Forgot your password?
typodupeerror

Comment: Re:Privacy Concerns (Score 1) 244

by imemyself (#40248159) Attached to: After Launch Day: Taking Stock of IPv6 Adoption
It's actually even better than that. The official recommendation is a /48 per end-site. As far as I have been able to tell, I think ISP's are generally following that. I had heard something about using /56 per end site for residential users. That still gives people plenty of room to have multiple subnets though.

Comment: Re:Network gear features are still WAY behind v4 (Score 4, Informative) 244

by imemyself (#40247637) Attached to: After Launch Day: Taking Stock of IPv6 Adoption
I definitely agree with the concerns about IPv6 in the enterprise. Sure, almost everything has had some IPv6 support for years, but the feature parity with IPv4 was not there. (For example maybe something supports OSPF / BGP with IPv4 but only static routes with IPv6...or you can reference address groups from within a IPv4 ACL but not from IPv6). Even today some vendors (*cough* Juniper on their EX switches *cough*) see IPv6 routing as "extra" feature that isn't available on the basic license level. This is unacceptable, and shows a complete disconnect between vendors and enterprises / service providers with respect to what's actually needed for real world IPv6 deployments.

Comment: On the surface (Score 3, Interesting) 67

by imemyself (#38847229) Attached to: Mars-Bound Probe Serves As Radiation Guinea Pig
It would be interesting as well to know how much of an impact this would have to people on the Martian surface. Mars's magnetic field is pretty weak compared to ours. I guess they would be a little better protected just by the planet surface itself.

Even on the Apollo missions to the moon, they recognized that a solar storm could be a significant threat to the astronauts. Given the infrequence they decided to just take their chances. But the time they spent outside of the LEO was pretty low compared to what a Mars mission would entail.

Comment: Re:Just more things to break ... (Score 1) 433

by imemyself (#38229968) Attached to: Red Hat's Linux Changes Raise New Questions
My point is that RH isn't going to make that kind of change in an existing version of RHEL.

Now upgrading from 5 -> 6, or 6 -> 7 whenever that's released. Yeah...stuff's going to change. Maybe they'll put this in RHEL 7. But I don't this significant of a change would be pushed down as a normal update within v5 / v6 even in a 6.x or 5.x update.
Canada

+ - Web links don't constitute defamation, Supreme Cou->

Submitted by omega6
omega6 (1072658) writes "Supreme Court of Canada ruled that posting links is not the same as posting the actual content, but more similar to a footnote.
"The top court ruled against former Green party campaign manager Wayne Crookes, who argued that posting links to sites with defamatory statements was the same as publishing the defamatory material.""

Link to Original Source
Government

+ - German Gov't Trojan Eavesdrops on 15 Apps->

Submitted by
itwbennett
itwbennett writes "Researchers from Kaspersky Lab have discovered that the R2D2 surveillance Trojan, which is used by German law enforcement to intercept Internet phone calls is capable of monitoring traffic from popular browsers and instant messaging applications. 'Amongst the new things we found in there are two rather interesting ones: Firstly, this version is not only capable of running on 32 bit systems; it also includes support for 64 bit versions of Windows,' said Tillmann Werner, a security researcher with Kaspersky in Germany. 'Secondly, the list of target processes to monitor is longer than the one mentioned in the CCC [Chaos Computer Club] report. The number of applications infected by the various components is 15 in total.'"
Link to Original Source
Firefox

+ - Java Plugin For Firefox Spared From Ban->

Submitted by
itwbennett
itwbennett writes "Oracle has released a new Java security update to address multiple vulnerabilities, including one exploited during a recently disclosed attack that can allow eavesdropping on encrypted communications. Identified as CVE-2011-3389, that vulnerability nearly led to Firefox developers banning Java from the browser. Mozilla officially announced on Tuesday that blocking Java is off the table for now, especially since Oracle released a fix for the vulnerability. 'We will not be blocking vulnerable versions of Java at this time, though we will continue to monitor for incidents of this vulnerability being exploited in the wild,' the browser maker said."
Link to Original Source

FORTH IF HONK THEN

Working...