Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 5 declined, 0 accepted (5 total, 0.00% accepted)

Software

Submission + - If you could rewrite your application, what would you do differently?

mveloso writes: Lots of readers are in development — web, software, etc. After a few iterations everything gets crufty — requirements change, hacks get put into place, the architecture doesn't fit, and real-world performance is terrible.

With the benefit of your current experience, how would you have rewritten your application given what you know today?
Security

Submission + - Tracking zombies and botnets?

mveloso writes: Like many people here, I run a couple of servers that do various things. The machines run firewalls as a matter of course, and have large numbers of log entries showing machines that, for one reason or another, are poking and prodding them.

But — besides proactively shutting off access to the machines by blocking their IPs (which may or may not be useful), I was wondering: is there a repository somewhere for tracking infected machines or botnets? Some of the signatures match known vectors used by infected machines, and some don't...but it all may be useful informtion for somebody.

Does anyone know of a blacklist-type service that can use this information?

Money is the root of all evil, and man needs roots.

Working...