Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Comment Re:More money... (Score 1) 123

I've found that the combination of a PC and a Wii serves my gaming needs excellently. The Wii has an excellent set of casual games (Wii Sports, Wii Fit, Mario Kart, Super Smash Bros, etc) that I can pick up and play with my gf whenever we have a few minutes to kill. The PC is great for serious gaming. A keyboard and mouse are, IMO, the best input controllers ever and the graphics on a mid-range gaming PC beat those on a 360 or PS3. I also like the fact that my games are all $50 (and not $60) new at retail.

Of course, everyone is different and I do miss out on a few 360 and PS3 exclusives, but nothing has come out for either system that has been that compelling for me.

I think when people say the Wii has "no good games", they mean it doesn't have good games like GTA, CoD, WoW, and other TLAs. But it has a ton of quick and fun, easy to learn, easy to play games that are great to play with friends, coworkers, kids, gf's, non-gamers etc.

Comment Re:Hmm (Score 1) 370

Firewalls are capable of providing all of the positive benefits of NAT (transient traffic flow approval instead of mapping for example, blocking traffic not originated from the LAN, etc) save obfuscating the source address. Obfuscating the source address isn't particularly relevant from an attack perspective given that the entire LAN is still protected by the same Firewall process, NAT or not.

For example: you could NAT your LAN in 192.168.10.x space behind IP 1.2.3.4 .. you connect to shady.com port 80 sport 192.168.10.101:2000, NAT/firewall allocates 1.2.3.4:3000 for you. Shady sees all the traffic coming from 1.2.3.4:3000, but has no way (short of client-side malware) to know that maps to 192.168.10.101; nor can Shady care since all access to 192.168.10.101 is mediated by 1.2.3.4. Shady.com might try to port scan 1.2.3.4, and see any port forwards your entire LAN uses in one swoop, try to exploit them if possible. Moral: make sure you know what you are doing when you port forward.

Or, if you use IPv6 for your LAN, let's say you are allocated 1:2:3::/112. No need to NAT it, so you just firewall behind your gateway, let's say 1:2:3::4. You connect to shady.com port 80, sport [1:2:3::101]:2000. Firewall doesn't have to allocate a damned thing for you, but instead records the flow for [1:2:3::101]:2000 shady.com:80 as established from within the LAN and thus authorized. Shady sees all the traffic coming from [1:2:3::101]:2000, but it's not relevant since all access to 1:2:3::101 is still mediated by the firewall at gateway 1:2:3::4. Shady.com can port scan 1:2:3::101 if it likes, but won't see any open ports if you only allow LAN established traffic, or else sees your whitelisted ports for that IP only (instead of your entire LAN). Just like the IPv4/NAT scenario, keep your open ports secure.

As you can see, source IP obfuscation provides no meaningful advantage to the end user in this scenario. If anything, IPv6 users who feel like they want to use NAT could have the firewall choose random source addresses as well as random source ports out of their /112, and hide their 3 LAN devices within a pool of 65 thousand addresses. Would that not confuse a would-be attacker?

Still, the major drawback to be avoided with NAT is in breaking the globally unique address space and complicating inbound connection access, which will become a growing part of popular network policy over the next few decades. One thing Bit Torrent teaches us is that "the server" will less and less frequently have resources comparable to the "client swarm", so crowdsourcing the heavy lifting (from distribution to content creation to editing to caching) becomes vital to any scaling strategy worth it's salt. The hub/spoke communication model is slowly eroding in the presence of more sophisticated, decentralized many-to-many connection models.

NAT reduces a peer to a "consumer" which can only fetch data, but never re-offer it without convoluted port forwarding messes. Entire LAN's are limited to one named service per outbound IP, unless one wishes to screw with what port they offer services on, further complicating the job for other firewalls and participants of the content network.

You'll know what I mean if you've ever tried to configure mobile SIP access. Half the time you are behind a NAT, and you'll never know in advance if it's full cone, symmetric, or just somehow pathological. Sometimes you are nested within multiple NATs which each behave differently!

Some legacy UDP protocols I've worked with need to make connections to thousands of remote IP addresses at multiple, highly transient port mappings which bring NAT mapping tables to their knees. In a firewall-only environment, it's easy to whitelist access to swaths of ports for clients and then the gateway need not maintain tables for related traffic, but can continue to protect unrelated ports unlike with SOHO DMZ.

To sum up, NAT is not only a bandaid, but it's already pulling at our short-hairs.

Comment Vote 'em Out (Score 1) 198

Members of parliament need to be reminded that they work for us, not Big Media Corp. They need to be reminded that their job security depends heavily on our support, not the support of a corporate lobby group - especially a FOREIGN lobby group. Members of parliament need to become aware that serving the interests of the people whom they represent is their number one priority and serving the interests of lobby groups can come somewhere much further down on that list. They need to be reminded in the simplest and best way possible - they need to be informed that, if they fail to represent the best interests of the people, the people will replace them with someone who understands their role better. They need to be reminded that Big Media Corp might be represented by a large and powerful lobby group but "the population at large" is a much large, much more powerful lobby group and we, as the population at large", are willing to flex our muscles if we aren't being represented properly.

Write to your member of parliament. Vote smart.
Handhelds

Submission + - TI-83 Plus 512-bit RSA Key Cracked

Cubeman writes: "The 512-bit RSA key protecting the operating system of TI-83 Plus and TI-84 Plus calculators has been cracked! Benjamin Moody posted the factorization yesterday, and it has been verified by Brandon Wilson. With the RSA key broken, developers can now release cryptographically signed third-party OSes which will validate on any unmodified calculator. While TI's security protections have previously been broken, all prior hacks required loading an extra program on each calculator. This broken OS key means that the last frontier of TI hacking has finally been achieved. Calculator programmers now have complete control over every area of the calculator and can write any code in any form, even entire operating systems, and distribute them freely on any 83+/84+ calculator in existence. ticalc.org has an article about this as well."
Handhelds

Submission + - TI-83 Plus 512-bit RSA Key Cracked

Cubeman writes: "The 512-bit RSA key protecting the operating system of TI-83 Plus and TI-84 Plus calculators has been cracked! Benjamin Moody posted the factorization yesterday, and it has been verified by Brandon Wilson. With the RSA key broken, developers can now release cryptographically signed third-party OSes which will validate on any unmodified calculator. While TI's security protections have previously been broken, all prior hacks required loading an extra program on each calculator. This broken OS key means that the last frontier of TI hacking has finally been achieved. Calculator programmers now have complete control over every area of the calculator and can write any code in any form, even entire operating systems, and distribute them freely on any 83+/84+ calculator in existence. ticalc.org has an article about this as well."
Biotech

Adult Brains More Flexible Than Previously Thought 123

stemceller passed us a link to the official site for Johns Hopkins, which is reporting on some research into cognition. Generally, doctors have understood our best learning to be done at a young age, when the brain has a 'robust flexibility'. As we get older, our brain cells become 'hard-wired' along certain paths and don't move much - if at all. Or, at least, that was the understanding. Research headed by the hospital's Dr. Linden has taken advantage of 'two-photon microscopy', a new technique, to get a new picture inside a mouse's head. "They examined neurons that extend fibers (called axons) to send signals to a brain region called the cerebellum, which helps coordinate movements and sensory information. Like a growing tree, these axons have a primary trunk that runs upward and several smaller branches that sprout out to the sides. But while the main trunk was firmly connected to other target neurons in the cerebellum, stationary as adult axons are generally thought to be, 'the side branches swayed like kite tails in the wind,' says Linden. Over the course of a few hours, individual side branches would elongate, retract and morph in a highly dynamic fashion. These side branches also failed to make conventional connections, or synapses, with adjacent neurons. Furthermore, when a drug was given that produced strong electrical currents in the axons, the motion of the side branches stalled.'"
Censorship

MMO Bans Men Playing As Women 616

jkcity writes "In a bizarre move Aurora Technology the owners of the King of the World MMORPG has taken the unusual step of banning men who play women characters but the ban itself does not stretch to women playing men. If you want to play as a woman now in game you have to prove you are a women via web cam. This is something that people ask for in many mmorpgs I myself have seen people say people who play women in EVE online as being some kind of degenerate but how long can a policy of verification by web cam last since its so easy to get around it doesn't seem to solve much and is an insult to many."

The Twists of History and DNA 337

An anonymous reader writes "The New York Times has a piece today talking about the possible connection between genetic evolution and history." From the article: "Trying to explain cultural traits is, of course, a sensitive issue. The descriptions of national character common in the works of 19th-century historians were based on little more than prejudice. Together with unfounded notions of racial superiority they lent support to disastrous policies. But like phrenology, a wrong idea that held a basic truth (the brain's functions are indeed localized), the concept of national character could turn out to be not entirely baseless, at least when applied to societies shaped by specific evolutionary pressures."

Comment Re:OS2? (Score 1) 609

Virtual memory works in pages. You can have stuff at 1 GB *address* (not 1 GB of data) without having the preceding ~990 MB. It would be stupid to fill RAM and/or virtual memory with all the unused space.

Slashdot Top Deals

A morsel of genuine history is a thing so rare as to be always valuable. -- Thomas Jefferson

Working...