Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


+ - New Jersey High School Takes Network Security to the Cloud->

Submitted by srobs
srobs (2604793) writes "High Point Regional High School in Sussex, NJ has moved its network security system to the cloud. After an extensive search, the school selected Bat Blue Networks' cloud-based Security-as-a-Service system, Cloud/Sec. Cloud/Sec is designed to replace dozens of disparate technologies. It offers application security, URL filtering, antivirus, antimalware, and protection from other Internet-based threats and can support multiple sites, remote users, and mobile devices. Because the solution is cloud-based, it does not require hardware or implementation costs, and it doesn't require a subscription."
Link to Original Source

+ - Text messages don't die when you delete them; they hide->

Submitted by colinneagle
colinneagle (2544914) writes "We've all deleted texts, but those of you who might really not want anyone else to ever see them might be interested in knowing that forensics experts say, "Phone texts don't die; they hide." And that "factory reset feature" won't delete SMS well enough to stop them from being recovered either. The root of the problem comes from depending upon operating system controls to delete files.

After losing a mobile device, people may opt to remotely wipe it, but that won't really erase all your data either, according to forensic experts. That might seem like a bit of irony for anyone who suffered from attackers using flaws to remotely wipe phones, and then couldn't recover their important data.

In an article on the Australian, Bradley Schatz, a computer forensics expert and professor at Queensland University of Technology, said a phone's flash memory "is set up to avoid indiscriminately overwriting data, so if you have a lot of spare space on the drive inside your phone, which you will do on a large iPhone, then the device will use that before it writes over or erases previously used space and deleted messages.""

Link to Original Source

+ - Whitepaper: Managing The Google Threat->

Submitted by
srobs writes "Interesting whitepaper on the threat search engines pose to organizations and individuals.
"Google as an organization . . .1) has significant insight and knowledge on its users, both as individuals and entities; 2) often has users' blind and unquestionable trust; and 3) Google can be gamed by malicious people and business competitors to manipulate Google's knowledge of users."

Link to Original Source

In the sciences, we are now uniquely priviledged to sit side by side with the giants on whose shoulders we stand. -- Gerald Holton