Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Perspectives (Score 2) 782

For my Company, we're looking for patterns indicative of SSNs, credit card numbers, and certain keywords such as "confidential", "proprietary", or other keywords that refer to sensitive internal projects or other sensitive company information.

And Googling for information isn't "data leakage", because your activity is bringing information INTO the company (from the results of your Google search) so we don't care a lot about that.

Comment Re:Perspectives (Score 1) 782

SSH can't be proxied like SSL traffic. The reason SSL traffic works is precisely because of the existence of a wildcard certificate issued from a Trusted Root CA. (I also manage our PKI too).

But SSH — as a matter of good practice — should be heavily restricted. In other words, good security policy dictates you don't let anyone on your network blithely open up an outgoing SSH connection to any host on the Internet.

Comment Perspectives (Score 5, Informative) 782

Considering that I actually do this (Internet filtering) for a living for a medium-sized company let me tell you why we do it.

Data leakage.

We're concerned about an employee either accidentally or maliciously transferring customer data or other sensitive data to an unauthorized party.

We're also acutely aware of the liabilities and sensitivities imposed by us breaking the SSL channel, inspecting the payload, and then re-encrypting it on our employees behalf, which is why we go out of the way NOT to break the chain for sites that are healthcare or financial related.

But your Gmail is fair game.

Comment With TPB posted a compendium of published promos (Score 4, Interesting) 124

I understand Promo Bay requests submitters list the top 3 countries, presumably for geo-targeting, but I wish the TPB folks would at least put up a web page that lists ALL of the published promos from every country.

I love discovering new music, and love listening to music from all over the World. I'd hate to not discover some awesome music from say Gabon or Tanzania or India because the submitter didn't put USA as one of the Countries.

Comment Data Breach (Score 5, Insightful) 385

Technically it qualifies as a Data Breach Incident. Depending on the industry the original drive belonged to shit could hit the fan.

The fault lies entirely with the original owner for not wiping the hard drive before returning the equipment. NewEgg is ot in the data wiping business.

Of course the easiest thing for you to do would simply be to repartition it and reformat it.

Comment There are flaws alright. (Score 4, Insightful) 181

Flaw #1 - Using YouTube to distribute your video. There ARE alternatives now.

Flaw #2 - Not suing UMG in Small Claims Court for damages. You want Small Claims since Universal would expressly be prohibited from using any lawyers.

If enough people who've had their videos taken down erroneously sue UMG in small claims court you'll literally bankrupt them.

Slashdot Top Deals

"More software projects have gone awry for lack of calendar time than for all other causes combined." -- Fred Brooks, Jr., _The Mythical Man Month_

Working...