Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

+ - Slashdot blocked in Switzerland (Possibly other parts of Europe) 1

Submitted by Wattos
Wattos writes: On my daily commute to work, it is my habit to check several websites for the latest news. Imagine how surprised I was that when was not accessible anymore. Instead I received a 403 Restricted error page. Initially I thought that this would have been a simple mistake by my mobile ISP, so I connected to my home VPN. Slashdot was blocked including many links to websites with vpn services. After connecting to a VPN provider outside of the country (in Poland) slashdot was accessible again.

VMware CEO: OpenStack Is Not For the Enterprise 114

Posted by samzenpus
from the home-game dept.
coondoggie writes "VMware CEO Pat Gelsinger says he doesn't expect open source cloud project OpenStack to catch on significantly in the enterprise market, instead he says it's more of a platform for service providers to build public clouds. It's a notion that others in the market have expressed in the past, but also one that OpenStack backers have tried hard to shake."

Comment: Re:Wow ... (Score 1) 191

by Wattos (#44318073) Attached to: Blackberry 10 Sends Full Email Account Credentials To RIM

You show a good example. Would you still think that this model is better if:

1) The post man can read your mail without you noticing (e.g. the envelope is never damaged)
2) You have to provide your postman with a key to open your locker? The key might additionally fit into your other lockers (e.g. A lot of people reuse their passwords)
3) The postman can easily store copies of all the letters you receive without you knowing
4) The postman travels from your local post office, to a completely different country, where the correspondence may be inspected by the other government at will without you even knowing and then gives you the letter.

Once you consider these points, you might not like that approach unless you completely trust your postman.

Comment: Re:Well yes but, (Score 2) 459

by Wattos (#43205011) Attached to: 41 Months In Prison For Man Who Leaked AT&T iPad Email Addresses

If you find my key under a rock in my backyard, it is still theft if you break into my house with it and steal things.

The analogy is not really applicable. This is more like writing all your secrets into a notebook and putting it into a library (in a section accessible to everyone). Then you sue the person who found the notebook.

Leaving the data open to any web request is the true crime here. I do not know about the US, but in Europe that would have been a violation against the Data Protection Act.

Comment: Why is this even on Slashdot (Score 0) 128

by Wattos (#41682669) Attached to: Steam Protocol Opens PCs to Remote Code Execution

From TFA:

Our choice for exploiting this bug is to create a .bat file in the Startup folder of
the user account which will execute our commands injected through +echo at the
next login of the user on the system. There is also an interesting scenario against
dedicated servers by specifying the motd.txt of the game as logfile and launching
the cvarlist command that will dump all the game variables in such file that is
visible to any player who joins the server. Team Fortress 28 is one of the most
played games based on this engine and it’s free-to-play.

They system is already compromised at this point. Why do we need the steam protocol?

Also, for the love of god, please stop calling these people security researchers.

Always try to do things in chronological order; it's less confusing that way.