Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - Help! My former employer lies to my new employers! 4

An anonymous reader writes: As a relatively new graduate, I was hired at a small startup software company that produced e-commerce websites. (There are thousands of these companies) I did not have many options for employment, and this was better than flipping burgers. The owners/employers were your typical geek squad type without formal training. They did not believe in a business plan, client/employee contracts, or contacting lawyers. The coding was on par with CS 101, 2nd week and was a string of legal liabilities. I did not expect this company to last long, but the paychecks were not bouncing. I kept looking for new jobs, but I could not find any. Finally, I was released since they could not find any work for me to do.

Here is my problem, the company has not completely failed. I have listed this company on my resume, and I have been unintentionally slandered by the owners. I am positive the owners are not aware of slander, nor do I want to pursue legal action. However, it has cost me at least one job already. How do I list this company on my resume? How would I explain the gap in my employment? I am relatively young, so everyone checks my employment history. What do I do? I just want a job and my mom not to be my landlord/roommate!

I'm posting this as AC because I bet my former employers are reading this post while avoiding clients.
Education

Submission + - What to show 7/8 graders in database research? 6

PeterBVolk writes: Every year a magent school in my german home town sends 7 and 8 graders to our university for a week. I am currently employed as a member as academic staff and this year it is my turn to think of something. They have 3 days to "research" something. On the 5th day they have to hold a presentation and explain a poster they prepared on the 4th day. I've talked with other faculties and they typically do something praktical like "measure the tensile strength" of something. What should I let them do as a database research guy? Everything we do needs to much theoretical background. In the past the CS department didn't realy have any offerings at all for that week. So what do you think could be interesting in the field of databases for 7/8 graders that they can manage in 3 days and hold a presentation on?
Security

Submission + - Latest practical attacks on AES-256 (blogspot.com)

xizhi.zhu writes: "As blogged by Schneier, there is another new attack against AES-256. This new attack can break AES-256 of 9 rounds at the time 2^39, AES-256 of 10 rounds at time 2^45, and AES-256 of 11 rounds at time 2^70. Note that the full AES-256 has 14 rounds. However, this attack requires the cryptanalyst to have access to plain-texts encrypted with multiple keys that are related in a specific way. Also, Schneier suggests AES-128 at 16 rounds, AES-192 at 20 rounds, and AES-256 at 28 rounds."
The Almighty Buck

Submission + - RIAA: Don't Expect DRMed Music To Work Forever (arstechnica.com)

Oracle Goddess writes: "Buying DRMed content, then having that content stop working later is fair writes Steven Metalitz, the lawyer who represents the MPAA, RIAA in a letter to the top legal advisor at the Copyright Office. "We reject the view that copyright owners and their licensees are required to provide consumers with perpetual access to creative works." In other words, if it stops working, too bad. Not surprisingly, Metalitz also strongly opposes any exemption that would allow users to legally strip DRM from content if a store goes dark and takes down its authentication servers."
Security

Submission + - Null Character Hack Allows SSL Spoofing (wired.com) 3

eldavojohn writes: Two researchers, Dan Kaminsky and Moxie Marlinspike, came up with exact same way to fake being a popular website with authentication from a certificate authority. Wired has the details: 'When an attacker who owns his own domain — badguy.com — requests a certificate from the CA, the CA, using contact information from Whois records, sends him an email asking to confirm his ownership of the site. But an attacker can also request a certificate for a subdomain of his site, such as Paypal.com\0.badguy.com, using the null character \0 in the URL. The CA will issue the certificate for a domain like PayPal.com\0.badguy.com because the hacker legitimately owns the root domain badguy.com. Then, due to a flaw found in the way SSL is implemented in many browsers, Firefox and others theoretically can be fooled into reading his certificate as if it were one that came from the authentic PayPal site. Basically when these vulnerable browsers check the domain name contained in the attacker's certificate, they stop reading any characters that follow the "\0 in the name.'

Slashdot Top Deals

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...