Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment: Risk Management (Score 1) 236

by nuckfuts (#49752463) Attached to: Asteroid Risk Greatly Overestimated By Almost Everyone
Risk management is not simply about the probability of an event occurring; it must also take into account how damaging the event would be. For example, events that are very likely to occur but have little consequences might be safely ignored. Events that are very unlikely to occur but have catastrophic consequences merit some effort to prevent.

Comment: Not uncommon in my world :) (Score 2) 104

by nuckfuts (#49425121) Attached to: Google Let Root Certificate For Gmail Expire

I usually figure out that a cert has expired when something breaks. For example, I like to use free certs from StartSSL on Exchange Servers. When they expire, people get warnings when accessing OWA, or smartphones stop connecting.

If it happens to be on an SBS Server it can really be a pain, however, since it will stop working as a Terminal Services Gateway, making it difficult to log back on and replace the cert.

Comment: Re:FFS (Score 2) 72

by nuckfuts (#49387349) Attached to: Military Caught Training Children To Fight

Wow. You sound inordinately passionate about April 1st. If such articles are so much to your liking, perhaps it's you who needs to go elsewhere. May I suggest America's Finest News Source?

As for this site, the motto used to be "stuff that matters". When April Fools articles become so numerous, it's no longer amusing. It's like the same joke being told over and over again. April Fools is not a "huge holiday". It's a day literally intended for fools, and only a fool finds the same joke funny time after time.

Comment: What are the actual risks to your network? (Score 1) 114

by nuckfuts (#49088837) Attached to: Duplicate SSH Keys Put Tens of Thousands of Home Routers At Risk

OK, this is clearly a bad thing, but I don't think it means that your private LAN is immediately accessible to people all over the world does it? Multiple routers using the same keys means you could be tricked into logging in to someone else's router without knowing, but that would still require some way of directing your traffic to the imposter's device to begin with, such as DNS hijacking.

Knowing someone's keys would also allow you to encrypt/decrypt traffic as that device, facilitating a man-in-the-middle attack, but still, you need a way to get in the middle between two devices. This is not something that's trivial to do from one arbitrary location to another.

I'm not suggesting this isn't a serious problem, but I don't think it's as bad as, say, remote administration being enabled with a known default password.

If a 6600 used paper tape instead of core memory, it would use up tape at about 30 miles/second. -- Grishman, Assembly Language Programming