Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
User Journal

Journal Journal: The Other Side of the Table 6

In recent times I've been fortunate enough to be the one conducting interviews instead of the one being interviewed. It's been an eye-opening experience. The first few times I was very nervous in case I asked a wrong/stupid question. I wouldn't want to put someone off or give a bad impression of the company.

Without wanting to sound conceited or pompous, I have been absolutely astounded at the apparent lack of ability of some candidates.

Put it this way: I'm completely self taught. I have spoken to people who are claiming to have developed software for nearly 20 years in some cases and make a big song and dance about all the hardware they've programmed for, and all the fancy IDEs, static analysis tools, industry standards they've followed etc. and about their wonderful C and C++ skills.

But what really beats me is how anyone can have been coding for longer than a fortnight and not know what an array is, or to have been doing C++ for 15 years and not know about parameterised types.

Privacy

Journal Journal: DARK SIDE OF THE MOON 7

NSA Trigger Words for PRISM:

This is an (admittedly huge) list of words that supposedly cause the NSA to flag you as a potential terrorist if you over-use them in an email.

We found this on Reddit, where James Bamford, a veteran reporter with 30 years experience covering the NSA, is answering questions from the community. This list comes from Reddit user GloriousDawn, who found it on Attrition.org, a site that very closely follows the security industry.

http://attrition.org/misc/keywords.html

Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Privacy, Information Terrorism, Terrorism Defensive Information, defence Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, grey Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, cocaine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assasinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC

The Matrix

Journal Journal: Liquidating Todashev

"APB: At Least Two Missing "Law Enforcement Personnel," Last Seen at Ibragim Todashev Homicide Scene". The 'law enforcement personnel' written out of the story are, of course, the assassination team.

To summarize, the FBI was disturbed by the first interview, as Todashev indicated he knew the brothers were set up. It was thus imperative to:

1. reinterview Todashev to find out what he knew, and more importantly, identify whoever else knew; and
2. liquidate Todashev.

Why didn't they just arrange for a drive-by shooting, or a home invasion/murder? They needed to interview him to find out who else they had to murder, and then immediately liquidate Todashev before he could talk to anyone else. The incompetence of the liquidation was probably caused by Todashev realizing what was going to happen, fighting for his life rather effectively (as he was a trained fighter), resulting in the panicked murder, and a most ludicrous attempt at a cover-up.

http://xymphora.blogspot.com/2013/06/assassination.html

Security

Journal Journal: LuxTrust on Ubuntu 12.04 LTS 3

Intro: I was complaining on social networks that the LuxTrust hardware tokens are forced upon all teachers in my country. That's a huge problem because I got my mother in law on Linux and this thing is very very badly supported. Officially the website say "Ubuntu 10.04" supported. Funnily enough, their website also doesn't mention Windows 8 as supported. Anyway, they're a useless company in my eyes... I wish them the most ill possible.

Here is my little test run:

So, I decided to test the LuxTrust support under Ubuntu GNU/Linux 12.04 LTS i686[1]. I installed a virtual machine from the ISO, and from that blank slate, I wanted to try how "easy" this is. Well, there you go, I downloaded their "middleware".

The good news: Ubuntu Software center presented it as installable and it installed it without apparently problems after clicking the Install. Good! If this were enough, I'd say "it's supported"[2]. Let's test it. So, I go to CCP-Connect, one of the few banks known to work well with LuxTrust under Linux. The thing needs Java[3], and I as expected, and I don't have it installed. I get redirected, at once to http://www.oracle.com/java. The sheer number of options is intimidating. If I weren't very familiar with Java, I wouldn't have a clue what to select. Now, this might be P&T Luxembourg doing it wrong, but the site you should send end-users to is http://www.java.com/. Never send an end-user to a developer site, it's a horrible mistake.

Anyway, I do what is needed and surprise[4], there is no Oracle Java for Ubuntu. A RPM and a tar.gz. Now, if I weren't who I am, I would be blocked again. So, I download the tar.gz and I'll be honest to you, dropped right to the command line, tar zxvf later to /opt, and doing an update-alternatives --install of the new java, oh, and while we're at it, make a symlink for the plugin [5]. Now, of course, I understand it's Oracle whom I have a problem with, but I bet that you won't get this documentation at LuxTrust and they sure as hell can't walk you though this. Of course, the way I did this, I'm now responsible for updating my Java. Of course, there is a PPA, but can I trust that? (I'll have to, if I want automatic updates, but you get the point, no?)

Now, going back to the banking site, it seems to run. I get to the point where I have to select their product and then a screen saying there is no signing stick. (Obviously, I don't have one.)

For kicks 'n giggles, I tried OpenJDK/JRE with the icedtea plugin. No surprise, but that doesn't work: gray pane instead of the applet, but other java applets works fine. So, Oracle Java mandatory. Heck, even Minecraft runs op OpenJDK for crying out loud!

At least their middleware didn't install some kind of daemon, which I what I would have expected with something called "Middleware".
Funny also: The Oracle Java VM warns you from running applets all the time, even the test applet on the java.com site. Scary. Well, not to me, but to a normal end user.

[1] i686 for a good reason, from what I read getting it to run is significantly harder on amd64.
[2] I knew that it wasn't going to work
[3] Wait, isn't that what dependencies are for... Naaaah, dependencies. Who uses that?
[4] Not really, I've been here before
[5] Probably better use update-alternatives for that one too!

United States

Journal Journal: It is certainly not capitalism. 4

"There is no way to vote against corporate power. Citizens have no way to bring about the prosecution of Wall Street bankers and financiers for fraud, military and intelligence officials for torture and war crimes, or security and surveillance officers for human rights abuses. The Federal Reserve is reduced to printing money for banks and financiers and lending it to them at almost zero percent interest; corporate officers then lend it to us at usurious rates as high as 30 percent. I do not know what to call this system. It is certainly not capitalism. Extortion might be a better word. "
http://www.truthdig.com/report/print/rise_up_or_die_20130519/

The Matrix

Journal Journal: Malcolm Shabazz Just Assasinated by Deep State Agents

The rabbit hole goes deeper. What he seaid in the earlier weeks, this year:

"The formula for a public assassination is: the character assassination before the physical assassination; so one has to be made killable before the eyes of the public in order for their eventual murder to then (be) deemed justifiable.

"And when the time arrives for these hits to be carried out, you're not going to see a CIA agent with a suit & tie, and a badge that says 'CIA'.

"What they will do is to out-source to local police departments in the region of their target, and to employ those that look like the target of interest to infiltrate the workings in order to set up the environment for the eventual assassination (character, physical/incarceration, exile) to take place."

http://sjlendman.blogspot.ca/2013/05/malcolm-shabazzs-suspicious-death.html

United States

Journal Journal: The Constitution IS NOT your FRIEND. 24

And the Federalists were fascist bastards.

"By transforming democracy into a concept that encouraged uninhibited wealth accumulation rather than wealth equality, the founding elite (and subsequent generations of elites) tamed what they could not defeat. They turned democracy from a threat into an asset by making it into a concept that supported their own ideals and interests."

http://powerofnarrative.blogspot.com/2011/11/concerning-american-change-in.html

The Matrix

Journal Journal: Katrina Missing Children, The Saudis & Bush 4

"After the tsunami there was great concern that many of the children left without families due to that disaster had disappeared into Asian, Middle Eastern sex trade rings."

http://www.dailykos.com/story/2005/09/22/151046/-Katrina-Missing-Children-The-Saudis-amp-Bush-A-Link

Why bring this up, after 8 years?

http://www.washingtontimes.com/news/2013/may/2/saudi-compound-virginia-investigated-human-traffic/

Slashdot Top Deals

Math is like love -- a simple idea but it can get complicated. -- R. Drabek

Working...