Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Consumer-grade devices : regulation required (Score 1) 50

For all those saying : just put behind firewall, VPN, install HDs on a server and configure it yourself, .... just remember that this kind of hardware is made for non-IT consumers. They doesn't have our knowledge. They probably don't want to spend too many time configuring it also.

What is needed is a law/regulation (yes I know, I hate to say it) where the penalty is so high that it will cost less to put in place a bunch of quality gates and to hire really competent IT staff than paying the penalty.

IT industry is on a down slope for to many years now (useless complexity, everything must be on the Internet, programming language/framework of the day, "Moving fast and break things" mantra, ...). After 26 years as an IT professional, I'm really sad seeing our industry is a such a bad state. I love IT (I started programming in Assembly/Basic on a Commodore 64 at the age of 12) but I think we need to take a slow down a bit and check the mess we are in.

What's your opinion about this?

Comment Stop horizontal scaling non-sense (Score 1) 86

Unoptimized apps, sub-optimal programming languages, resources waste, ... Stop the "resources (RAM, CPU, ...) are infinite as human stupidity" mantra.

Time to create applications/services with "resource restriction" in mind.. You know like we did before this whole "everything MUST be a Web app". JSON/XML/... as serialization protocol for almost everything...

And don't start me on resources wasted on MY computer : Electron's apps, Windows (if you can't use something else at work by company standards), ...

Comment HTML/JS in emails : what could go wrong! (Score 4, Informative) 24

Issue details from Microsoft site (ref: https://www.microsoft.com/secu... )

Extract:
In the next evolution of the campaign, MSTIC observed NOBELIUM attempting to compromise systems through an HTML file attached to a spear-phishing email. When opened by the targeted user, a JavaScript within the HTML wrote an ISO file to disc and encouraged the target to open it, resulting in the ISO file being mounted much like an external or network drive. From here, a shortcut file (LNK) would execute an accompanying DLL, which would result in Cobalt Strike Beacon executing on the system.

Slashdot Top Deals

The hardest part of climbing the ladder of success is getting through the crowd at the bottom.

Working...