Forgot your password?
typodupeerror
Software

Ryan Gordon Wants To Bring Universal Binaries To Linux 487

Posted by timothy
from the grossly-obese-binaries dept.
wisesifu writes "One of the interesting features of Mac OS X is its 'universal binaries' feature that allows a single binary file to run natively on both PowerPC and Intel x86 platforms. While this comes at a cost of a larger binary file, it's convenient on the end-user and on software vendors for distributing their applications. While Linux has lacked such support for fat binaries, Ryan Gordon has decided this should be changed."

Comment: Re:That's insane. (Score 1) 699

by larsu (#28238505) Attached to: Solution For College's Bad Network Policy?

I manage a team of network admins at a university that uses the same software as CMU. The software does have agents available for Mac and Linux too.

Stupid question, what if your machine is a Mac or Linux box? This "Client Security Agent" seems to be a Windows-only beast. Whatever it is, it would be a cold day in hell before I let a university that I'm paying money to dictate that I have to have their software on my machine to use the Internet access that my tuition and fees are paying for!

Here's the problem. The IT staff has a number of conflicting expectations for the network. There are N-1 other students at the university also paying tuition and they also expect the network to work. School administration expects it to work, with priority given to academic purposes. While it isn't ideal to require that students trust our software to run on their computer, it allows the school's IT staff to ensure computers comply with policy (current AV, anti-spyware, etc), and that computers that are causing network problems can be quickly identified and the problem mitigated. (And believe me, a comprehensive network access system greatly speeds problem resolution, both for the network and the student.) Keeping bad computers off the network lets the network keep working for everyone else that didn't mess up their computer with malicious software. It'd be nice to somehow exempt students that know what they're doing from this intrusive, annoying process. But like many things, a few bad apples ruin it for everyone.

The software allows policies to be set for AV existence and version, anti-spyware, and OS version and updates. It also allows custom scans to be written to check for files and registry keys. No other info gets sent to the administrators other than if you have failed or passed such a scan. No one is spying on you, or cares that much about what's on your computer. They just want the network to work.

There are agentless NAC solutions available, but they are more annoying for the user and less correct for the administrators. Having no NAC really isn't a feasible option anymore for schools of any decent size, as they need to comply with CALEA and respond to RIAA, REN-ISAC, and other internal/external complaints. If you don't trust your school, and are that concerned about running untrusted code from a vendor picked by your school, then don't. Don't use the network, and have fun with your protest. The administrators aren't forcing this upon the students because they're unsympathetic to their concerns. But rather, because they need to serve all students well.

Security

Pentagon Seeks a New Generation of Hackers 134

Posted by ScuttleMonkey
from the just-give-them-places-to-play dept.
Hugh Pickens writes "Forbes reports on a new military-funded program aimed at leveraging an untapped resource: the population of geeky high school and college students in the US. The Cyber Challenge will create three new national competitions for high school and college students intended to foster a young generation of cybersecurity researchers. 'The contests will test skills applicable to both government and private industry: attacking and defending digital targets, stealing data, and tracing how others have stolen it. [...] The Department of Defense's Cyber Crime Center will expand its Digital Forensics Challenge, a program it has run since 2006, to include high school and college participants, tasking them with problems like tracing digital intrusions and reconstructing incomplete data sources. In the most controversial move, the SANS Institute, an independent organization, plans to organize the Network Attack Competition, which challenges students to find and exploit vulnerabilities in software, compromise enemy systems and steal data. Talented entrants may be recruited for cyber training camps planned for summer 2010, nonprofit camps run by the military and funded in part by private companies, or internships at agencies including the National Security Agency, the Department of Energy or Carnegie Mellon's Computer Emergency Response Team.'"

It is contrary to reasoning to say that there is a vacuum or space in which there is absolutely nothing. -- Descartes

Working...