Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Comment Re:Yeah right (Score 1) 326

And how exactly do you plan on portscanning a /64, something as large as the the IPv4 internet would be if every IP address had another internet NATted behind it? The sparse nature of v6 addressing renders dumb scanning moot.

And every home router I've had for the last 8 years has been v6-capable. (Yamaha RT54i, Yamaha RTX1000, NEC BL172HV)

Comment Re:Unless Verizon plans to KEEP IPv6 on... (Score 1) 133

Tell this to the japanese ISPs, most of whom are planning on deploying bind9.7's AAAA-filter (which only returns AAAA records if the recursive dns server gets the query via a v6 connection) for v6-day, which will mitigate most of the interesting breakage scenarios and edge-cases in the name of avoiding customer complaints.

Comment VoIP more reliable than cellular (Score 1) 177

Disclaimer: I work for a VoIP carrier, I was the the process of an eat-our-own-dogfood trial.

On friday the voice/text network was pretty much unusable, but the 3G data network was pretty much business as usual. Between Skype for sending out international SMS on my iphone (Skype, please get going and add this to the android client) and a SIP VoIP client on my android phone I had no problem notifying all my loved ones that I was safe.

I don't know whether I should feel good that VoIP worked so well or that the conventional telephony systems fared so poorly.

Comment Re:tortuous... (Score 2, Informative) 378

Spamhaus doesn't do a whole ISP-level block unless something pretty egregious is happening.

The usual process goes:
1. Complaint to ISP, no response
2. /32 block, more spam, complaint to ISP, no response
3. escalation to block somewhere between /25 and /29 depending on identification of block size, more spam, complaint to ISP, no response
4. escalation to /24, more spam, complaint to ISP, no response
5. escalation to ISP's corporate mail servers - usually something happens at this point when suits notice their own mail getting blocked
6. escalation to ISPs entire allocation

Comment Re:Why? (Score 1) 283

The recommendations have been that end-users get a /64 (a single subnet with 64 bits worth of addresses to work with)

Originally when more subnets were required the recommendations were to allocate a /48 per business customer (65,535 /64 subnets) but that has been since relaxed to /56 (256 subnets) for small businesses.

Comment Re:My experience with Linux kernel (Score 1) 376

I had to write some CPU/Mem stats code to monitor our program in realtime. On Linux It's simple a nightmere. The standard POSIX calls always returns 0. So I need to dig into top code and stated to decode the /proc files.

Could have probably ended the post there. /proc on linux is and always has been a total cesspool.


Skype Trojan Can Log VoIP Conversations 151

Slatterz writes "Security giant Symantec claims to have found the public release of source code for a Trojan that targets Skype users. Trojan.Peskyspy is spyware which records a voice call and stores it as an MP3 file for later transmission. An infected machine will use the software that handles audio processing within a computer and save the call data as an MP3. The file is then sent over the internet to a predefined server where the attacker can listen to the recorded conversations."

Comment Re:There are three points to consider (Score 3, Informative) 250

This is incorrect, you cannot subscribe to a Softbank iPhone plan without the "Packet Full" data option, which is price-capped at about 4400 yen. (Its a sliding scale with both floor/ceiling caps - you have to pay at least 1000 yen and can't get charged over 4400). In practice, every iPhone user pays the 4400 yen price unless all they do is use email.

(Note, tethering is not included in Packet Full)

Comment Re:Is it worth it anymore? (Score 1) 345

When a reasonable percentage of the content is actually used this may be true. However USENET works on a flood-fill mechanism, and (in theory) every site has every article sent to it at least once (and sometimes multiple times and duplicates are tossed depending on the feed type).

When under 0.1% of the content is actually then getting touched by an end-user that bandwidth-savings rapidly turns into a bandwidth money-pit.

Only the Giganewses/largest carriers/etc. have a big enough economy of scale that it might being to make sense.

Slashdot Top Deals

A computer scientist is someone who fixes things that aren't broken.