Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re:Virtualize (Score 1) 142 142

ESX-I ftw. Ignore any recommendations for VM Player/Workstation, you'll lose a lot of resources to system operating system over head. I built a ESX-i server for less than $200 bucks 16GB of ram with Phenom II 945. This included 3TB of storage and an Antec case. On this set up I virtualize 45-50 OS's simultaneously with no problems.

Comment Flawed by Design. (Score 5, Insightful) 98 98

The notion of having a single point of failure "security" device contradicts one of the primary foundations of security principle: Defense In Depth. Multiple layers of security is essential in safe guarding your systems, placing them all one one unit is nothing short of moronic.

Comment Security expert point of view. (Score 5, Interesting) 88 88

As a security engineer(CISSP&CSSLP) with several years of experience in C&A and pen testing, I must say that the results aren't a surprise by any means. What I DO find disturbing is the amount of detail provided in a public report given the fact that the FAA has yet to fully apply it's remediation strategies for the vulnerabilities identified. Is there any info as to what tools they used for app testing? My experience shows that tools such as App Detective and Web Inspect actually inflate the number of findings. This is due to the fact that the applications identify vulnerabilities by instance and not by category/type.

Comment Trail and Error without the expensive hardware. (Score 1, Informative) 177 177

If you already have a data plan for your mobile phone then give this application a try: http://www.wmwifirouter.com/ It will turn your cell phone into a Access point. I use this application all the time when i'm on the road or when my connection goes down at home.
The Military

Submission + - Leaked: Entire equipment list of US forces in Iraq->

James Hardine writes: There are many reports on the Wikileaks release of a spectacular 2,000 page US military leak, possibly the most militarily significant leak of the war. The leak consists of the names, group structure and equipment registers of all units in Iraq with US army equipment. It exposes secretive document exploitation centers, detainee operations, elements of the State Department, Air Force, Navy and Marines units, the Iraqi police and coalition forces from Poland, Denmark, Ukraine, Latvia, Slovakia, Romania, Armenia, Kazakhstan and El Salvador. The material represents nearly the entire order of battle for US forces in Iraq and is the first public revelation of many of the military units descr ibed. Among other matters it shows that the United States has violated the Chemical Weapons Convention.
Link to Original Source
Hardware Hacking

Submission + - Students Design Open Source Video Card 1 1

acronica writes: With the Open Graphics Project advancing slowly a few students picked up the idea to do it all smaller, faster, and more importantly, cheaper. From the site; "We'd love to have an OGD1 card and are amazed by it's specifications, but for us and a lot of people, this card is simply too much. So that's where this card comes in, to give you all the fun of developing on programmable hardware, designing video cards and architectures, for a price that won't hurt your wallet." Will this make way for open source enthusiasts to build a true open source system?
Encryption

NIST Opens Competition for a New Hash Algorithm 187 187

Invisible Pink Unicorn writes "The National Institute of Standards and Technology has opened a public competition for the development of a new cryptographic hash algorithm, which will be called Secure Hash Algorithm-3 (SHA-3), and will augment the current algorithms specified in the Federal Information Processing Standard (FIPS) 180-2. This is in response to serious attacks reported in recent years against cryptographic hash algorithms, including SHA-1, and because SHA-1 and the SHA-2 family share a similar design. Submissions are being accepted through October 2008, and the competition timeline indicates that a winner will be announced in 2012."
Communications

Submission + - Germany passes invasive surveillance law 2 2

An anonymous reader writes: Today at 14:05, the German parliament passed an extensive surveillance law, including an extremely extensive data retention duty for all telecommunication providers. They must now gather and store virtually all data generated by an act of telecommunication, including for example IP addresses, Email headers, Phone number and the location of mobile subscribers. This gargantuan amount of data has to be kept for six months.

These records may be accessed for all crimes "committed by means of telecommunication", allowing virtually unlimited access for law enforcment agencies.This is the first time in the history of the German republic that a basic human right (the secrecy of correspondence) is abolished in it's entirety.
http://www.tagesschau.de/inland/vorratsdatenspeicherung22.html (German, it's all over the german internet by now)

In related news, German secretary of interior Wolfgang Schäuble, compared objectors to Adolf Hitler:
http://www.heise.de/newsticker/meldung/98718 (also in German)

Our business in life is not to succeed but to continue to fail in high spirits. -- Robert Louis Stevenson

Working...