Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Award scholarships for under-aged people (Score 1) 95

"Legal Complications"

If there is legal reasons to not award people under the age of 17 with rewards and such for doing good, then the law is wrong. But then again, this is the "nanny state" where we write laws to protect people from themselves, and in the name of "protecting the children". These laws fix outlying problems at the expense of everyone else.

And remember...this is Germany, where 16 is the legal age for getting a job.

Comment Re:Make payment to parents or guardians (Score 1) 95

Who said anything about a contract? Why would you need one, are there any intellectual property rights on a vulnerabilities/bugs? Does he need to sign the ownership rights over to them so they can collect royalty payments from people who exploit it?

He reported a vulnerability, they acknowledged it exists and that he's reported it to them.

They're not employing him or entering into an ongoing business relationship with him, they need to STFU and give him his money as promised.

Comment Re:Make payment to parents or guardians (Score 1) 95

It seems obvious to me, but if Robert Kugler is too young to receive the award

Is there an age restriction on owning money?

I'll try to remember that the next time I see girl scouts selling cookies.

And I'll notify the authorities immediately if I see any kids mowing the neighbors lawn. It's my moral duty.

Comment Re:Safety? (Score 1) 212

if the VM has a full root account, with a network address on the global network at large, then it has the ability to, for example, run a priviledged NMAP scan on the entire network. Which can expose open ports or vulnerabilities on another machine that can then be used to leverage access.

Try reading the third line of the summary again. The bit where is says "segregated LAN" might interest you...

Comment Re:Safety? (Score 3, Interesting) 212

Unless they take down the network, e.g. running a rogue DHCP server. Or they use it to hack other systems on the network, e.g. password-sniffing the other student's credentials when they log in from their VMs.

So... nothing they couldn't do much easier/more safely by just pulling the network cable out of the physical machine and connecting it to their netbook?

Slashdot Top Deals

The most exciting phrase to hear in science, the one that heralds new discoveries, is not "Eureka!" (I found it!) but "That's funny ..." -- Isaac Asimov

Working...