Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment: Re:The Arpanet was supposed to survive nukes. (Score 3, Informative) 368

by ScottKin (#27528153) Attached to: Multiple Fiber Cuts In San Francisco Area

Blame the Tier-1 & Tier-2 backbone providers and telcos for skimping on SONET implementations; UPSRs (Unidirectional, Path-Switched Rings) do not have the line-fault switching capabilities that a BLSR (Bi-directional, Line-Switched Ring) because of the single-direction design of a UPSR. Since UPSR networks are cheaper (1/2 the fiber-lay costs) than BLSR, many large telcos and backbone providers play fast and loose with fiber capacity and provisioning...which, in this case, apparently came back to bite them.

The original ARPANet, as it was designed at that time in history, *was* redundant and met the needs for the spec. The ARPANet / NSFNet is as distant from today's Internet as a Blue Whale is from granite.

During "The Great Internet Build-out" of the late 90's, outages similar to this were more common than what you have been led to believe; the reason why people heard virtually nothing about those outages was because (a such outages weren't "visible" to those outside of the telco industry, and there wasn't such a demand 10 years ago for such high capacity circuits, and (b circuits were more carefully planned-out and used BLSR as much as possible. Now, where stockholders go crazy if their investment in a given telco doesn't grow by 10%, those telcos scrimp and cut corners wherever they can - including running SONET networks with inherently unsafe ring topologies.

For more about the differences in SONET topologies, please visit:
http://www.hill2dot0.com/wiki/index.php?title=2F-BLSR

--ScottKin

OS X

+ - Top 5 Reasons Why Safari Will Fail on Windows->

Submitted by
tannerJOY
tannerJOY writes "Now that Apple's Safari is available for Windows in Beta, CoolTechZone.com lists five reasons why it won't be successful. Here are a few of them: "It's pretty obvious that killing Internet Explorer isn't a child's play. If Firefox and Opera are having such a difficult time beating Internet Explorer, what makes Apple so hopeful? We must also not forget that Internet Explorer is bundled with Windows, and that means a lot of mainstream users already have an application to work with. If Firefox weren't able to create enough viral market adoption for the mainstream audience, Apple would have to be delusional to expect people to use a browser from a company they don't even know makes a browser."
Link to Original Source
The Courts

+ - Free Lawyers for RIAA victims

Submitted by Anonymous Coward
An anonymous reader writes "I was wondering if the community could actually fund lawyers for every single one of the victims of RIAA law suits? How much would it cost? I thought it would be nice if they always had a fight on their hands."
Mozilla

+ - Are Firefox Extensions Ready to Be Exploited?->

Submitted by
techie
techie writes "Even if Firefox is a relatively secure browser, the extensions could really make it insecure, and the unfortunate thing is that we may not even know it. The author writes, "What is even worse is my fear that we could be setting a poor example should the security of rouge repositories become a problem. We might be able to spot trouble before it becomes an issue, but what about those who learn from us? It's something to consider, both with regard to trusting blind links to xpi files that are used to install Firefox extensions as well as the bounty of repositories that are just waiting to be added instantly with no thought. Remember, this may not be a problem today, but this certainly is not an invitation for sloppy behavior, regardless."
Link to Original Source
PHP

+ - ZendFramework: state of the project

Submitted by
An anonymous reader writes "After struggling for weeks with tutorials that don't have source code, articles that are out of date, and examples that are just plain wrong, I have to ask
<?php
$ZendFramework = IsItVaporWare() ? 'VaporWare' : 'UsefullYoungPadawanGiveThemMoreTime' ;
?>
What do you guys think?"
The Almighty Buck

+ - How Not to Hire Americans H-1B Video Shocker

Submitted by
theodp
theodp writes "A YouTube video of a law firm's how-not-to-hire-Americans advice is providing explosive material for H-1B critics. 'Our goal is clearly not to find a qualified U.S. worker ... our objective is to get this person a green card,' a lawyer from Cohen & Grigsby tells the audience. Among the law firm's satisfied customers is Pitt's Katz Graduate School of Business, who relies on the firm to grease the wheels for H-1B seeking MBA grads and prospective employers via the Katzport Program, which Pitt fully subsidizes to the tune of $4,000+ per student. Not too surprisingly, the firm's Hot Topics in Immigration Law videos have vanished from YouTube."
Security

+ - ISP that does not police their users? What to do?

Submitted by marcusbjol
marcusbjol (1117709) writes "I am having a problem with an ISP that is in another country; one of their users attacks my public IP address daily between 10-20 times for the past week. I lodge a complaint and a copy of this log with the ISP, and I get a response of: "Our Customers have full root access to their servers. Unfortunately we are not able to do something against such activities." As my net connection is end-user cablemodem (roadrunner) I assume this a scripted attack to attack large segments of the net (Logwatch segment follows). I find it pretty easy to stop the attack (just drop all the packets from that IP) with an OpenWRT router, but what is a responsible netizen to do?

  ################### Logwatch 7.3.2 (12/20/06) ####################
                Processing Initiated: Mon Jun 18 03:01:05 2007
                Date Range Processed: yesterday
                                                            ( 2007-Jun-17 )
                                                            Period is day.
            Detail Level of Output: 5
                            Type of Output: unformatted
                      Logfiles for Host: *****
    ################################################## ################

  — pam_unix Begin —

  sshd:
        Authentication Failures:
              unknown (kilo038.server4you.de): 9 Time(s)
              sshd (kilo038.server4you.de): 1 Time(s)
        Invalid Users:
              Unknown Account: 9 Time(s)

  — pam_unix End —

  — SSHD Begin —

  Illegal users from:
        85.25.10.75 (kilo038.server4you.de): 9 times
              admin/keyboard-interactive/pam: 4 times
              irc/keyboard-interactive/pam: 1 time
              mysql/keyboard-interactive/pam: 1 time
              oracle/keyboard-interactive/pam: 1 time
              postgres/keyboard-interactive/pam: 1 time
              zope/keyboard-interactive/pam: 1 time

  Error in PAM authentication:
        Authentication failure for illegal user admin from kilo038.server4you.de : 4 Time(s)
        Authentication failure for illegal user irc from kilo038.server4you.de : 1 Time(s)
        Authentication failure for illegal user mysql from kilo038.server4you.de : 1 Time(s)
        Authentication failure for illegal user oracle from kilo038.server4you.de : 1 Time(s)
        Authentication failure for illegal user postgres from kilo038.server4you.de : 1 Time(s)
        Authentication failure for illegal user zope from kilo038.server4you.de : 1 Time(s)
        Authentication failure for sshd from kilo038.server4you.de : 1 Time(s)

  — SSHD End —

  ###################### Logwatch End #########################"
Robotics

+ - Autonomous Vehicles Coming to Car Lot Near You!->

Submitted by saldate
saldate (994781) writes "I was surprised that this was overlooked by Slashdot posters, I found it to be pretty cool and somewhat inspiring. The DARPA Urban Challenge (think of it as DARPA Grand Challenge v2.0) is pushing autonomous automotive travel to the next stage of development, the urban zone. Obviously, the initial target of the project is aimed at military application, but simultaneously paves the way for commercial use. Have a look at the video and any of the articles below:

Video:
http://www.sfgate.com/cgi-bin/object/article?f=/c/ a/2007/06/15/BUROBOCARTEST15.DTL&o=0

Articles:
http://origin.mercurynews.com/news/ci_6147098?ncli ck_check=1
http://blog.wired.com/gadgets/2007/06/how_stanford s_r.html
http://www.nytimes.com/2007/06/15/technology/15rob ot.html?_r=1&em&ex=1182052800&en=5ff9a120cd2b0a2d& ei=5087%0A&oref=slogin
http://news.zdnet.com/2100-9584_22-6191180.html
http://www.engadget.com/2007/06/15/stanfords-junio r-volkswagen-passes-first-darpa-test/
http://news.com.com/2300-11394_3-6191150-1.html"

Link to Original Source
Privacy

+ - On (Mis)Trusting Google Desktop->

Submitted by
rabblerouzer
rabblerouzer writes "Highly usable software, such as Google Desktop, can seem revolutionary, but the web-meets-desktop search capabilities are seductively porous and raise huge privacy concerns, says Hugh Thompson [see previous Slashdot submission for more of Thompson's "research"]. Documented flaws demonstrate how attackers can use the tool to access private information on the user's desktop. Worse yet, consider that Google Desktop keeps a sizable index and cache of historical data that by default is unencrypted: It retains previous versions of files, web-based email communications, browsing history, etc. and is largely invulnerable to overwriting and other deletion tools."
Link to Original Source

A method of solution is perfect if we can forsee from the start, and even prove, that following that method we shall attain our aim. -- Leibnitz

Working...