Follow Slashdot stories on Twitter


Forgot your password?

Comment: Re:question from a kid (Score 3, Funny) 22

by fuzzyfuzzyfungus (#48640633) Attached to: How a 3D Printer Let a Dog Run For the First Time
Well kid, I'll try to put this in terms that you understand: Imagine that this rock here is your 'build plate', except that it already has some hardened gunk on it from where the filament had a bubble in it and your last project kind of got fucked up while you weren't watching it.

Now, this other rock, hold it in your hand and move your arm stiffly, like it's controlled by a couple of cheap servos. That's going to be your 'extruder'; but imagine for a minute that this extruder is like a 'negative extruder' that subtracts material by, um, extruding antifilament or something.

Ok, now just start mumbling g-code under your breath really fast and bash the 'extruder' into the 'build plate' until all the hardened gunk covering the shape you wanted has been removed from the extruder. That's pretty much all there is to it...

Comment: Re:Which is why (Score 1) 317

I'm assuming that Sony, being a very large multinational company, has a very large Intranet, which means at various points its going to be traversing the open Internet at various points.

Unless you're advocating Sony lay down its own fiber and then turn off its gateway routers....

Comment: Re:Sony security: strong or weak? (Score 5, Interesting) 317

I'd be interested in knowing the details of the attack. Was it a "social engineering" attack of some kind (ie. a virus-laden email that someone with high privileges opened)? Was it a vulnerability in their networks? I've heard someone with high level admin privileges had their account hacked, but in what way was it done?

The organization I work for is a contractor for the government of a North American jurisdiction, and yesterday morning I started getting reports that some sort of virus-laden emails were flowing out of this government's networks. Sure enough, within a half an hour, I got emails from a contact I have within this particularly agency, with an attached ZIP file with an SCR file inside. That has to be one of the oldest ways that malware has been transmitted in Windows system, I saw my first virus-laden SCR file somewhere around 1997-1998.

Apparently this critter is so new that by the time we checked, only a few AV companies had caught on to it. Even worse in some ways is that it appears that it made its debut on the very government servers in question, making me think this was a targeted attack. So you have a combination of a brand new virus of some kind that won't get caught by the scanners, lax email rules that allow the opening and execution of executable file types (not that blocking EXE variants doesn't mean some bastard won't be firing off a compromised PDF at an unpatched system), and users who through a combination of laziness and ignorance happily take the final step.

With this particular attack, there would have been no problem if Outlook had been configured not to open these kinds of attachments, and in an Active Directory environment, that's pretty trivial, so some of the blame has to go to this government agency's IT team. But still, even with the best safeguards, where users just happily click on any old attachment, it doesn't exactly take a rare alignment of the stars to have malware planted in a network. Sure, it won't have root privileges and won't be able to propagate itself via more sophisticated means, but it appears in this case it didn't need to.

So I do agree to some point that there are finite limits to what any person or organization can do to secure itself against a determined and directed attack. But there are ways to make such attacks much more difficult, and more quickly captured before they wreak too much harm.

Comment: Re:We're turning into wimps (Score 4, Insightful) 227

by MightyMartian (#48629407) Attached to: "Team America" Gets Post-Hack Yanking At Alamo Drafthouse, Too

North Korea really hasn't even proven it has a missile that reliably reach Japan. The country is a total basket case run by a violent, completely detached dynasty. It represents a significant regional threat, but if it were to ever do anything truly belligerent, China would yank support and the regime would collapse.

That, to my mind, is the chief threat of North Korea, that when the Kims finally do lose grip, the regime's collapse will be violent for North Koreans and their neighbors.

Comment: Re:What are they going to do? (Score 2) 227

by MightyMartian (#48629359) Attached to: "Team America" Gets Post-Hack Yanking At Alamo Drafthouse, Too

Indeed. Of all the groups that make threats against the West, NK seems the one least likely to have the ability or desire to actually attack a Western target. I cannot imagine the fires of hell that would reign down on North Korea should it be demonstrated to be behind mass murders in the United States.

It boggles my mind that anyone seriously believes North Korea is going to start mounting attacks on North American theaters should they screen this film.

Comment: Re:WTF (Score 1) 58

by MightyMartian (#48628143) Attached to: NASA Tests Feasibility of 3D Printing on the Moon and Other Planets

Except that in-situ is an English word. It's origins are Latin, but then again, so is a vast amount of the English vocabulary.

We have these things called dictionaries. Rather than demonstrating intense stupidity, inform yourself first.

Oh right, this is /., where ignorance is a matter of pride.

Loan-department manager: "There isn't any fine print. At these interest rates, we don't need it."