Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: EMET (Score 1) 467

by networkzombie (#48890103) Attached to: Ask Slashdot: Best Anti-Virus Software In 2015? Free Or Paid?
EMET along with whatever antivirus you choose.

I like ESET, especially the business version with console. I get it for my large customers.
Kaspersky is good. I use it for email gateways and small offices. The firewall breaks some shit, though.
I'm always removing viruses from computers that are running avast!, McAfee, Symantec, and AVG, so I won't be using those anytime soon
Trend Micro seems to be great, but I only have a couple of users running it so I have never used it in a large environment.
Vipre is a bad joke (I tested it).
MalwareBytes is great at removing crap and I use it often, but I have yet to use the paid version.
TDSSKiller for rootkits.

I'm thinking purchasing MalewareBytes for a small office soon (8 users), but I may go with Trend Micro. I'm on the fence.

Comment: Re:surprise, surprise, surprise (Score 4, Insightful) 224

by networkzombie (#48743193) Attached to: Beware Headlines Saying Chocolate Is Good For You
Actually, no. Evolution has provided humans with taste buds to favor foods that will keep us alive, depending upon conditions. These conditions are key. Bears are a good example. Bears that need to survive hibernation will gorge themselves on any sweets they can find because it is key to their survival. Bears will eat all the honey they can find, but they don't find much. Bears eat a lot of salmon and they find plenty. Bears eat a lot of berries and they find plenty. Bears eat a lot of grubs and they find plenty. Bears will eat all the Hershey bars they can find, along with all the almonds, denim, and bear repellant that goes with it, but they don't find a lot. If bears did find a lot of Hershey bars, they would soon die of (insert disease here). Humans, in the recent 4000 years, have gained the ability to have any food from anywhere on earth within arms reach available to them at low cost. Foods that would be healthy to gorge on, if they were scarce, are now plentiful. That is the problem. Technology has given us the means, but our self control has not evolved to fit our environment. Our taste buds still control us. If it tastes good, it is because your ancestors relied upon it to survive. You, with your comfortable life and big screen TV, should know better. If it tastes good, enjoy in moderation.

Comment: Details please (Score 1) 97

by networkzombie (#48639635) Attached to: Staples: Breach May Have Affected 1.16 Million Customers' Cards
I would love to know exactly how it happened so I may learn from their mistakes. I can only assume they had incredibly poor security measures in place or they were breached by some ninja who's skills were beyond comprehension. Some of the TJMaxx details were released which revealed they had poor wifi security at the store, holding onto data they shouldn't have, and no proper encryption of data, so the criminals basically cracked them from a laptop in the parking lot. If all the latest hacks are similar to the TJMaxx crack, I feel safe. Paranoia is your friend.

Comment: Re: fire them (Score 1) 110

by networkzombie (#48627907) Attached to: Hackers Compromise ICANN, Access Zone File Data System
Do you run your own SMTP server? No email with your FQDN should be accepted via public incoming SMTP port, only private encrypted SMTP port with AUTH should be used for MUAs and MTAs (message submission). Why would your server accept email from itself? Incoming SMTP ports should never accept email from it's own domain. This way, if you get an email as you describe, you can verify that the account has been compromised.

Comment: Re:Remote Torso® (Score 1) 52

by networkzombie (#48607667) Attached to: Telepresence Store Staffed Remotely Using Robots
In my dream, one of the developers had a hidden IPv6 IoT Wake on WAN setting turned on by default in the UEFI v3. It was missed by quality control. We didn't worry about getting hacked or people dying because we paid our insurance policy that year, also we didn't want to pay our engineers a decent wage to do good work because insurance against lawsuits was cheaper. We outsourced to Apple, who outsourced to Foxconn, who outsourced to a soccer ball factory in Kyrgyzstan. It works well, if you remember to compliment the chef.

Comment: Remote Torso® (Score 1) 52

by networkzombie (#48607231) Attached to: Telepresence Store Staffed Remotely Using Robots
I have wanted to build a remote torso for years. It is a torso (duh) with robotic arms. Basically whenever you need a plumber, a dishwasher, a doctor, or a computer tech, you would take your Torso® out of the closet and place it in the desired area where it would be controlled by an expert and complete its tasks without the need for anyone traveling to your home. After many nightmares about a chef stabbing me to death when I didn't complement him on his chicken pot pie, I decided to ditch the whole idea and hope no one else picks it up.

Comment: Re: Identifiable enough that Google targets ads (Score 4, Informative) 160

by networkzombie (#48599039) Attached to: How Identifiable Are You On the Web?
Actually, no. Web surfing involves visiting a multitude of sites. Whitelisting would be painstakingly difficult, especially with the wife. Even whitelisting cookies is tedious, but cookies are what you should be whitelisting. After your accept all the cookies you need (bank, Slashdot, etc...) then block the rest. Simply visiting a web site is no reason to accept a cookie. If you can identify any sites to block (DoubleClick) then blacklisting is the way to go. We're not talking about a server here, it is a web browser. Imagine whitelisting 20 sites per hour while shopping for a pair of shoes.
What I do is to identify what sites are serving me ads, surf those sites while capturing packets using your favorite tool (NetworkTrafficView from Nirsoft if using Windows is easy) and block those sites using your firewall (IPs) and/or hosts file (FQDNs). I haven't seen a DoubleClick ad in years. In Windows my hosts file looks like this:
The Slashdot filter made me cut quite a bit out, but you get the idea.
This work has already been done and gets updated for you here:
My Windows Firewall is more extensive. I block massive subnets in Russia, Ukraine, and China (ex. LACNIC Latin American and Caribbean This is all for a laptop that leaves the house. For an in-home solution you should get a better router and block them at the gateway so your iPad is safe too. pfSense is very flexible, but DD-WRT can do some neat tricks.

Comment: Re:Australian Gun Laws are STRICT! (Score 0, Troll) 880

by networkzombie (#48598171) Attached to: Apparent Islamic Terrorism Strikes Sydney
My sister lives in Melbourne and her patio furniture is stolen every year. The thieves know how "safe" they are, so they do what they like. She chained it up but they took the chain too. I recently won a .380 auto in a poker game. I put it in my shotgun cabinet. No one has ever tried to steal from my patio. When you outlaw guns, only outlaws will have guns.

Comment: Bad Helmet Design (Score 2) 233

by networkzombie (#48493357) Attached to: Football Concussion Lawsuits Start To Hit High Schools
Why does the helmet only have padding on the inside? Padding on the inside makes it like a construction workers helmet that is meant to protect you from hard objects like girders and falling buckets of nails. Padding on the outside of the helmet would (slightly more) cushion the repeated sudden shocks that can damage the brain. The hard candy shell should be in the middle to distribute the shock over a larger area, which in football doesn't help much because that area is your braincase, but the shell will help the helmet keep its shape. Of course padding outside the helmet would also eliminate the loud hit sounds that the spectators enjoy and make the players look like little cream puffs that can't play rough. We should just give the players weapons and release lions during the game.

Comment: Re:What a horrible name (Score 3, Insightful) 647

by networkzombie (#48482171) Attached to: Debian Forked Over Systemd
I remember installing Red Hat 5.x in the 90s and wondering how Linux should be pronounced. Linus had uploaded a mp3 of himself saying "it is pronounced Linux". I listened to it over a dozen times. I still do not know the correct pronunciation. On Mondays I call it "line-ex", on Tuesdays I call it "lyn-ex", on Wednesdays I call it "line-icks", and the rest of the week I call it "lyn-icks". I guess I don't really give a crap. I never liked the name Debian either. My brother named his daughter using the same method, merging his name and his wife's name. His daughter hates it. I wonder how Debian feels. Debian is probably happy it is not named "Devuan". I wouldn't even name my goldfish that, much less an a spoon or a fork.

Comment: SMTP on a Comcast Business IP (Score 1) 405

by networkzombie (#48384151) Attached to: Ask Slashdot: How To Unblock Email From My Comcast-Hosted Server?
Dear Hawkbug, I'm apologize for my fellow posters spewing forth knee-jerk postings. I have examined your situation and I must say I am puzzled. Your MX and rDNS records are all in order. The domain in question passes the generic email server tests. Your system can obviously communicate out via port 25 or you would not be getting deferred errors from servers and it does not "look like" it is being altered by any proxy. So... Comcast is not blocking your port, nor is your email server defunct. Everything seems in order. What can we conclude? You say the email server was working up until two weeks ago. What has changed? Either the servers offering up the deferred messages have implemented a new policy against you, or Comcast is altering your outgoing port 25 (to test the proxy/manipulation theory, find a friend who has an SMTP server and examine the SMTP logs). Whatever the case, it is something that has changed recently. Did you changed anything on the server? SMTP Banner? FQDN response? Any modifications to your DKIM or SPF? The "Deferred Errors" to me say greylisting. What would get you greylisted? Someone you sent an email to marked it as spam perhaps. Were any sent to the wrong person? Were any profane? Would anyone have mistakenly reported it as spam? Examine the emails you sent right before it stopped working, they may contain clues. My experience says follow the trail of "what changed when it stopped working." Good luck.

When the weight of the paperwork equals the weight of the plane, the plane will fly. -- Donald Douglas