Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Re:Nooo ! (Score 1) 440

As far as my mom is concerned, there is no difference between the versions of OS X-- and why new versions of Firefox won't run anymore will baffle her.

If different versions of OS X make no difference to your mom, I doubt newer or older versions of Firefox will.

Wanna run 10.4 for years to come? Fine, just stick with Firefox 3.6 or whatever will be the last Firefox supporting it.

(typing on an iBook G4 with Leopard, and being aware of the fact that it's the last version of OS X that it will run, but might do so for a few more years).

Comment Re:Spammer's delight? (Score 2, Interesting) 248

My ISP does it like this: outbound port 25 is blocked (probably inbound too, never tried) by default, you can use only their SMTP server. But if you need it, you can ask them to open it up for you, explaining shortly why you need it. The whole thing is done online, within their website. They specifically state there that if you're sending spam, they will block it again. Disclaimer: I'm in Europe, but I think such a solution would be legal even under the net neutrality act, and still prevent large amounts of spam from infected PCs. The approach seems right: if a user doesn't know what port 25 is, they probably don't need it. :)

Comment Re:We put an OS in your browser in your OS! (Score 1) 165

The easy one is the 'ssh on 443'. In our environment, we use authenticated proxies to get to the Internet, which also are doing SSL MITM attacks, ie terminating the client's ssl session on the proxy, inspecting the traffic, and then re-encrypting it to send out.

How do you prevent the user from getting an SSL security warning? Or they just know what's going on and have to deal with it...

Slashdot Top Deals

Kiss your keyboard goodbye!

Working...