Forgot your password?

Comment: Re:Bu the wasn't fired (Score 1) 1116

by tbg58 (#46713731) Attached to: Mozilla CEO Firestorm Likely Violated California Law

He may have resigned, but even if it wasn't a firing de jure it was a firing de facto. There was no going-away celebration and a glowing farewell speech celebrating his considerable accomplishments and contributions to the company. There was a blog post that said Mozilla should have done better and acted sooner.

Those who support progressive causes at Mozilla and other companies would do well to remember the principle of "I disagree with what you say, but will defend to the death your right to say it", lest they become the very thing they have been protesting against, even a very short time ago.

Comment: Adware/Malware distinction? (Score 1) 177

My own definition of malware is "Any piece of software on your computer which is under the control of someone other than the computer owner." Under this definition adware would be considered malware.

Antivirus vendors of course refer to several classes of malware, including rootkits, trojans, viruses, worms (all of which classifications derive from the method the malware uses for propagation and activation). The actions of malware are various as well - botnets, rootkits, keyloggers, phishing redirectors, crypto-extortion, fake AV are a few. Adware including browser hijackers, unwanted toolbars and other unwanted BHOs seem to be the category at which the new Microsoft targeting is aimed. These sorts of programs are called PUPs (potentially unwanted programs) by the AV vendors, though under my definition they would be classed as malware.

Microsoft have made a further distinction in adware as "any program which brings up ads in ANOTHER PROGRAM." These are what would be blocked. and this is not unhelpful, however one should remember that Microsoft's malware protection has been decertified by most antivirus ratings consortia, so how good the MS product will be is anyone's guess.

+ - That time the US dropped a hydrogen bomb on a backyard in S. Carolina-> 1

Submitted by Lasrick
Lasrick (2629253) writes "In this incredible excerpt from Eric Schlosser's book "Command and Control: Nuclear Weapons, the Damascus Accident, and the Illusion of Safety" Schlosser describes some pretty horrific accidents involving nuclear bombs. They often seem to involve an airman grabbing the manual bomb release lever by mistake. Honestly, it's amazing we aren't all dead."
Link to Original Source

Comment: Another starter resource (Score 4, Informative) 106

by tbg58 (#44270107) Attached to: Ask Slashdot: Learning DB the Right Way; Books, Tutorials, or What?
Before you develop any bad habits it would be excellent to get a good handle on how to organize data. _Database Design for Mere Mortals_ by Michael Hernandez is an excellent source for this and you will be able to breeze through it with your programming knowledge. You already know data types, but this book, which does not contain a single line of code, is a good primer on data organization and techniques for making relational databases function efficiently.

+ - Widespread issues with Google Apps Sync for Microsoft Outlook->

Submitted by tbg58
tbg58 (942837) writes "Users of Google Apps for Business who use Google Apps Sync for Microsoft Outlook (GASMO) are reporting widespread issues since Google deployed an updated version (3.3.x) of the sync utility designed to accommodate Microsoft Office Outlook 2013. Previous versions of GASMO did not support Outlook 2013. The most frequently reported issues are being caught in an access authorization loop, Outlook repeatedly going into offline mode. Although nothing about the issue has been published in the news, issues are widespread, as a visit to the GASMO Google Group (link included) shows."
Link to Original Source

Comment: No directional antenna needed...use free tools. (Score 1) 884

by tbg58 (#42987981) Attached to: Ask Slashdot: Dealing With an Advanced Wi-Fi Leech?

Step 1: Isolate. Use a spare PC, add a NIC and use Untangle Lite (free) which has very good. Turn off DHCP in your router, use it as an access point only. Let Untangle hand out addresses. Get the perp's MAC address and reserve his IP addresses. Use Untangle's report feature to build up a dossier of all his activities over a few weeks. See what he's doing.

Step 2: While compiling the reports, use HeatMapper (free) on a notebook or netbook to locate him. It won't be any problem to find his AP in the signal map.

Step 3: After you have the data, mail him a copy of the reports and the heatmap to let him know you know what he's doing, and invite him over for a cup of coffee or other beverage of your choice. Be sure to tell him you don't want to turn him in or blackmail him, but you would like to talk geek to geek. Tell him you're going to disable WPS and change the WPA key, but you'd like him to try to hack in again, and tell you if you've left any open vulnerabilities. You can end the leeching and might just gain a buddy worth having.

Caveat: Of course you want to send a copy of the report to someone else to hand over to Law Enforcement in case he turns out to be a terrorist or freakazoid with implements of destruction to use against you.

+ - Computer-Designed Enzymes may provide help for Celiac Disease-> 2

Submitted by tbg58
tbg58 (942837) writes "An article in the Journal of the American Chemical Society describes how researchers used computers to modify the structure of a naturally-existing enzyme to target the immunogenic peptide implicated in celiac disease.

"The application of computational protein design tools has been demonstrated to introduce functional properties beyond those obtained by natural evolution, such as producing enzymes that perform functions not found in nature, altered specificity of proteins for their binding partners, and the de novo design of fold topologies"

Researchers report the use of computational protein design to engineer an endopeptidase with the desired traits for an oral enzyme therapy (OET) for celiac disease which not only targets the desired peptide, but is also resistant to digestive proteases and the acidic environment of the digestive system."

Link to Original Source

+ - California's Surreal Retroactive Tax on Tech Startup Investors->

Submitted by
waderoush writes "Engineers and hackers don't think much about tax policy, but there's a bizarre development in California that they should know about, since it could reduce the pool of angel-investment money available for tech startups. Under a tax break available since the 1990s, startup founders and other investors in California were allowed to exclude or defer their gains when they sold stock in California-based small businesses. Last year, a California appeals court ruled that the tax break was unconstitutional, since it discriminated against investors in out-of-state companies. Now the Franchise Tax Board, California’s version of the IRS, has issued a notice saying how it intends to implement the ruling — and it’s a doozie. Not only is the tax break gone, but anyone who claimed an exclusion or deferral on the sale of small-business stock since 2008 is about to get a big retroactive tax bill. Investors, entrepreneurs, and even the plaintiffs in the original lawsuit are up in arms about the FTB’s notice, saying that it goes beyond the court’s intent and that it will drive investors out of the state. This Xconomy article takes an in-depth look at the history of the court case, the FTB’s ruling, and the reaction in the technology and investing communities."
Link to Original Source

+ - Active Defense Drives Attack Costs Up->

Submitted by msm1267
msm1267 (2804139) writes "Active defense and hacking back is turning up in a lot of conversations between vendors and customers, CIOs and executives and executives and general counsel. There's plenty of debate from security experts on the viability of active defense, and plenty of caution against hacking back. Experts explain some of the popular tactics and techniques being used on networks to frustrate attackers and hopefully move them on to their next targets."
Link to Original Source

+ - Antigua Government Set to Launch "Pirate" Website To Punish United States->

Submitted by Anonymous Coward
An anonymous reader writes "The Government of Antigua is planning to launch a website selling movies, music and software, without paying U.S. copyright holders. The Caribbean island is taking the unprecedented step because the United States refuses to lift a trade “blockade” preventing the island from offering Internet gambling services, despite several WTO decisions in Antigua’s favor. The country now hopes to recoup some of the lost income through a WTO approved “warez” site."
Link to Original Source

+ - GitHub Search Exposes Encryption Keys, Passwords In Code->

Submitted by wiredmikey
wiredmikey (1824622) writes "GitHub's new internal search has made it easy to uncover passwords, encryption keys, and other security missteps in software development projects that are hosted on the site. GitHub announced its internal search on Jan.23, which lets users search for any string through public and private repositories they have access to.

Some users discovered yet another way to use the search tool: finding files containing private encryption keys and source code with login credentials. Scarily enough, there were thousands of them.

Searching on id_rsa, a file which contains the private key for SSH logins, returned over 600 results. Other developers had hardcoded passwords for privileged user accounts, such as root, sa, and admin.

"With a simple script or tool, external hackers or malicious insiders can quickly discover these lost keys and use them to gain access to critical information assets," Jason Thompson, director of global marketing, SSH Communications Security said. "If the key grants a high level of administrative access, such as root, the potential threat to the business grows exponentially.

To be clear, GitHub is not at fault, since the company is just a hosting service. It just stores whatever files the developer wants to save. The search engine is not accidentally leaking confidential information. The data was already saved on GitHub, it is just making it easier for someone to find these mistakes.

Developers should note that GitHub has a Help page on how to make sure sensitive data is not saved to the repository."

Link to Original Source

+ - Can A New GPU Rejuvenate A 5 Year Old Gaming PC?->

Submitted by
MojoKid writes "New video card launches from AMD and NVIDIA are almost always reviewed on hardware less than 12 months old. That's not an arbitrary decision — it helps reviewers make certain that GPU performance isn't held back by older CPUs and can be particularly important when evaluating the impact of new interfaces or bus designs. That said, an equally interesting perspective might be to compare the performance impact of upgrading a graphics card in an older system that doesn't have access to the substantial performance gains of integrated memory controllers, high speed DDR3 memory, deep multithreading or internal serial links. As it turns out, even using a midrange graphics card like a GeForce GTX 660, substantial gains up to 150 percent can be achieved without the need for a complete system overhaul."
Link to Original Source
Electronic Frontier Foundation

+ - DMCA exemption ends on Jan 26th. Unlocking a cellphone becomes illegal->

Submitted by Acapulco
Acapulco (1289274) writes "Apparently an exemption to the DMCA, determined by the Librarian of Congress will expire this Saturday, January 26th, which will make unlocking phones illegal (although not jailbreaking).

From the article:

"The new rule against unlocking phones won't be a problem for everybody, though. For example, Verizon's iPhone 5 comes out of the box already unlocked, and AT&T will unlock a phone once it is out of contract."


"Advocacy group the Electronic Frontier Foundation (EFF) questions whether the DMCA has the right to determine who can unlock a phone. In an email to TechNewsDaily, EFF attorney Mitch Stoltz said, "Arguably, locking phone users into one carrier is not at all what the DMCA was meant to do. It's up to the courts to decide." "


"Christopher S. Reed from the U.S. Copyright Office noted in an email to TechNewsDaily that "only a consumer, who is also the owner of the copy of software on the handset under the law, may unlock the handset." ""

Link to Original Source

Optimization hinders evolution.