Forgot your password?
typodupeerror

Comment: Re:Virtualize (Score 1) 142

by canipeal (#37779294) Attached to: Ask Slashdot: Computer Test Lab Set-Up For Home?
ESX-I ftw. Ignore any recommendations for VM Player/Workstation, you'll lose a lot of resources to system operating system over head. I built a ESX-i server for less than $200 bucks 16GB of ram with Phenom II 945. This included 3TB of storage and an Antec case. On this set up I virtualize 45-50 OS's simultaneously with no problems.

Comment: Security expert point of view. (Score 5, Interesting) 88

by canipeal (#27915825) Attached to: 3,800 Vulnerabilities Detected In FAA's Web Apps
As a security engineer(CISSP&CSSLP) with several years of experience in C&A and pen testing, I must say that the results aren't a surprise by any means. What I DO find disturbing is the amount of detail provided in a public report given the fact that the FAA has yet to fully apply it's remediation strategies for the vulnerabilities identified. Is there any info as to what tools they used for app testing? My experience shows that tools such as App Detective and Web Inspect actually inflate the number of findings. This is due to the fact that the applications identify vulnerabilities by instance and not by category/type.

Comment: Trail and Error without the expensive hardware. (Score 1, Informative) 177

by canipeal (#27764249) Attached to: Viability of Mobile Broadband For Home Use?
If you already have a data plan for your mobile phone then give this application a try: http://www.wmwifirouter.com/ It will turn your cell phone into a Access point. I use this application all the time when i'm on the road or when my connection goes down at home.
The Military

+ - Leaked: Entire equipment list of US forces in Iraq->

Submitted by James Hardine
James Hardine (1150665) writes "There are many reports on the Wikileaks release of a spectacular 2,000 page US military leak, possibly the most militarily significant leak of the war. The leak consists of the names, group structure and equipment registers of all units in Iraq with US army equipment. It exposes secretive document exploitation centers, detainee operations, elements of the State Department, Air Force, Navy and Marines units, the Iraqi police and coalition forces from Poland, Denmark, Ukraine, Latvia, Slovakia, Romania, Armenia, Kazakhstan and El Salvador. The material represents nearly the entire order of battle for US forces in Iraq and is the first public revelation of many of the military units descr ibed. Among other matters it shows that the United States has violated the Chemical Weapons Convention."
Link to Original Source
Hardware Hacking

+ - Students Design Open Source Video Card 1

Submitted by acronica
acronica (840954) writes "With the Open Graphics Project advancing slowly a few students picked up the idea to do it all smaller, faster, and more importantly, cheaper. From the site; "We'd love to have an OGD1 card and are amazed by it's specifications, but for us and a lot of people, this card is simply too much. So that's where this card comes in, to give you all the fun of developing on programmable hardware, designing video cards and architectures, for a price that won't hurt your wallet." Will this make way for open source enthusiasts to build a true open source system?"
Encryption

NIST Opens Competition for a New Hash Algorithm 187

Posted by Zonk
from the not-that-long-to-wait dept.
Invisible Pink Unicorn writes "The National Institute of Standards and Technology has opened a public competition for the development of a new cryptographic hash algorithm, which will be called Secure Hash Algorithm-3 (SHA-3), and will augment the current algorithms specified in the Federal Information Processing Standard (FIPS) 180-2. This is in response to serious attacks reported in recent years against cryptographic hash algorithms, including SHA-1, and because SHA-1 and the SHA-2 family share a similar design. Submissions are being accepted through October 2008, and the competition timeline indicates that a winner will be announced in 2012."
Communications

+ - Germany passes invasive surveillance law 2

Submitted by Anonymous Coward
An anonymous reader writes "Today at 14:05, the German parliament passed an extensive surveillance law, including an extremely extensive data retention duty for all telecommunication providers. They must now gather and store virtually all data generated by an act of telecommunication, including for example IP addresses, Email headers, Phone number and the location of mobile subscribers. This gargantuan amount of data has to be kept for six months.

These records may be accessed for all crimes "committed by means of telecommunication", allowing virtually unlimited access for law enforcment agencies.This is the first time in the history of the German republic that a basic human right (the secrecy of correspondence) is abolished in it's entirety.
http://www.tagesschau.de/inland/vorratsdatenspeicherung22.html (German, it's all over the german internet by now)

In related news, German secretary of interior Wolfgang Schäuble, compared objectors to Adolf Hitler:
http://www.heise.de/newsticker/meldung/98718 (also in German)"

"There is hopeful symbolism in the fact that flags do not wave in a vacuum." --Arthur C. Clarke

Working...