Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:State sponsored hack= state terrorism/act of wa (Score 3, Insightful) 221

Just because some vague articles and politicos point the finger at North Korea doesn't mean that it's true. I'm not making any assertions about the truth at this point, but we should be careful before jumping to (potentially violent) conclusions based on hearsay.

"But in their initial public statement, whoever hacked Sony made no mention of North Korea or the film. And in an email sent to Sony by the hackers, found in documents they leaked, there is also no mention of North Korea or the film. The email was sent to Sony executives on Nov. 21, a few days before the hack went public. Addressed to Sony Pictures CEO Michael Lynton, Chairwoman Amy Pascal and other executives, it appears to be an attempt at extortion, not an expression of political outrage or a threat of war."

Comment: Re:Copyright violation? (Score 3, Insightful) 230

I think it is.

It is one thing to install software on your own computer that serves modified content. When you start serving the modified content to other people, I believe that creates the difference.

If comcast can inject ads, then there would be no problem with ISPs offering "Advertising Filtering" proxy servers for their customers and serving them sanitized content.

Comment: Re:Firewall != Windows Firewall (Score 1) 348

The argument for running a windows firewall *in addition* to physical firewalls is that you create a "soft underbelly" if the individual servers do not have their own defenses. Say someone compromises server #1 -- now they can attack server #2 - #4 and have access to a significantly larger threat surface (i.e. Server #1 has direct access to ports on #2 - #4 that you wouldn't want an attacker to see).

The basic principle is - keep your attack surface as small as possible from as many attack vectors as possible. This means inefficiency and overlapping defenses.

Comment: "Yeah... right"... Re:John Smith? (Score 4, Informative) 148

Pretty sure these people haven't spent much time in the courts....

I was sued for defamation by a company over content that someone else published on their site. I was included in the lawsuit because I provided the owner/operator/content-creator/everything of the other site a web analytics tool I created (before the days of free Google Analytics). This was enough to confuse the courts and put me in the position where best case scenario, I spend $40K+ and I "win" and worst case scenario, I spend $40K and lose the case and face a ridiculous judgment.

Unless you are an unemployed lawyer with no assets and plenty of free time, the legal system is a big pile of lose-lose.


CIA Accused: Sen. Feinstein Sees Torture Probe Meddling 187

Posted by timothy
from the taking-the-heat-off-that-other-agency dept.
SternisheFan writes with this news from the Washington Post: "In an extraordinary public accusation, the head of the Senate Intelligence Committee declared on Tuesday that the CIA interfered with and then tried to intimidate a congressional investigation into the agency's possible use of torture in terror probes during the Bush administration. The CIA clandestinely removed documents and searched a computer network set up for lawmakers, said Sen. Dianne Feinstein in a long and biting speech on the Senate floor. In an escalating dispute with an agency she has long supported, she said the CIA may well have violated criminal laws and the U.S. Constitution."

Tech In the Hot Seat For Oct. 1st Obamacare Launch 326

Posted by Soulskill
from the is-there-tech-that-can-mute-the-rhetoric dept.
bednarz writes "In four days, the health insurance marketplaces mandated by the Obama administration's Affordable Care Act are scheduled to open for business. Yet even before the sites launch, problems are emerging. Final security testing of the federal data hub isn't slated to happen until Sept. 30, one day before the rollout. Lawmakers have raised significant concerns about the ability of the system to protect personal health records and other private information. 'Lots and lots of late nights and weekends as people get ready for go-live,' says Patrick Howard, who leads Deloitte Consulting's public sector state health care practice."

Comment: Re:READ THE MANUAL FFS (Score 1) 372

by steppin_razor_LA (#44270049) Attached to: Ask Slashdot: Is Postgres On Par With Oracle?

Well put. Furthermore, stored procedures can enhance security (i.e. only allow the user that your application is connected to to perform specific predefined actions instead of direct table access). Also, I believe (although I could be wrong) that stored procedures are more likely to benefit from performance optimization within the database than dynamic SQL.

It's a beautiful dream (.NET/JAVA > TSQL in a heartbeat) but putting all of your business logic in your code is just another flavor of cool aid...

The goal of Computer Science is to build something that will last at least until we've finished building it.