Forgot your password?

Comment: Re:So, is this delay legal? (Score 1) 600

Immigration laws? This president has deported more people than ANY other. The deportation numbers are an 'all time high', so I don't understand where you're getting the idea that the president isn't enforcing immigration laws:

Comment: Re:HTC should stop competing with Apple and Samsun (Score 1) 152

by truetorment (#42948137) Attached to: HTC Unveils Revamped HTC One

I like you idea of specialization but...

--HTC Marathon: Twice as thick as an iPhone...with a 5,000mAh battery that can last two full days on a charge.

That would just equal what an iPhone 5 gives users today in terms of battery life.

Only if that iPhone 5 isn't doing *anything*; I haven't seen any iPhone 5s that last much longer than a day, and then only on light, low-use days!

Comment: Re:Reduce gun violence? (Score 2) 436

by truetorment (#42763049) Attached to: Federal Gun Control Requires IT Overhaul

The parent never mentioned having an 'entitlement to personal safety'; please don't put words in people's mouths.

Also, as the executive officer of a large and powerful country (most would agree the the most powerful), ensuring the holder of the position's safety is important for many reasons, and if you can't see why that is, I think you may need to think a little more rationally on this.

Comment: Re:Reduce gun violence? (Score 1) 436

by truetorment (#42762767) Attached to: Federal Gun Control Requires IT Overhaul

Where, in *any* of the executive actions (they were NOT 'executive orders'), does it say anything about bans on guns?

Look, they're RIGHT HERE), and there is absolutely, utterly NOTHING about a gun ban. There is a push from some elected officials in Congress to renew the assault ban, but there is no 'gun grab' or anything else.

Your offtopic rant doesn't actually advance the discussion here about IT-related challenges in government data sharing whatsoever.

Comment: Re:Executive Orders (Score 1) 436

by truetorment (#42762689) Attached to: Federal Gun Control Requires IT Overhaul
Thank you for commenting on this as well. Whether one is for or against the executive actions Obama actually took, characterizing them correctly is important! It's also interesting that when asked, most people vociferously against these 'executive orders' cannot actually name one that they oppose or why.

Comment: '23 Executive Orders' (Score 1) 436

by truetorment (#42762657) Attached to: Federal Gun Control Requires IT Overhaul

Obama did not produce or sign any 'executive orders'. Executive orders carry the force of law, and characterizing his executive actions (actually three memoranda and several other 'actions') as executive orders is completely incorrect:'t/


+ - Drexel University Giving UAVs a Hand (and Arms)->

Submitted by Zothecula
Zothecula (1870348) writes "Unmanned aerial vehicles (UAVs) have proven very successful as surveillance, intelligence-gathering and mapping craft, but their ability to interact with the ground has been largely confined to launching missiles. Now, Drexel University in Philadelphia, Pennsylvania is planning to endow them with arms and hands to allow them to work on such tasks as repairing infrastructure and disaster recovery while hovering near the ground."
Link to Original Source

+ - Zeus Trojan Hits Blackberry Devices->

Submitted by wiredmikey
wiredmikey (1824622) writes "Despite its significant user base within enterprises, BlackBerry devices have managed to stay off the radar for malware writers. That may be ending, as four new Zeus-in-the-mobile (Zitmo) samples targeting BlackBerry users in Germany, Spain, and Italy have been found.

Zitmo, which hit Android devices back in July 2011, refers to a version of the Zeus malware that specifically targets mobile devices.

Denis Maslennikov, a security researcher at Kaspersky Lab, also identified a new Zitmo variant for Android using the same command and control (C&C) numbers as the BlackBerry versions. While previous Android variants have been primitive, the latest.apk dropper, which shows up as an app "Zertifikat," looks "more similar to 'classic'" Zitmo, he said. When executed, it displays a message in German that the installation was successful, along with an activation code. The Android sample also included a self-issued certificate that indicates it was developed less than a month ago."

Link to Original Source

+ - Ga. Tech Launches Security Data-Sharing Program For F500, Government->

Submitted by Trailrunner7
Trailrunner7 (1100399) writes "One of the more pernicious and as-yet incurable diseases in security is the resistance to sharing data. Organizations large and small collect all sorts of information on attacks, vulnerabilities and threats and, for the most part, it simply sits in databases and is never of any use to anyone outside of the organization. But there's an effort underway at the Georgia Tech Research Institute to change that through the use of a new information-gathering and analysis system called Titan.

Private data-sharing initiatives have been ongoing for a long time now, both formally and informally. Volunteer groups and industry coalitions such as the Shadowserver Foundation, Honeynet Project and many smaller informal working groups pool data on attackers and attacks. Some of that data is made public via reports on especially bad hosting providers or the most frequently exploited platforms or bugs. But data on how specific attacks went down, what the timeline, tactics, techniques and tools were and what was stolen is much harder to come by. It's shared over beers or in hallways at conferences, between former colleagues or through a friend of a friend. And that's the most valuable stuff, the dirt on who stole what from whom and how.

Without that kind of data, it's difficult for organizations to know what they're up against and what to look for at any given time. That's where GTRI's Titan project will attempt to fill the void. The system is built on a collection of data on malware that is growing by about 100,000 samples a day. Participants in the project will contribute their own data on malicious code and attacks and also will be able to see what others have contributed, to glean information about ongoing attacks. The data will be anonymized so no one will know which company was compromised by which malware. Right now, the system is being used by a handful of Fortune 500 companies and government agencies, but that's going to grow."

Link to Original Source

+ - Verizon has five secret data plans you can only get if you know about them->

Submitted by zacharye
zacharye (2330148) writes "Verizon Wireless killed its previous data plan offerings in late June and replaced them with a series of “Share Everything” plans, which give smartphone users unlimited voice minutes and text messages alongside a single bucket of data that can be shared between as many as 10 different phones, tablets and laptop computers. The nation’s top carrier publicizes six data tiers for its new plans, ranging from a base price of $50 a month for 1GB to $100 a month for 10GB. In addition to those plans, however, Verizon on Tuesday confirmed that it has five additional unpublicized tiers available for Share Everything users..."
Link to Original Source

+ - Airtel: An Indian ISP Penalized For Blocking a Torrent Site

Submitted by Anonymous Coward
An anonymous reader writes "India's Department of Telecom has instructed ISPs to block popular torrent trackers like the Pirate Bay and IsoHunt. Recently, consumer forum penalises Airtel for blocking torrent sites and deficiency in providing Internet access when it blocked torrent sites earlier this year, following a Madras High Court Order received by Copyright Labs. The opponents are directed to pay Rs. 20,000/- to the complainant for committing deficiency in service and thereby causing mental agony to the complainant. Further the opponents are directed to pay Rs.2,000/- towards litigation charges to the complainant. A copy of the Court’s order is available here."

+ - Ask Slashdot: Rugged e-book reader?

Submitted by
Augury writes "I'm about to undertake a lengthy trip involving travel through dusty, damp and drop-inducing environments. When it comes to packing for such a trip, reading is a fundamental need, to help while away the inevitable hours spent in transit lounges, at bus stops and on beaches. The weight and bulk of the dead tree approach makes it impractical, so an e-book reader seems ideal — does anyone have any experience with ruggedising an e-book reader for such conditions?"

Suburbia is where the developer bulldozes out the trees, then names the streets after them. -- Bill Vaughn