Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×

Comment: Re:State sponsored hack= state terrorism/act of wa (Score 3, Insightful) 221

Just because some vague articles and politicos point the finger at North Korea doesn't mean that it's true. I'm not making any assertions about the truth at this point, but we should be careful before jumping to (potentially violent) conclusions based on hearsay.

http://www.wired.com/2014/12/e...

"But in their initial public statement, whoever hacked Sony made no mention of North Korea or the film. And in an email sent to Sony by the hackers, found in documents they leaked, there is also no mention of North Korea or the film. The email was sent to Sony executives on Nov. 21, a few days before the hack went public. Addressed to Sony Pictures CEO Michael Lynton, Chairwoman Amy Pascal and other executives, it appears to be an attempt at extortion, not an expression of political outrage or a threat of war."

Comment: Re:Copyright violation? (Score 3, Insightful) 230

I think it is.

It is one thing to install software on your own computer that serves modified content. When you start serving the modified content to other people, I believe that creates the difference.

If comcast can inject ads, then there would be no problem with ISPs offering "Advertising Filtering" proxy servers for their customers and serving them sanitized content.

Comment: Re:Firewall != Windows Firewall (Score 1) 348

The argument for running a windows firewall *in addition* to physical firewalls is that you create a "soft underbelly" if the individual servers do not have their own defenses. Say someone compromises server #1 -- now they can attack server #2 - #4 and have access to a significantly larger threat surface (i.e. Server #1 has direct access to ports on #2 - #4 that you wouldn't want an attacker to see).

The basic principle is - keep your attack surface as small as possible from as many attack vectors as possible. This means inefficiency and overlapping defenses.

Comment: "Yeah... right"... Re:John Smith? (Score 4, Informative) 148

Pretty sure these people haven't spent much time in the courts....

I was sued for defamation by a company over content that someone else published on their site. I was included in the lawsuit because I provided the owner/operator/content-creator/everything of the other site a web analytics tool I created (before the days of free Google Analytics). This was enough to confuse the courts and put me in the position where best case scenario, I spend $40K+ and I "win" and worst case scenario, I spend $40K and lose the case and face a ridiculous judgment.

Unless you are an unemployed lawyer with no assets and plenty of free time, the legal system is a big pile of lose-lose.

Comment: Re:READ THE MANUAL FFS (Score 1) 372

by steppin_razor_LA (#44270049) Attached to: Ask Slashdot: Is Postgres On Par With Oracle?

Well put. Furthermore, stored procedures can enhance security (i.e. only allow the user that your application is connected to to perform specific predefined actions instead of direct table access). Also, I believe (although I could be wrong) that stored procedures are more likely to benefit from performance optimization within the database than dynamic SQL.

It's a beautiful dream (.NET/JAVA > TSQL in a heartbeat) but putting all of your business logic in your code is just another flavor of cool aid...

"Say yur prayers, yuh flea-pickin' varmint!" -- Yosemite Sam

Working...