Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 1 declined, 1 accepted (2 total, 50.00% accepted)

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Communications

+ - Preparing for the Worst in IT

Submitted by
mplex
mplex writes "How vulnerable is the internet to terrorist attack? Is it robust enough to handle an outage on a massive scale? Should the commercial infrastructure that powers the internet be kept secret? These are the sorts of questions raised by Mark Gibbs in his latest column in Network World. Given that the internet thrives on open networks, it's hard to imagine keeping them a secret. At best, we must be prepared to deal with the worst."
Encryption

+ - NIST Announces Contest to Replace SHA-1 Algorithm

Submitted by mplex
mplex (19482) writes "From the article:
'The National Institute of Standards and Technology today announced a public competition to pick a new cryptographic hash algorithm that would become the new federal information processing standard. This evaluation process is expected to run a minimum of three years.'

This is overdue given the known weaknesses with SHA-1 and it's variants"

Time-sharing is the junk-mail part of the computer business. -- H.R.J. Grosch (attributed)

Working...