Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

The Rise of Feudal Computer Security 147

Hugh Pickens writes "In the old days, traditional computer security centered around users. However, Bruce Schneier writes that now some of us have pledged our allegiance to Google (using Gmail, Google Calendar, Google Docs, and Android phones) while others have pledged allegiance to Apple (using Macintosh laptops, iPhones, iPads; and letting iCloud automatically synchronize and back up everything) while others of us let Microsoft do it all. 'These vendors are becoming our feudal lords, and we are becoming their vassals. We might refuse to pledge allegiance to all of them — or to a particular one we don't like. Or we can spread our allegiance around. But either way, it's becoming increasingly difficult to not pledge allegiance to at least one of them.' Classical medieval feudalism depended on overlapping, complex, hierarchical relationships. Today we users must trust the security of these hardware manufacturers, software vendors, and cloud providers and we choose to do it because of the convenience, redundancy, automation, and shareability. 'In this new world of computing, we give up a certain amount of control, and in exchange we trust that our lords will both treat us well and protect us from harm (PDF). Not only will our software be continually updated with the newest and coolest functionality, but we trust it will happen without our being overtaxed by fees and required upgrades.' In this system, we have no control over the security provided by our feudal lords. Like everything else in security, it's a trade-off. We need to balance that trade-off. 'In Europe, it was the rise of the centralized state and the rule of law that undermined the ad hoc feudal system; it provided more security and stability for both lords and vassals. But these days, government has largely abdicated its role in cyberspace, and the result is a return to the feudal relationships of yore,' concludes Schneier, adding that perhaps it's time for government to create the regulatory environments that protect us vassals. 'Otherwise, we really are just serfs.'"
Education

Cyber Corps Program Trains Spies For the Digital Age, In Oklahoma 118

David Hume writes "The Los Angeles Times has a story about the two-year University of Tulsa Cyber Corps Program. About '85% of the 260 graduates since 2003 have gone to the NSA, which students call "the fraternity," or the CIA, which they call "the sorority."' 'Other graduates have taken positions with the FBI, NASA and the Department of Homeland Security.' According to the University of Tulsa website, two programs — the National Science Foundation's Federal Cyber Service: Scholarship for Service and the Department of Defense's (DOD's) Information Assurance Scholarship Program — provide scholarships to Cyber Corps students."
Security

Blizzard Sued Over Battle.net Authentication 217

An anonymous reader writes "A man has initiated a class-action suit against Blizzard over a product used to shore up Battle.net security. Benjamin Bell alleges that Blizzard's sale of Authenticators — devices that enable basic two-tier authentication — represents deceptive and unfair additional costs to their basic games. (Blizzard sells the key fob versions for $6.50, and provides a free mobile app as an alternative. Neither are mandatory.) The complaint accuses Blizzard of making $26 million in Authenticator sales. In response, Blizzard made a statement refuting some of the complaint's claims and voicing their intention to 'vigorously defend' themselves."
Programming

Ask Slashdot: How To Avoid Working With Awful Legacy Code? 360

kramer2718 writes "I have worked for about a decade as a software engineer. I am almost never hired to build new software from scratch, so my work satisfaction tends to be proportionate to quality of the legacy code I have to work with. Some legacy code has been good. Most of it is bad. I know a few questions to ask during an interview to determine the code quality: Are recent technologies used? Are there code review processes? Is TDD practiced? Even so, I still encounter terrible quality code. Does Slashdot have any advice for other questions to ask? Any other ways to find out code quality beforehand?"
Books

Book Review: Drush User's Guide 36

Michael Ross writes "With the advent of graphical user interfaces (GUIs) decades ago, most of the commercially-available software transitioned from command-line usage to point-and-click interfaces, with the majority of these applications completely phasing out all command-line capabilities, or never implementing them in the first place. But for programmers — most of whom are comfortable working on the command line — performing administrative actions within a GUI can become tedious and time-consuming, and there is a growing movement toward adding command-line support back to software development applications. An example of this is Drush, which is a command-line interface for the Drupal content management system. Drush, whose name is derived from "Drupal shell," was originally developed six years ago, and is seeing a resurgence within the Drupal community. However, what appears to be the primary information resource for Drush, the community documentation, currently has a status of "incomplete." Fortunately, there is now a book available that provides more extensive coverage, Drush User's Guide, authored by Requena Juan Pablo Novillo ("juampy"). The book was released by Packt Publishing on 10 April 2012, under the ISBN 978-1849517980. The publisher's page offers descriptions of the book, its table of contents, a brief author biography, the known errata, the example code used in the book, and a free sample chapter (the third one, "Customizing Drush"). This review is based upon a print copy kindly furnished by the publisher; an e-book version is also available." Read below for the rest of Michael's review.
Slashdot.org

A Day in Your Life, Fifteen Years From Now 687

Fifteen years from now, your alarm goes off at 7:30 AM, pulling you out of a dead sleep. You roll over, grumbling a command, and the alarm obediently shuts up. You drift off again, but ten minutes later the alarm returns, more insistent. It won't be so easily pacified this time; the loose sensory netting inside your pillow will keep the noise going until it detects alpha waves in drastically higher numbers than theta waves. Or until it gets the automated password from the shower. Sighing, you roll out of bed, pull your Computing ID (CID) card from the alarm unit, and stumble out of the bedroom. Pausing briefly to drop your CID into your desktop computer, you make your way to the shower and begin washing. Your alarm triggered the shower's heating unit, so the water comes out at a pleasant 108 degrees, exactly your preference. (42 degrees, you remind yourself — the transition to metric still isn't second nature, after almost two full years.) You wash quickly to avoid exceeding your water quota, and step out refreshed, ready to meet the day. (Read on for more.)
Bug

Spreadsheet Blamed For UK Rail Bid Fiasco 125

First time accepted submitter Bruce66423 writes "As a sometime computer programmer who was always very sniffy about the quality of the stuff being knocked up by amateurs aka power users, the current claim that it was a messed up spreadsheet that caused a multi-million pound fiasco is very satisfying. 'The key mechanism... mixed up real and inflated financial figures and contained elements of double counting.'"
Facebook

Your Facebook Likes Conveyed As Simulated Hugs 40

mikejuk writes "Next time you're dreaming up ways to make the users of your apps feel loved and wanted, think a little more wildly. How about giving them an actual hug? That's what MIT researchers Melissa Chow and her colleagues Andy Payne and Phil Seaton at MIT have come up with — a jacket that hugs the wearer when one of their friends 'likes' one of their posts on Facebook. The Like-A-Hug vest is described as receiving a signal when a Facebook friend 'likes' a post, then fills with air to give the wearer the sensation of being hugged."
Technology

Ask Slashdot: Hacking Urban Noise? 474

b1tbkt writes "I live at the corner of one of the busiest intersections in my city (pop. 350k). Although I've replaced all windows, insulated, and caulked every square inch of the place, the fire trucks and cars with obnoxious stereos still regularly intrude on my home office. Most of the noise comes in through the windows. I'm considering mounting an oblong parabolic reflector in the ceiling above the windows with a steady feed of white or brownian noise directed into it (e.g., via a small speaker placed within the reflector) to create a 'wall' of sound that would act as a buffer to the outside world. Active noise cancellation would be nice, too, but that's probably more than I want to take on. I don't see any products on the market for this sort of thing. Does anyone have any experiences to share with similar homebrew noise remediation efforts?"
Businesses

Are Commercial Games Finally Going To Make It To Linux? 242

colinneagle writes "Those of us who actively promote Linux as a viable desktop alternative to Windows are often greeted with the following refrain: 'Nobody will use Linux because there are no good games.' The prevailing wisdom is that the abundance of high-quality, commercial video gaming is a key factor in the market-share dominance that Microsoft Windows enjoys. And, in all reality, this is somewhat true. So, then, the obvious course of action is to convince the video game publishers and developers of the world that Linux is a viable (if, perhaps, a bit niche) market. And by 'viable' I mean one thing and one thing only – 'profitable.'Luckily, there have been three high-profile recent examples of Linux users going absolutely nuts over video games, forking over their hard-earned cash in the process: the Humble Indie Bundle (drawing in huge numbers of sales — for a DRM-free product, no less — with sales numbers by Linux users consistently beating out sales to MacOS X users); Canonical's Ubuntu Software Center (where video games make up the top 10 paid software packages); Valve's announcement that it is bringing the Steam store, and community portal, to Linux desktop (specifically Ubuntu). Will the indie game developers (along with Valve) reap the bulk of the rewards that releasing games on Linux is offering...or will some of the big publishers realize what they're missing out on and join in the fun?"
The Courts

Zynga Sues EA For 'Anti-competitive' Practices 116

An anonymous reader writes "In early August, Electronic Arts sued Zynga for allegedly copying EA's Sims Social game. Zynga has now launched a counterattack, suing EA for 'anticompetitive and unlawful business practices, including legal threats and demands for no-hire agreements.' The company also accuses EA of copying a Zynga game called YoVille. Zynga has also demanded a jury trial to settle EA's claims."
Programming

How To Deal With 200k Lines of Spaghetti Code 236

An anonymous reader writes "An article at Ars recaps a discussion from Stack Exchange about a software engineer who had the misfortune to inherit 200k lines of 'spaghetti code' cobbled together over the course of 10-20 years. A lengthy and detailed response walks through how best to proceed at development triage in the face of limited time and developer-power. From the article: 'Rigidity is (often) good. This is a controversial opinion, as rigidity is often seen as a force working against you. It's true for some phases of some projects. But once you see it as a structural support, a framework that takes away the guesswork, it greatly reduces the amount of wasted time and effort. Make it work for you, not against you. Rigidity = Process / Procedure. Software development needs good processes and procedures for exactly the same reasons that chemical plants or factories have manuals, procedures, drills, and emergency guidelines: preventing bad outcomes, increasing predictability, maximizing productivity... Rigidity comes in moderation, though!'"
Microsoft

What If There Was a Microsoft Appreciation Day? 362

theodp writes "In 2005, Microsoft came under fire after withdrawing support for an anti-gay-discrimination bill. 'I don't want the company to be in the position of appearing to dismiss the deeply-held beliefs of any employee, by picking sides on social policy issues,' explained CEO Steve Ballmer. That was then. Microsoft — like Google and Amazon — has since very publicly declared its support for gay-marriage legislation, which means it — unlike Chick-fil-A — needn't worry about the 'deeply-held beliefs of any employee' causing it to be blocked from doing business by the mayors of Boston, Chicago, and San Francisco. I guess we'll never know what Microsoft versions of 'Chick-fil-A Appreciation Day' or 'National Same-Sex Kiss Day' would have looked like."
Privacy

Ask Slashdot: How To Clean Up My Work Computer Before I Leave? 547

An anonymous reader writes "I'm leaving my current job for a new one. I've been at this job for 10+ years so I'm sure there is tons of personal stuff stored on my machine. Since I can't take it with me does any one have a suggestions of tools or practices to clean off all of that data. I've already got my personal documents and files. I'm most worried about CC, debit card numbers and web site passwords I've used in browsers. Does clearing the cache, cookies, temp files do a good enough job? BTW it's a Windows 7 system if that makes a difference."
Idle

"Exploding" Termite Species Discovered 158

ananyo writes "A species of termite found in the rainforests of French Guiana takes altruism seriously: aged workers grow sacks of toxic blue liquid that they explode onto their enemies in an act of suicidal self-sacrifice to help their colonies. The 'explosive backpacks' of Neocapritermes taracua grow throughout the lifetimes of the worker termites, filling with blue crystals secreted by a pair of glands on the insects' abdomens. Older workers carry the largest and most toxic backpacks. Those individuals also, not coincidentally, are the least able to forage and tend for the colony: their mandibles become dull and worn as the termites age, because they cannot be sharpened by moulting (abstract)."

Slashdot Top Deals

Ya'll hear about the geometer who went to the beach to catch some rays and became a tangent ?

Working...