Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Networking

Submission + - Least-worst network arrangement?

CPUsInHotPlaces writes: "Dear Slashdotters,

I have the (un)enviable task of running a small (3 laptops) network in a small West African country. We have a (slow) broadband internet connection, which is shared through an ethernet router/ firewall. Two of the laptops can connect directly (via an Ethernet cable) to the router, but the other one, and an additional computer need to be connected from about 40m away, via a different ethernet network (that doesn't have internet access — it's used for sharing a printer). ASCII topology: /-LaptopA
                                              /
THE WORLD — ROUTER / — LaptopB
                                            |
                                            |
    Other network — > |
                                            | — LaptopC
                                            |
                                            | — Foreign Computer D-Z

The additional complication is that while I have admin rights on Laptops A-C, the other computers are virus-ridden, malware-spewing windows boxes (mostly running Windows '98) which I have no control over. However, I have to connect one of them to the internet....(this is non-negotiable for political reasons).

I can make sure that I only connect Laptop C and Foreign Computer D, rather than all 20, using MAC address filtering, but I'm still worried about having them all on the same subnet. I'd like to be able to have some shared disk space (using NFS or Samba), but don't want to expose it to the computers I can't control. I had thought about putting a second route/firewall between the first router and the other network cable, but then Laptop C can't access it either.

So, my options seem to be:
* All one subnet — simple, but then we have an infected computer behind the firewall
* Two subnets — more expense, one of the laptops can't access the shared drive, and it is still on the same subnet as an infected computer

Anyone got any better ideas?

Matt"
Security

Submission + - Protecting the $100 Laptop

celcxo writes: "The $100 laptop designed for the children of the developing world poses challenging computer security problems. These laptops will be widely deployed to children who have no training in computer security or computer use. They will belong to the children, go home with children and be customized by the children. And the laptops will provide Internet access using a new mesh network design that turns the systems into wireless routers, allowing hundreds of children spread across a village to share a single Internet connection. Such a proposal would spell a security nightmare if these laptops were all running a stock copy of Windows, MacOS or even Linux. Hackers could steal a laptop, find a vulnerability and then write a worm to wirelessly hop from laptop to laptop, turning them all into the largest botnet that the world had ever seen. CSO has posted a story describing the security ramifications and noting some of the solutions the designers built into the inexpensive systems."
Movies

Submission + - HD-DVD - Codes on a shirt

futuremanbob writes: Shirtaday is doing a one-day sale of hd-dvd code shirts. The shirt price started at $13.00 but moves down a bit as each shirt is sold. Currently, it's at $9.25. Pretty cool deal for a bit of pop-culture history.
Security

Submission + - VeriSign to Offer Passwords on Bank Card

Billosaur writes: "Imagine the PayPal security tool embedded on a credit card. VeriSign is announcing that a deal is in the works to provide credit cards with one-time use passwords. By placing the technology directly on the card, it becomes more convenient and provides and extra layer of security for on-line credit card transactions. A card-holder would type in their information as normal and then would be prompted to enter the passcode displayed on the card. This means a user would have to have the physical card to use, which would thwart identity thieves who steal credit card information, but do not possess the card itself."

Slashdot Top Deals

"A car is just a big purse on wheels." -- Johanna Reynolds

Working...