Please create an account to participate in the Slashdot moderation system


Forgot your password?

Comment Re:Kill XP? (Score 1) 405

We have many older applications on our systems, that either are not compatible with Win7, even in 'compatibility mode', or would require re-activation with the vendor, which would require either new licenses (send money, please), or is not possible due to the licensing servers no longer being available (Vendor stopped supporting the app). There are no replacement apps for these, either. Also, some of these same older apps that 'shell' out to Internet Explorer will not work with anything above IE6. We fall in the 'not broken, does the job, leave it alone' category.

Comment I have to wonder... (Score 5, Interesting) 462

... just how strong the magnetic field is, for it to affect the hard drive of a computer at any likely distance. It seems like metal objects would be flying through the air and sticking to the floor. Also, I have to wonder how a static magnetic field would affect most phones. Seems there would have to be an alternating field of some sort to do so. Finally, any links to the 'numbers' (field strength, gauss, whatever the proper term is)?

SCADA Problems Too Big To Call 'Bugs,' Says DHS 92

chicksdaddy writes "With the one year anniversary of Stuxnet upon us, a senior cybersecurity official at the Department of Homeland Security says the agency is reevaluating whether it makes sense to warn the public about all of the security failings of industrial control system (ICS) and SCADA software used to control the U.S.'s critical infrastructure. DHS says it is rethinking the conditions under which it will use security advisories from ICS-CERT to warn the public about security issues in ICS products. The changes could recast certain kinds of vulnerabilities as 'design issues' rather than a security holes. No surprise: independent ICS experts like Ralph Langner worry that DHS is ducking responsibility for forcing changes that will secure the software used to run the nation's critical infrastructure. 'This radically cuts the amount of vulnerabilities in the ICS space by roughly 90%, since the vast majority of security "issues" we have are not bugs, but design flaws,' Langner writes on his blog. 'So today everybody has gotten much more secure because so many vulnerabilities just disappeared.'"

Submission + - Aaron Bros rental computers spy on you! (

Kiralan writes: Aaron Brothers installs tracking hardware and software on it's rented computers.
PITTSBURGH – A major furniture rental chain has software on its computers that lets it track the keystrokes, screenshots and even webcam images of customers while they use the devices at home, according to a lawsuit filed Tuesday.

Comment Re:Fuck no (Score 1) 1307

I have to agree with Gorkman. If I can't see what your box does from A to Z, then I am not going to put my neck on the block for the possible HIPPA violation, let alone trying to track a bug caused by incorrect configuration, extra services such as DNS, etc. This doesn't even take the yearly security audit into account, where I have to explain what your box does. 'I don't know' doesn't go very far with them.

Slashdot Top Deals

The universe is an island, surrounded by whatever it is that surrounds universes.