Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×

Comment: Re:Get over it (Score 0) 190 190

As an ISS professional I'm looking forward to the advent of chip-and-pin in the US. All the extra mandatory PCI-compliance auditing, and pen-testing contracts are going to be great.

I'm so excited for all the data breaches after attackers are able to leverage the card as a means to compromise the point of service.

Also the nostalgia of seeing all these super-micro pieces of malware combined with "interesting" hardware hacks is probably going to make me tear up a little bit.

Comment: Re: wha? (Score 1) 65 65

Odd, all of the PRs for my software are functionality patches...as are my changes. Almost as if it's not an issue of "haters gonna hate," and that 40 vulnerabilities in that period of time is insanely unacceptable.

Then again it's corporate IT, and a ridiculous amount of that "community" are still running highly vulnerable IIS servers, so par for the course I suppose.

Comment: Re:Seriously...? (Score -1) 241 241

Ask hackers and other cybersecurity experts, and they'll tell you that the entire idea of a âoebackdoorâ is a bureaucratic fantasy with little basis in technical reality.

The entire idea of a "backdoor" is fantasy? What the actual fuck are you smoking man.

  So...what do you call a command interpreter listening on the port of an unsuspecting user's machine exactly?

How about a modification of hosted files to allow an attacker to bypass authentication on a page in some highly unlikely/impossible set of conditions he/she can emulate?

What is now proved was once only imagin'd. -- William Blake

Working...