Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Great (Score 5, Informative) 222

Actually the US did conduct such tests back in the 70's and 80's. Look up the LOCA (Loss Of Coolent Accident) test program done by the NRC. If memory serves, they scaled it up to 10% reactor capacity. Note: I believe these were what was assumed to be worse case accidents: reactor going full power and suffering a double gullotine cooling pipe failure. I don't know if they ever tested a reactor that has been SCRAM'ed, but still generating heat from short lived isotopes. That is what happened in Japan.

Comment Re:From a comment there (Score 1) 341

If you have a large place, go with WPA2-Enterprise instead of WPA2-PSK. In enterprise mode, there is no PSK. Every client gets their own PMK when they authenticate. Granted, it assumes all users have ids and passwords, but that should be the case for any large installation. Some clients will have problems when the user password changes. You may need to delete the WLAN entry and then let it be discovered again.

Comment Re:From a comment there (Score 1) 341

From what I remember, PMK is all that is needed for WPA2. I don't have my SANS617 books handy, but from what recall, the PMK is built from the SSID, length SSID, AP MAC, Client MAC and PSK and then hashed 4096 times to deter dictionary attacks. On connection request, the PTK is built from the PMK, AP nonce and client nonce.

Comment You need the plaintext password (Score 1) 341

If you are using the WPA with PSK (Pre Shared Key), you need the plain text pre shared key to generate the PMK (Pairwise Master Key). Once you have the PMK, you really don't need the pre shared key. But if you change the access point or change the NIC on your machine you will need it to generate the PMK over again. If you are concerned, go to WPA enterprise mode with the Radius challenge response.

Speaking of PSK security, you are using the mimimal PSK length of 20 (or was it 22?) characters to ensure security, right?

Comment How to collect (Score 2) 509

Gee, if we could put permanent police in every home in the USA we would reduce crime, but I think there is something unconstitutional about that. There are many options:
  • You have a list of suspects, tap those. And those around them, And maybe those around them. A heck of a lot less intrusive than taping the planet.
  • Pay the telecom people to store the data, and only get the data with a court order. This is similar to how the armed forces pay the airlines to have planes capable of being used by the military in a surge role, but normally run by the airlines.
  • Establish an outside entity. Outside entity will take real phone numbers and give back a unique hash. Telephone companies will send meta data to NSA, but will substitute these hash values for all telephone numbers. On court order, the outside entity will say "john terrorist has has 3141592". NSA will then do the proper searches, and say "we need the user for hash 12345, the outside firm will say its King Roland (spaceballs)". In this way, no single entity is able to abuse the system. They could collude, but it sets the bar higher.

Now, will any of these solve the problem? No. Will it make everyone happy? No. Like always, security, like liberty. is a compromise.

Comment Re:Which signal? (Score 1) 180

From memory, all the satellites are in the same orbital inclination, so shifting the apparent constellation in time could work. However, I am not a GPS expert, so there may be other factors at stake. Also, there is a simple counter measure, at least for planes and missiles: shield the antenna from receiving from the ground.

Comment Re:Hold tech companies' feet to fire about H1-Bs (Score 1) 694

You don't actually have any business skills, do you?

To be honest, no, my expertise is technical, computer and information security.

So what you are suggesting is that as business owner, I should spend thousands of dollars training people (during which time they generate no income) in the hopes that a few of them will stay with me long enough to recoup the cost of training

Thousands of dollars? Lets take the examples I gave. If you are an expert with Oracle, you can probably pick up MSSQL without too much trouble. If you are an expert with one version of Exchange, you can probably pick up another version without too much difficulty. As a perspective employee, t would be dishonest to say I had the experience. If there were a human with a technical background, they should know this. But if it is someone in HR using a pattern matching program, how are they supposed to know this?

-- When the reality is that many of them will take the training and leave, and many of them will turn out to be poor employees anyway. And I'm sure you are dead set against me passing those higher costs on to YOU, upon which time you'll declare me evil and greedy....

I hope your not lumping me into those Occupy people who believe the world owes them everything on a plate. Actually I *DO* pass the cost to myself. *I* paid for my CISSP certification. *I* paid for several high end technical training courses. And I still had problems getting call backs.

Slashdot Top Deals

After the last of 16 mounting screws has been removed from an access cover, it will be discovered that the wrong access cover has been removed.

Working...