Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:For the record (Score 2, Interesting) 140

I played EQ for 5 years and I can't for the life of me figure out why I and so many people thought 28 minute spawn timers in L Guk was fun, let alone the Ancient Cyclops or Feathermane. Corpse runs were godawful. I can't see any game recreating that sort of horror and being a success now that WoW has done away with that.

Comment Not entirely surprising (Score 2, Interesting) 98

Having used Sonicwall products in the past, I can believe the results. They weren't the models tested but they were fairly effective for their price and performed well for a fairly small environment (around 100 or so employees). Sourcefire has some nice stuff as well. I'm sure other posters much more experienced with hobbitmon can chime in on the configuration and deployment of that but from what I've seen it was a nice component of home-built threat managers that also had snort and open-source firewalls on them.

Comment Re:I've been watching this for a while (Score 3, Interesting) 144

I agree in principle, but the fact of the matter is that the sites they're choosing to use to spread that information have some of the most godawful security records. If we're relying on Obama's tweets for information, it's going to suck when some staffer gets hit with a worm while checking out some hot chick's profile and the next thing the rest of the world sees is something akin to Russia being outlawed.

Comment Re:A more simple solution... (Score 2, Insightful) 115

I argue differently. SQL injections, XSS attacks, and drive-by exploits are every bit a part of the botnet problem. Firstly, malware needs a place to exist. This is not only on domains stood up with the express purpose of hosting said malware, but on legitimate compromised webservers. Secondly, malware and botnet coders are coming up with as many possible exploits that do not involve user interaction through javascript, browser exploits, and unpatched security vulnerabilities. For the remainder there are intensely sophisticated attacks relying on social engineering and reputation hijacking. It's a lot easier to run code on users machine when the webserver is one the user already trusts and has set in a trusted security zone. The solution to this problem is going to require multinational political agreement. The problem with that is not only is it work, but the countries the criminals reside in have little to no incentive to cooperate. These countries are often poor and have a base of computer science and programming majors with low-paying or no jobs who commit computer crime for the income. It may not be legal, but those people are at least making and spending money making it a heck of a lot more difficult to enlist the host countries help in apprehending them.

Comment Re:Old becomes new (Score 1) 182

You reply just as I'm about to go home! I don't think they're talking about the card verification code. I'm positive they're talking about PINs aquired through PIN input devices, which are most certainly covered under PCI standards. All primary accounts, debit or credit, must be stored and properly protected through the PCI Data Security Standard , and all PIN Entry Devices are covered under the PCI PED Security Requirements. The PCI SSC is going to be testing all HSMs from here on out as well to ensure PINs are cryptographically protected as they should be.

Slashdot Top Deals

We are not a clone.

Working...