Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment here is the Lenovo Solution Center download (Score 4, Informative) 43


Since neither the original poster or the article provided it, here's a link to the page where the latest version of the Lenovo Solution Center can be downloaded from:

Note that the downloads are listed at the bottom of the page.


Aryeh Goretsky

Comment three questions (Score 1) 133

Hello Col. Hypponen,

I have three questions for you:

1. Do you think it is still possible to secure embedded systems (aka the Internet of Things), or is that an impossibility now, practically speaking?

2. If there was one thing you could every average computer user to do to improve their security, what would it be?

3. If you were a person of interest in the murder of your neighbor in a tiny Central American country, what would your strategy be for clearing your name?

Thank you for taking the time to read this. I look forward to your answers.


Aryeh Goretsky

Submission + - John McAfee denied Libertarian Party nomination for President (

SonicSpike writes: In a decisive rout for pragmatism over purity, the Libertarian Party has nominated former New Mexico Republican Governor and 2012 nominee Gary Johnson for president. Johnson came within an eyelash of winning on the first ballot, pulling 49.5 percent of the vote, just short of the required majority. (Libertarian activist Austin Petersen and software magnate John McAfee came in second and third, respectively, with 21.3 percent and 14.1 percent.) With sixth-place finisher Kevin McCormick (and his 0.973 percent of the vote) booted from the second ballot, Johnson sailed through with 55.8 percent.

Submission + - Metal foam obliterates bullets – and that's just the beginning ( 1

schwit1 writes: Composite metal foams (CMFs) are tough enough to turn an armor-piercing bullet into dust on impact. Given that these foams are also lighter than metal plating, the material has obvious implications for creating new types of body and vehicle armor – and that’s just the beginning of its potential uses.

Afsaneh Rabiei, a professor of mechanical and aerospace engineering at NC State, has spent years developing CMFs and investigating their unusual properties. The video seen here shows a composite armor made out of her composite metal foams. The bullet in the video is a 7.62 x 63 millimeter M2 armor piercing projectile, which was fired according to the standard testing procedures established by the National Institute of Justice (NIJ). And the results were dramatic.

“We could stop the bullet at a total thickness of less than an inch, while the indentation on the back was less than 8 millimeters,” Rabiei says. “To put that in context, the NIJ standard allows up to 44 millimeters indentation in the back of an armor.” The results of that study were published in 2015.

But there are many applications that require a material to be more than just incredibly light and strong. For example, applications from space exploration to shipping nuclear waste require a material to be not only light and strong, but also capable of withstanding extremely high temperatures and blocking radiation.

Last year, with support from the Department of Energy’s Office of Nuclear Energy, Rabiei showed that CMFs are very effective at shielding X-rays, gamma rays and neutron radiation. And earlier this year, Rabiei published work demonstrating that these metal foams handle fire and heat twice as well as the plain metals they are made of.

Submission + - LEOs Raid Another Tor Exit Node - They Still Believes an IP Address is a Person (

schwit1 writes: An IP address is not a person, even less so if said IP address traces back to a Tor exit relay. But that's not going to stop the "authorities" from subjecting people with no knowledge at all of alleged criminal activity from being subjected to raids and searches.

It happened in Austria. Local police seized a bunch of computer equipment from a residence hosting a Tor exit node. ICE — boldly moving forward with nothing more than an IP address — seized six hard drives from Nolan King, who was also running a Tor exit relay.

ICE wasn't involved in the latest raid predicated on nothing more than an IP address — at least not directly. This search/seizure was performed by Seattle PD conducting a child porn investigation. Sure enough, investigators had traced the activity back to an IP address, which was all the probable cause it needed to show up at privacy activist David Robinson's home at 6 a.m. and demand access to his computers.

Submission + - Oracle, chat & raw code found in Mossack Fonseca offshore web portal (

HongPong writes: The PanamaPapers law firm Mossack Fonseca exposed most of their customer service portal's backend, unpatched Drupal code through misconfiguring an Oracle server, also revealing a "portfolio" content type & possible local chat server. These vulnerabilities provide clues as to how the PanamaPapers might have been extracted remotely. This extends stories in Forbes & Wired UK about their security problems.

Submission + - FBI Director James Comey Warns Against Unbreakable Encryption, Absolute Privacy

blottsie writes: In an interview with the Daily Dot on Wednesday, Comey suggested Apple should weaken its encryption on its products to the level of iCloud, which the company can decrypt. “Today, Apple encrypts the iCloud but decrypts it in response to court orders,” he said. “So are they materially insecure because of that?”

Comey also warned against "absolute privacy," saying, "I love strong encryption. It protects us in so many ways from bad people. But it takes us to a place—absolute privacy—that we have not been to before.”

Comment Fixed that for you (Score 2) 104


I would suggest the following amendment to your draft text:

Be it resolved that computers running or intending to run Microsoft Windows purchased by the department which boot using the Unified Extensible Firmware Interface (UEFI) have the ability to disable the Secure Boot feature." REMOVING: s for both local hard drive and network booting.

If you want to put in verbiage saying Secure Boot should be disabled, the language should reflect this in its entirety, not just for what types of devices the computer boots from. Example: A manufacturer who disabled booting from SSDs, USB flash drives or optical media would still be in spec with your requirements, since you only specified hard disk drives and PXE booting in your text.

Also, keep in mind your requirement is not going to work with Windows 10 Mobile devices (phones, phablets and the like) as UEFI with Secure Boot enabled is part of the requirements for devices running that edition of Windows 10.


Aryeh Goretsky

Comment Nothing new here... (Score 3, Insightful) 186


Mr. McAfee has a rich and varied history of stating as fact things which cannot be proven as true or as false, simply because they cannot be verified. It is most certainly not paranoid rantings, nor is it based on any actual information about the current situation. Instead, it is carefully-crafted statements made for one reason and one reason only: To maximize his coverage in the media.

Recent examples of similar behavior include:

  • Notifying the world that he had determined the Ashley Madison hacker to be a former female employee, based entirely on his interpretation of the language used in the disclosures. In fact, investigative journalist Brian Krebs had contemporaneously identified the probably hacker as European man who had lived in North America for a period.
  • Offering to decrypt the iPhone used at work by Syed Rizwan Farook, primarily through the use of social engineering to obtain the passphrase or PIN unlock code. Social engineering the dead man's close friends and relatives in order to gain relevant information would likely need to be done in Arabic, Urdu or perhaps even Pashto. And, in any case, was subsequently rendered moot when it was revealed the phone's passphrase had been reset by law enforcement.
  • Claiming that America was vulnerable to EMP attacks, despite the fact that EMP weaponry had been investigated for years by Winn Schwartau who eventually determined widespread use wasn't feasible.

Sometimes making comments to the media works to McAfee's advantage, sometimes they don't. But as long as he keeps coming up with new ones, he keeps getting media coverage. This story is just one more example of such continuing behavior.


Aryeh Goretsky

Comment Re:No backdoors here Mr. McAfee... apk (Score 1) 186


Actually, hosts files are a reactive technology and not a proactive one, since they only block what is already listed in them. That does not mean they are useless, of course, but that they are just a supplemental tool, much like anti-malware software, segmenting administrative and user privilege, auditing logs, etc. There's no one magic bullet for security.


Aryeh Goretsky

Slashdot Top Deals

Vitamin C deficiency is apauling.