Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Submission Summary: 0 pending, 5 declined, 0 accepted (5 total, 0.00% accepted)

Take advantage of Black Friday with 15% off sitewide with coupon code "BLACKFRIDAY" on Slashdot Deals (some exclusions apply)". ×

Submission + - If you could rewrite your application, what would you do differently?

mveloso writes: Lots of readers are in development — web, software, etc. After a few iterations everything gets crufty — requirements change, hacks get put into place, the architecture doesn't fit, and real-world performance is terrible.

With the benefit of your current experience, how would you have rewritten your application given what you know today?

Submission + - Tracking zombies and botnets?

mveloso writes: Like many people here, I run a couple of servers that do various things. The machines run firewalls as a matter of course, and have large numbers of log entries showing machines that, for one reason or another, are poking and prodding them.

But — besides proactively shutting off access to the machines by blocking their IPs (which may or may not be useful), I was wondering: is there a repository somewhere for tracking infected machines or botnets? Some of the signatures match known vectors used by infected machines, and some don't...but it all may be useful informtion for somebody.

Does anyone know of a blacklist-type service that can use this information?

Without life, Biology itself would be impossible.