Forgot your password?
typodupeerror

Comment: Re:depends on what you're doing (Score 1) 235

by multimediavt (#47587349) Attached to: Comparison: Linux Text Editors

I've worked in academia for a while and early in my 20+ year career I learned vi simply because it WAS on every *nix variant I touched; IRIX, Solaris, HP-UX, Linux, AIX and a couple others I can't remember the names of (DECs *nix's name escapes me, for instance). Most *nix servers didn't have a GUI (and in my opinion shouldn't have one; yeah, get off my lawn, blah, blah, blah) so vi was almost compulsory to know if you needed to do anything with a config or script file. I wouldn't say I am a master at vi by any means; still look up commands from time to time. I wouldn't try writing a journal article with it, but it is powerful and once you learn the basics you can edit just about anything with a .txt at the end of it. Simple 3x5 card with the commands on it is all you need to be proficient enough to get most things done. Hell, a Post-It note would do.

In GUI environments I try to use bare bones editors (sometimes literally) as the others just get in the way or like NotePad and WordPad screw up line feeds and other basic UTF formatting. I do like ones that highlight code in the GUI environment, but I only use those in conjunction with other GUI tools I use for web work. I am just not impressed by any of these new GUI editors, mostly because I do UI/UX design and they just suck from that standpoint. It's like all we learned about proper GUI design in the 1980s and 1990s was forgotten, or something and everyone wants to reinvent the wheel, badly. [shakes head and goes back to coding]

Comment: Re:Thanks for the pointless scaremongering (Score 1) 353

There are far scarier things being developed in the heart of the country, down wind from a majority of the population of the US and Canada, in Dugway, Utah. One Ebola patient in isolation in Atlanta is really and truly nothing to get upset about. Be more afraid of what's at the Dugway Proving Ground. That's where they make and test biological and chemical weapons. Yes, make. They have things there that make Ebola look like the common cold.

Comment: Re:Recent purchases/downloads (Score 1) 241

by multimediavt (#47569847) Attached to: Is the App Store Broken?

A list of recently purchased/downloaded or even new additions would cycle a larger group of useful apps to the app store audience.

New apps should be featured, not most popular or most sold. Right now there are an extremely limited number of ways to filter apps when you browse and this more than anything is hurting the smaller, startup app developers. I know, I've been one!

Comment: Re:Run only services you need (Score 1) 345

The key is to only ever run the services that are absolutely needed, carefully configure these and keep them up to date. If you follow that advice a firewall is an added level of security but not necessarily needed.

The main caveat or gotcha to that approach is the time between vulnerability discovery and patch. There are services that may also be a requisite to a mission critical service that have exposed ports without a firewall. These can create vulnerabilities without a firewall protecting them. Let's put it this way, there are A LOT more reasons to run a firewall than to not run one. It's always better to err on the side of caution/paranoia when it comes to net security.

Comment: Re:PCI Compliance (Score 1) 345

As soon as they start handling credit card transactions, they will need to conform with PCI standards, which will mandate much much higher levels of protections. There are significant fines associated with non-compliance so you may want to forward them over information about this.

Very true and the changeover process for the required configuration is non-trivial as well. I remember when our organization met PCI compliance for CCs and it took months and lots of dollars to get all the systems that were processing credit cards up to spec. If they're going to do CC processing, even on an off chance, they should look into the requirements and do the setup that way NOW! It's more secure overall anyway so why not just do it from the ground up rather than trying to go through the Hell of modifying the setup for compliance later.

Comment: Re:It Depends (Score 1) 345

Have you actually got this in practice somewhere? I've theorized on this setup for over a decade now and have not had the time to implement a test case. I was looking at this as a solution for remote user access and security overall. The remote users login via VPN (IPSEC) when they're on the road now, so why not just have everyone use VPN all the time to connect to services, local and remote users. In a lot of ways it makes sense. Users use the same procedures for service access wherever they are and the servers in turn talk to each other and users all over IPSEC. I am sure someone will bring up some caveat to this setup that might ruin the idea, but it really seems solid.

Comment: Re:Fire(wall) and forget (Score 1) 345

It sounds a little like you're trying to just fling a firewall at the system and improve some sort of objective security metric.

What threats are you risks to mitigate with the firewall? What threats will it help guard against?

They don't come for free, and configuring them don't come for free.

What planet are you from? You don't setup a firewall to counter known threats. That's what software patches are for. You setup a firewall to prevent unknown threats on unused network ports. Just because you're not using a port doesn't mean there isn't a service attached to it that's vulnerable. That's why we have firewalls. And yes, firewalls do indeed come for free as part of most operating systems and network switch OSes and configuring them should take minutes for anyone with half a brain and some level of network admin competency. If in today's server admin world you take longer than a few minutes to setup the firewall as part of your config you've got a ridiculously complex set of services or you're in the wrong profession!

Comment: Re:Apparently... (Score 1) 345

And, you forgot DDoS and relay attacks from your machine! Even if you have "nothing of value" on your system (your identity info, tax returns, etc. count, duh!) the system itself is valuable to an attacker if they can gain control of it. When the DHS guys show up on YOUR doorstep because someone hacked into Pentagon computers from YOUR machine that's going to be an interesting day for you, until they figure out you were a pawn. That last bit can take a long time, btw and in the mean time you have no computer and usually can't go near one until the investigation is over. If this happens as part of your job, well, then there's the job hunting that will need to start and the trying to change careers because no one will hire a DUMBASS server admin!

Comment: Re:Can we dumb it down some more? (Score 3, Informative) 139

The abstract from the Nature Communications article is easier to read and understand what they've accomplished:

From its very beginning, quantum theory has been revealing extraordinary and counter-intuitive phenomena, such as wave-particle duality, Schrodinger cats and quantum non-locality. Another paradoxical phenomenon found within the framework of quantum mechanics is the ‘quantum Cheshire Cat’: if a quantum system is subject to a certain pre- and post-selection, it can behave as if a particle and its property are spatially separated. It has been suggested to employ weak measurements in order to explore the Cheshire Cat’s nature. Here we report an experiment in which we send neutrons through a perfect silicon crystal interferometer and perform weak measurements to probe the location of the particle and its magnetic moment. The experimental results suggest that the system behaves as if the neutrons go through one beam path, while their magnetic moment travels along the other.

Work expands to fill the time available. -- Cyril Northcote Parkinson, "The Economist", 1955

Working...