Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment "infiltrated and perpetrators persecuted.[37]" (Score 1) 388

from the NATO document: http://www.nato-pa.int/default.asp?SHORTCUT=2443

[37] Reducing Systemic Cybersecurity Risk, OECD/IFP Project on “Future Global Shocks”. ”. By Peter Sommer and Ian Brown. January 2011.

“Reducing Systemic Cybersecurity Risk”

http://www.oecd.org/dataoecd/57/44/46889922.pdf

I think the NATO paragraph is supposed to paraphrase this quote on p32:

"The main practical limitations to hacktivism are that the longer the attack persists the more likely it is that counter-measures are developed and put in place, perpetrators identified, and groups penetrated by law enforcement investigators."

Comment if you REALLY want CS emulate an HS that offers CS (Score 1) 364

Comment Speaking of RHEL clone... (Score 1) 201

just found out a new RHEL clone (thanks to distrowatch.com News 03.21.2011) - PUIAS http://puias.math.ias.edu/ is an RHEL clone "... started long before CentOS or other projects were available."

The question is: if CentOS fizzles for whatever reasons, how many will switch to one of the less than 5, one-man-show RHEL clone, how many will dig in and pay for RHEL, and how many will switch to non-RHEL?

Data Storage

Submission + - How To Preserve Videos Pirated in the 1930s? (npr.org)

cultiv8 writes: "From an interview on NPR:

The Institute of the American Musical in Los Angeles is home to footage collected by one of the earliest pirates —Ray Knight of Jacksonville, Fla. Between 1931 and 1973, Knight would make trips up to Broadway and sneak a 16 mm camera into theaters. He eventually collected footage of over 175 musicals. Knight's family gifted the films — which, in many cases, are the only visual record of many of the earliest musicals — to the Institute of the American Musical when Knight died. But, there's a problem. The institute is a one-person operation that has been housed in a Los Angeles duplex for the past 30 years. The tiny nonprofit is having a hard time finding a way to preserve the Knight films — and the rest of its archives.

How would you recommend they preserve the Knight films?"

Image

IT Worker's Revenge Lands Her In Jail 347

aesoteric writes "A 30-year-old IT worker at a Florida-based health centre was this week sentenced to 19 months in a US federal prison for hacking, and then locking, her former employer's IT systems. Four days after being fired from the Suncoast Community Health Centers' for insubordination, Patricia Marie Fowler exacter her revenge by hacking the centre's systems, deleting files, changing passwords, removing access to infrastructure systems, and tampering with pay and accrued leave rates of staff."
Oracle

RIP, SunSolve 100

Kymermosst writes "Today marks the last day that SunSolve will be available. Oracle sent the final pre-deployment details today for the retirement of SunSolve and the transition to its replacement, My Oracle Support Release 5.2, which begins tomorrow. People who work with Sun's hardware and software have long used SunSolve as a central location for specifications, patches, and documentation."

Comment miniscule Man in the Middle attack (Score 4, Informative) 251

A link http://www.networkworld.com/community/blog/newest-attack-your-credit-card-atm-shims?t51hb&hpg1=mp in the original story, entitled "Newest Attack on your Credit Card: ATM Shims" has some interesting information:

"The shim needs to be extremely thin and flexible. In fact it must be less than 0.1mm"

"The shim is inserted using a "carrier card" that holds the shim, inserts it into the card slot and locks it into place on the internal reader contacts."

"Once inserted, the shim is not visible from the outside of the machine. The shim then performs a man-in-the-middle attack between an inserted credit card and the circuit board of the ATM machine."

"flexible shims are recently being mass produced and widely used in certain parts of Europe"

"Diebold released five new anit-skimming protection levels for its ATM devices june 1st 2010...Unfortunately, none of these helps with the shim skimming attack. That problem has yet to be solved mechanically yet."

Television

MythTV 0.23 Released 214

An anonymous reader writes "After six months of our new accelerated development schedule, MythTV 0.23 is now available. MythTV 0.23 brings a new event system, brand new Python bindings, the beta MythNetvision Internet video plugin, new audio code and surround sound upmixer, several new themes (Arclight and Childish), a greatly improved H.264 decoder, and fixes for analog scanning, among many others. Work towards MythTV 0.24 is in full swing, and has be progressing very well for the last several months. If all goes according to plan, MythTV 0.24 will bring a new MythUI OSD, a nearly rewritten audio subsystem capable of handling 24- and 32-bit audio and up to 8 channels of output, Blu-ray disc and disc structure playback, and various other performance, usability, and flexibility improvements."
Privacy

Lower Merion School's Report Says IT Dept. Did It, But Didn't Inhale 232

PSandusky writes "A report issued by the Lower Merion School District's chosen law firm blames the district's IT department for the laptop webcam spying scandal. In particular, the report mentions lax IT policies and record-keeping as major problems that enabled the spying. Despite thousands of e-mails and images to the contrary, the report also maintains that no proof exists that anyone in IT viewed images captured by the webcams."

Slashdot Top Deals

"Gravitation cannot be held responsible for people falling in love." -- Albert Einstein

Working...