Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Submission + - Raising awareness of Potentially Unwanted Programs (PUPs) 1 1

An anonymous reader writes: I am searching for a list (CSV) of all known PUP programs to help raise awareness within a company. Does anyone know if such a list exists? I have a list of applications that this company uses, and I wanted to see how many detected applications match what is on the PUP list. In this day and age of Cyber attacks and malware such a list shared openly could help raise awareness.

Comment Re:Wipe it yourself (Score 1) 5 5

My problem is that to determine the owner, I would need an account to login to the machine (Windows 2003 Server). I don't intend to hack my way in (unethical), and the name of the domain doesn't give away any information about who the owner is. So I guess I need to deal with the leasing company to determine the owner?

Submission + - Someone else's data 5 5

Spudster writes: Recently I purchased a server on Ebay that was not properly wiped by the leasing company that sold it. The result is a server that boots up into someone else's operating system. In this day and age of data breaches and personal information disclosures, what is the proper course of action to report something like this?

Comment Data Replication (Score 2, Insightful) 274 274

I'm somewhat amazed that a vehicle as well connected as the shuttle doesn't mirror its data to the ground controllers. In the event of a failure, an alternate copy of the data would exist and millions of dollars worth of experimental data wouldn't be at risk. On-track does however rock (Until you get the bill)!

... when fits of creativity run strong, more than one programmer or writer has been known to abandon the desktop for the more spacious floor. -- Fred Brooks