Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Comment Re:but it was false anyway? (Score 1) 145

I think you have put it very well.

If someone wants to sound off on t'interwebs then surely they must do so within libel laws.

So in the case of the Bridezilla, if it was that important to a potential plaintiff, then a sub note to those postings noting a finding of libel would be the fair approach.

Publish and be damned - if you are a Twatter, /.er or whatever, there is a good chance that your First Amendment protected free speech can also be looked at from a libel perspective.

Now this simply raises the question that as it is much easier to "publish" to a potentially huge audience nowadays, should it also not also be simpler to sue for libel?

Then throw in multiple jurisdictions 'n' sets of laws to make it all properly complicated. For example, I couldn't give a monkeys about a First Amendment set of rights - there isn't one in the UKoGB!

Comment Encryption not much use against SQL injection (Score 2) 73

The linked article mentions only that the law requires that data be held encrypted. That is not much use in this case where a SQL attack was used.

Does anyone know whether the law requires a certain standard for the front ends to the data. I'm pretty sure that PCI DSS - as another applicable standard - defines no such thing either.

Comment Re:Oh wow. (Score 1) 642

I have to agree with you in part. I live in the UKoGB.

I hate driving along the M42 which runs east/west, south of Birmingham (Staffordshire, not Alabama!) it must be the most filmed piece of road in the world. There are surveillance cameras around every half a mile or less. It feels like someone is staring at you all the time. Our town centres are full of cameras but they is not quite so in your face as the M42 unless you look up.

However, a saying involving glass houses and stones comes to mind.

If you wish to claim some form of superiority in the media freedom stakes then I have to paraphrase a few comments made by my future daughter in law who comes from Florida:

- Your TV is so much less restricted than ours
- We would never get swearing or nudity like that on our TV

We are not more uptight about sex than the USoA. This is about internet porn having the brown paper wrapper put over it, which is what happens to girlie mags nowadays. In the past they used to be merely put on the top shelf.

I am uneasy about any form of censorship but perhaps the media on the internet has to be treated like any other media distribution channel. Here our govt is attempting to do the right thing.

Yes it is a "wont someone think of the children" job but it seems nearly the correct approach.

Unfortunately unlike buying a copy of Penthouse (porn) in WH Smiths (news agents), the fact that you have opted in to online porn will be recorded somewhere and some of our other rather amusing laws (RIPA et al) can be used to get at that information.


Comment Re:Figures (Score 4, Interesting) 124

My ISP (AAISP) actively encourage IPv4 address exhaustion AFAICT.

They gave me a /29 + a /32 for my router for home use and probably would have given me more if I'd asked. At work I asked for a /28 and got a /27.

They also give out a /48 IPv6 subnet to all customers and instructions for use. They can do IPv6 over PPPoA (this is the UKoGB) natively and provide a IPv6 to 4 tunnel broker for those that need it.

Have a look at your Spam Assassin headers and see that quite a lot of marks are not related to IP address. I have found DNSBLs handy up to now but I think I'll accept that as these lose their efficiency during IP version handover my spamds and MTAs will get a bit more of a battering for a while.

Never mind processing power is pretty cheap.

I have a customer with around 16 million unique IPs trying to get in each week - a spambot net of some sort (Russian and Chinese IP feature a lot). An Exim process is being spawned for each connection along with a spamd and possibly clamd session. The box is a dinky Dell single processor server and it barely breaks a sweat.



Carrier Trick To Save IPv4 Could Help Spammers 124

Julie188 writes "As public IPv4 addresses dwindle and carriers roll out IPv6, a new problem has surfaced. We have to move through a gray phase where the only new globally routable addresses we can get are IPv6, but most public content we want to reach is still IPv4. Multiple-layers of NAT will be required to sustain the Internet for that time, perhaps for years. But use of Large Scale NAT (LSN) systems by service providers will cause problems for many applications and one of them is reputation filtering. Many security filtering systems use lists of public IPv4 addresses to identify 'undesirable' hosts on the Internet. As more ISPs deploy LSN systems, the effectiveness of these IPv4 filtering systems will be hurt."

Comment Re:VMWare support? RAM requirements? (Score 3, Informative) 122

There's always pfSense as an alternative to m0n0wall. I run many of those under VMWare.

I chose it for its easy multi external link capabilities, after I gave up on Linux for this and was pleasantly surprised by its ease of use, stability and huge range of features.

It is nearly bullet proof as I discovered when one of a customer's VMFS died. All the other VMs fell over immediately but the pfSense router carried on running without its "hard disc" for two days before I replaced it. Internet access downtime was 2 seconds as I cut it over. Admittedly the web interface vanished but the routing, VPNs, firewall etc carried on running.

As to OWL, its a Linux distro so it will have no problems with being a VM - that's the whole point of virtualization. You might have to select "Linux other (64 bit)" but my many Gentoo's run happily like that

Why on earth should the devs even think about VMWare, HyperV, KVM or whatever - that's your job! Apart from considering making the guest tools pre-packaged what should they be doing? I doubt they care whether you spec your boxen from Dell. HP, IBM or PC World so why should they care whether it is physical or VM?

As to asking about RAM requirements - I'd suggest (without even having looked at it) >=256Mb depending what you do with it. I've no doubt that fact is covered on their web site. If you are using ESXi and not just playing on your home PC then the answer would probably be "who cares, RAM is cheap as chips"

Go on - try it, I might even do the same.


PS You have a 5 digit /.ID. Have you been moonlighting on other OSs for the last 10 years, asking such questions 8)


Over 40% of New Mechanical Turk Jobs Involve Spam 56

An anonymous reader writes "An NYU study reveals that over 40% of the jobs posted by new employers on MTurk are some sort of spam request, such as fake account creation, fraudulent ad clicks, or fake comments, tweets, likes and votes. The study also shows that the bad jobs could be automatically filtered with 95% accuracy, but Amazon is not interested."

Openwall Linux 3.0 — No SUIDs, Anti-Log-Spoofing 122

solardiz writes "Openwall GNU/*/Linux (or Owl for short) version 3.0 is out, marking 10 years of work on the project. Owl is a small, security-enhanced Linux distro for servers, appliances, and virtual appliances. Two curious properties of Owl 3.0: no SUID programs in the default install (yet the system is usable, including password changing); and logging of who sends messages to syslog (thus, a user can't have a log message appear to come, say, from the kernel or sshd). No other distro has these. Other highlights of Owl 3.0: single live+install+source CD, i686 or x86_64, integrated OpenVZ (host and/or guest), 'make iso' & 'make vztemplate' in the included build environment, ext4 by default, xz in tar/rpm/less, 'anti-Debian' key blacklisting in OpenSSH. A full install is under 400 MB, and it can rebuild itself from source."

Comment It only addresses on aspect of the whole (Score 1) 216

It sounds good but it only addresses one security aspect of a system. It runs on top of Java which I seem to recall is blessed with a few bugs - how do they avoid those including all the ones that will appear in future versions.

Then the Java stack sits on top of a OS and that is a massive "attack surface" or whatever is the current bullshit from the consultants (OK that includes me)

Then the OS sits on top of some sort of hardware with its own built in software (BIOS etc) problems.

Then the machine itself has a physical presence which can be subverted in amusing ways.

Then we have the users/devs/sysadmins that constitute another weak link.

Sounds a good idea though and the approach might be made to work down through the system. Perhaps it could be called Trusted Computing or something and would clearly need fronting by a consortium consisting of: AMD/Intel, Dell/HP/IBM,MS and Oracle - the fun loving group we can all trust to "Just Do It Right" (TM).

Comment Five devices (Score 1) 391

>>will be available on a total of five devices in the US

Surely they can aim a little higher than five devices. I've got 14 staff, that's one between three.

I'll have it on Mon, Tue and Wed, you can have it Thu and Fri. Then you can have it for the weekend.

The rest of you sort yourselves out.

Oh, that's right we got bored waiting for it and are quite happy with these shiny HTC things.

Comment Re:Why (Score 2, Insightful) 162

Where one in English might use a series of adjectives plus a noun a German would use a single agglomerative word - what is your problem?

Deutsch is a sufficiently sophisticated language without your assistance.

It doesn't work the same as your native tongue - get a life and stop trolling my forum - twat.

Slashdot Top Deals

If you can count your money, you don't have a billion dollars. -- J. Paul Getty