10x more to happen per given hour than any employee there. Then we go home and file dailies/weeklies and get 4hrs of sleep.

Outside of leviathan-esque companies this is mostly true

Comment Re:Microsoft Windows strikes again :) (Score 1) 40

This is a lot more of an important question ask than you think. A friend of mine runs a DDoS protection service, and they recently got hit by a 60 gigabit attack (Syn-flood, unamplified obviously) that was from a botnet of surveillance cameras. Shit be whack yo.

Comment Re:Get over it (Score 0) 190

As an ISS professional I'm looking forward to the advent of chip-and-pin in the US. All the extra mandatory PCI-compliance auditing, and pen-testing contracts are going to be great.

I'm so excited for all the data breaches after attackers are able to leverage the card as a means to compromise the point of service.

Also the nostalgia of seeing all these super-micro pieces of malware combined with "interesting" hardware hacks is probably going to make me tear up a little bit.

Comment Re: wha? (Score 1) 65

Odd, all of the PRs for my software are functionality patches...as are my changes. Almost as if it's not an issue of "haters gonna hate," and that 40 vulnerabilities in that period of time is insanely unacceptable.

Then again it's corporate IT, and a ridiculous amount of that "community" are still running highly vulnerable IIS servers, so par for the course I suppose.

Comment Re:Seriously...? (Score -1) 241

Ask hackers and other cybersecurity experts, and they'll tell you that the entire idea of a âoebackdoorâ is a bureaucratic fantasy with little basis in technical reality.

The entire idea of a "backdoor" is fantasy? What the actual fuck are you smoking man.

  So...what do you call a command interpreter listening on the port of an unsuspecting user's machine exactly?

How about a modification of hosted files to allow an attacker to bypass authentication on a page in some highly unlikely/impossible set of conditions he/she can emulate?

Every nonzero finite dimensional inner product space has an orthonormal basis. It makes sense, when you don't think about it.