Follow Slashdot stories on Twitter


Forgot your password?
Slashdot Deals: Prep for the CompTIA A+ certification exam. Save 95% on the CompTIA IT Certification Bundle ×

Comment Re:Virtualize (Score 1) 142

ESX-I ftw. Ignore any recommendations for VM Player/Workstation, you'll lose a lot of resources to system operating system over head. I built a ESX-i server for less than $200 bucks 16GB of ram with Phenom II 945. This included 3TB of storage and an Antec case. On this set up I virtualize 45-50 OS's simultaneously with no problems.

Comment Security expert point of view. (Score 5, Interesting) 88

As a security engineer(CISSP&CSSLP) with several years of experience in C&A and pen testing, I must say that the results aren't a surprise by any means. What I DO find disturbing is the amount of detail provided in a public report given the fact that the FAA has yet to fully apply it's remediation strategies for the vulnerabilities identified. Is there any info as to what tools they used for app testing? My experience shows that tools such as App Detective and Web Inspect actually inflate the number of findings. This is due to the fact that the applications identify vulnerabilities by instance and not by category/type.

Comment Trail and Error without the expensive hardware. (Score 1, Informative) 177

If you already have a data plan for your mobile phone then give this application a try: It will turn your cell phone into a Access point. I use this application all the time when i'm on the road or when my connection goes down at home.
The Military

Submission + - Leaked: Entire equipment list of US forces in Iraq->

James Hardine writes: There are many reports on the Wikileaks release of a spectacular 2,000 page US military leak, possibly the most militarily significant leak of the war. The leak consists of the names, group structure and equipment registers of all units in Iraq with US army equipment. It exposes secretive document exploitation centers, detainee operations, elements of the State Department, Air Force, Navy and Marines units, the Iraqi police and coalition forces from Poland, Denmark, Ukraine, Latvia, Slovakia, Romania, Armenia, Kazakhstan and El Salvador. The material represents nearly the entire order of battle for US forces in Iraq and is the first public revelation of many of the military units descr ibed. Among other matters it shows that the United States has violated the Chemical Weapons Convention.
Link to Original Source
Hardware Hacking

Submission + - Students Design Open Source Video Card 1

acronica writes: With the Open Graphics Project advancing slowly a few students picked up the idea to do it all smaller, faster, and more importantly, cheaper. From the site; "We'd love to have an OGD1 card and are amazed by it's specifications, but for us and a lot of people, this card is simply too much. So that's where this card comes in, to give you all the fun of developing on programmable hardware, designing video cards and architectures, for a price that won't hurt your wallet." Will this make way for open source enthusiasts to build a true open source system?

NIST Opens Competition for a New Hash Algorithm 187

Invisible Pink Unicorn writes "The National Institute of Standards and Technology has opened a public competition for the development of a new cryptographic hash algorithm, which will be called Secure Hash Algorithm-3 (SHA-3), and will augment the current algorithms specified in the Federal Information Processing Standard (FIPS) 180-2. This is in response to serious attacks reported in recent years against cryptographic hash algorithms, including SHA-1, and because SHA-1 and the SHA-2 family share a similar design. Submissions are being accepted through October 2008, and the competition timeline indicates that a winner will be announced in 2012."

Submission + - Germany passes invasive surveillance law 2

An anonymous reader writes: Today at 14:05, the German parliament passed an extensive surveillance law, including an extremely extensive data retention duty for all telecommunication providers. They must now gather and store virtually all data generated by an act of telecommunication, including for example IP addresses, Email headers, Phone number and the location of mobile subscribers. This gargantuan amount of data has to be kept for six months.

These records may be accessed for all crimes "committed by means of telecommunication", allowing virtually unlimited access for law enforcment agencies.This is the first time in the history of the German republic that a basic human right (the secrecy of correspondence) is abolished in it's entirety. (German, it's all over the german internet by now)

In related news, German secretary of interior Wolfgang Schäuble, compared objectors to Adolf Hitler: (also in German)

Just because he's dead is no reason to lay off work.