Become a fan of Slashdot on Facebook


Forgot your password?

Comment Survey methodology? (Score 5, Insightful) 464

Let's see some information on how they did a "web-based survey". I really have a hard time believing the numbers they are talking about. I don't know of a single firearm enthusiast who would buy a smart gun as more then a novelty item.

As far as I'm concerned, when Feinstein's bodyguards are willing to only carry smart guns, then the technology is mature enough for use.

Comment Re:Sigh (Score 2) 265

This is the only answer that needs to be posted. At my previous job, someone put a bug into the CIO's ear which got filtered down to my Director and I had to pull a report on all port scans for a year. Good news is with Dell SecureWorks is that generating the report was easy. Bad thing that I knew from the get go was the sheer numbers would amaze people who don't deal with this every day. I don't recall the numbers since it has been almost two years, but the smallest number to break down was some thing like 10-15 port scans per second between all the ingress points for a medium sized company. We didn't even normally bother reporting on it because it is useless.The brute force port scans isn't what worries me, it is the sophisticated attackers willing to spend months doing slow probe of the network.

Comment Re:Not ill timed... (Score 1) 633

The real common sense approach that would be sensible is I can go buy any man portable firearm that I want. You are free to not buy any firearms. Then to really add common sense to the mix, everyone knows that education is the key to life. So require the Eddie Eagle program in pre-K through 1st grade. Then in late elementary or middle school, start firearm safety and proficiency courses. This would kill two birds with one stone. First it would reduce the illogical fear so many people have of firearms and second it would introduce safe handling and basic skills.

Comment Re:Doesn't die unless faced with air defense (Score 1) 290

The B-52 will not be the lead bomber in the case of a conflict with a modern military. There will be a package of Suppression of Enemy Air Defenses, right now lead by EF-18G Growlers, F16 configured as Wild Weasels, B2 and B-1B bombers. Once either the temporary or permanent suppression is done, then the B-52's will come in with large bomb/missile loads. The US is very much about integrating forces so that the sum of the attack is greater than the parts.

Comment Re:thats strange (Score 2) 177

I had an 05 VW Golf TDI, and I averaged 42 MPG with it. When I bought it between work and school I was driving 500 miles a week and kept very good records. I saw as high as 44 and as low as 38 MPG. To this day I still say it was the best overall car I've ever owned, though I was thrilled to trade it on a new 2010 Camaro and be one of the first people to drive a 5th gen.

Comment Re:Work/Life balance means Life *is* work (Score 2) 242

Time to find another job. Ever since I've left IBM, my work/life balance has been excellent. The first post blue job was in a two man department with myself and a director. His philosophy was get things done, use all your PTO, and if you need to do something during the day as long as you weren't scheduled to meet with a partner or client (which was rare for us) do the non-work thing. Now I'm at a fortune 250 company and they have the same style except there are 5 and soon to be 6 of us.

Comment Re:how does anyone make money off this? (Score 3, Informative) 116

I support a health care company and the hacks are often about money. Gain access to an unsecured medical device, then pivot to other internal systems with the goal to get into the billing records. Exfiltrate patient data, especially the records of minors. A minor's SSN is very valuable, because how many parents check the credit report of their kids? So a bad guy could have years to nearly 2 decades of access to a SSN that isn't monitored.

Comment Bulletproof SSL and TLS, get it, read it, live it (Score 1, Interesting) 25

I can't recommend the book Ivan wrote on SSL and TLS. Bulletproof SSL and TLS gives a very good overview of how SSL and TLS operate, explains some of the attacks used against SSL/TLS, and gives some information on how to configure TLS.

I also find SSL labs to be a great tool to evaluate web sites of vendors and company hosted sites.

Slashdot Top Deals

The universe seems neither benign nor hostile, merely indifferent. -- Sagan