Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Submission + - Any competent hosting companies for e-mail? 2

cpm99352 writes: I've had my domain for 10 years, and the hosting company was doing a pretty good job — all we needed was POP3 e-mail for five accounts. However, as of the past six months, they've gone rapidly downhill. I tried looking at older slashdot submissions, but I see a ton of articles from 2003 and before, which doesn't do me a lot of good.

What I'm looking for is POP3 e-mail, ideally with a secure method of transmitting the userID/password.

Does such a thing exist in the United States? Googling hasn't proved useful, either, since it appears a ton of dubious outfits have gamed the Google search results.

I'm not looking for any discount fly-by-night outfit. I want secure reliable e-mail for a small business. Are there any out there?

For that matter, is there a website to get reasonably unbiased reviews of domain hosting companies?

Submission + - DDOS-in-a-box: VM swarm in a dozen lines of shell (gridcentriclabs.com)

Laxitive writes: We (GridCentric) just posted a couple of interesting videos demoing a load-testing use-case on top of our freely available Xen-based virtualization platform called Copper. In both videos, we use live-cloning of VMs to instantly create a swarm of worker VMs that act as clients to a webapp. The ability to clone is exposed as an API call to the VM that wants to clone itself, meaning that in a dozen lines of shell, we can script the automatic creation and control of dozens of VMs across multiple physical computers.

Creating a clone VM in Copper is similar in function and complexity to forking a process in Unix, and carries all the same assurances: your new VMs are near exact copies of the original VM, start running within seconds of the clone command being invoked, and are "live" — meaning that all programs running on the original VM remain running on the clone VM.

The more we play with it, the more it feels like live-cloning is one of those core capabilities which is at once powerful as well as easy to leverage in designing distributed applications and services. And it seems that today, when cloud is on the top of everyone's mind, is when we should really be having a discussion on what the APIs, architecture, and features of this new class of distributed operating systems should be.

We hope this demo spurs some of that discussion...

Image

Survey Shows That Fox News Makes You Less Informed 1352

A survey of American voters by World Public Opinion shows that Fox News viewers are significantly more misinformed than consumers of news from other sources. One of the most interesting questions was about President Obama's birthplace. 63 percent of Fox viewers believe Obama was not born in the US (or that it is unclear). In 2003 a similar study about the Iraq war showed that Fox viewers were once again less knowledgeable on the subject than average. Let the flame war begin!

Comment brilliant revenge strategy (Score 1) 288

Just when you think something so ridiculous wouldn't work

1. Find a news story which is putting the government on the brink of declaring martial law
2. Issue an anonymous press release claiming responsibility with a ludicrously simple "mistake" which attributes authorship to the target

Then the only way to solve the problem is with a mass "I am Spartacus" defense.

Comment Re:I dunno, man (Score 1) 449

Word processors did a better job than typewriters. Typewriters did a better job than pens. The new technologies improved use over the old ones.

A smart phone is not better at making clear continuous phonecalls than a landline. An ipad is not better at web browsing than a desktop. Neither gadget is a better camera, graphing calculator, alarm clock, dictionary, pen, translator, text input device, audio player, video player, or battery than any of its traditional counterparts.

The only thing going for the gadgets is that they are highly mobile, however there are big trade-offs. It's harder to do just about anything and therefore it encourages the user to be passive in every interaction. It also allows us to be disrupted and disrupt others at any time or place. It also makes it very easy to fragment our attention. A whole generation is growing up taking all this negative conditioning for granted; it's just a way of life.

Security

Submission + - Ransomware: Kidnapped Data Decrypted For Fee (infoworld.com)

snydeq writes: "Ransomware is back. After a hiatus of more than two years, a variant of the GpCode program has again been released, kidnapping victims' data and demanding $120 for its return, InfoWorld reports. 'Like the ransomware programs before it, GpCode encrypts a victim's files and then demands payment for the decryption key. The new version of GpCode — labeled GpCode.AX by security firm Kaspersky — comes with a bit more nastiness than previous attempts. The program overwrites files with the encrypted data, causing total loss of the original data, and uses stronger crypto algorithms — RSA-1024 and AES-256 — to scramble the information.'"

Comment Enabling complacency (Score 1) 321

It's already hard enough to get people around you to take responsibility for getting help in an emergency. SMS is NOT guaranteed delivery. I occasionally receive text messages that were sent to me 4, 6, 9 hours earlier.

911 will follow up on phone calls even if there's no speaking or a hangup.

Here's an idea for people in a situation where they are able to text but not to place a phone call: text someone who can make a phone call and cares enough about your welfare to bother.

The Internet

Submission + - Kidnapping, Theft and Rape Are Not "Cyber" Crimes (circleid.com) 1

netzar writes: CAUSE executive director, Neil Schwartzman, in a post on CircleID urges governments and law enforcement to treat cyber crime as what it really is: 'crime': "When someone is mugged, harassed, kidnapped or raped on a sidewalk, we don't call it 'sidewalk crime' and call for new laws to regulate sidewalks. It is crime, and those who commit crimes are subject to the full force of the law. For too long, people have referred to spam in dismissive terms: just hit delete, some say, or let the filters take care of it. Others — most of us, in fact — refer to phishing, which is the first step in theft of real money from real people and institutions, as 'cyber crime.' It's time for that to stop. ... This isn't just email. This isn't a war. This isn't "cyber." This is crime.

Slashdot Top Deals

Life is difficult because it is non-linear.

Working...