Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Damn, saw that coming. (Score 1) 55

That's too bad, but I expected it - they announced it, asked for partners, and then it was crickets until they started on the Ubuntu for Phones path.

It's a damn shame, though, I bet it would ROCK on my Note 3, it's so crazily powered - 2.3 gHz quad-core CPU, 3 GB of RAM and 96 GB of storage. I would freaking LOVE to see Ubuntu run natively on this thing to a screen or a lapdock. Same for the new CyanogenMod phone, except it doesn't have MicroSD storage as an option.

Comment Re:It's a pity (Score 1) 161

Consider SpiderOak Backup - they have a package repository for Ubuntu and the "Spideroak Hive" is, I believe, much like the Ubuntu One folder. I use it for backups but it looks to be nicely usable as a One replacement, especially if you're not sharing with other people a lot.

They recently sent me an email that they're offering unlimited storage for $125 a year as well, though I'm not sure how that works in practice.

And, of course, their big claim to fame is that they're zero-knowledge, so no NSA requests, etc etc.

Comment Re:WTF is OneNote? (Score 1) 208

I hate Microsoft with a flaming hot passion, but I'll say this: OneNote is a very cool and under-appreciated program.

One very cool feature I used to use a lot when I was consulting - I often had analysis engagements where I had to spend one or two marathon days interviewing lots of different staff members. OneNote has a feature that allowed me to record audio of the interviews (and only about 10 MB per hour) and would store pointers into the audio as I typed notes into OneNote. Then later, if I had a question about something, a quick double-click of the text in the notes would automatically start the audio playing a configurable number of seconds before I started typing.

It could even do the same thing with video and audio - I brought in my QuickCam Orbit with face tracking one time, and the camera would follow the speaker's face. Just a tad too disconcerting for the interviewee though, I didn't do that very much.

Sadly, this free version doesn't do the above - you still have to buy the full version for that. And somebody told me the free version is licensed such that companies can't use it anyway, so I won't be using this - I run Linux at home.

Comment Re:I got the notice... (Score 2) 137

I read an article on this recently, it appears that Target contacted both those whose name/address/email had been compromised AND those who use their credit card there during the time period using the same email. They should have split the two.

So it's likely that your personal information was compromised, but not your credit card number. Be on the lookout for phishing attempts.

Comment Limiting outbound access to servers is too tough (Score 2) 137

So, time for me to rant, but on-topic, for a second.

Everybody knows, I would hope, that best practice is to never allow an Internet-facing server to initiate outbound traffic. This is both because, should the server get compromised, it becomes a new attack vector - as in Code Red or SQL Slammer. This is also because, as in Target's case, it makes it fairly trivial to exfiltrate stolen data.

But services still persist that require that this very access be enabled. My current case in point: ReCAPTCHA. Google hosts the URL for this service, intended to provide additional security, on a www.google.com URL, which means that, at minimum, I have to allow outbound access from any server hosting a ReCAPTCHA on port 443 to everything Google owns. In practice, of course, it's all but impossible to keep track of Google's address space for firewall purposes, so this means that I have to allow that server out on port 443 to the entire Internet. It's either that, or set up a proxy solution that can do URL filtering and then require the CAPTCHA verification code to use that. Not exactly something your typical smaller company using ReCAPTCHA is apt to do.

I've talked to competing, for-pay, services, and they require the same thing, despite the fact that they're smaller and have only a few, well-defined networks, but they won't commit to keeping me up-to-date with network changes.

We really need to start pushing back on this crap. Servers accepting inbound traffic should never need to initiate outbound communications.

Comment Re:Quintessential classic military sci-fi book? (Score 1) 732

My thoughts exactly. Maybe Ender's Game is considered to be so by people under a certain age, but Starship Troopers is almost certainly THE quintessential classic military sci-fi book.

And I would also argue that The Forever War should be in the list somewhere above Card's book.

Heck, between the RPV's and the children, I'm almost hesitant to even call it a "military" book per se.

Comment Re:Self signed? (Score 2) 276

If the data is that confidential, you should probably look into an actual FIPS-certified network-connected HSM instead of rolling your own.

I did a project a few years back using nCipher NetHSMs (they've since been bought up, I believe) and they were quite cool technology. Even then, I think one of these devices was in the $25K range at most.

The great thing is, if you generate a key pair with one of these, you literally cannot get access to the private key to hand over to the government, even if you wanted to.

Comment Re:Self signed? (Score 4, Informative) 276

Actual answer: no.

The CSR (Certificate Signing Request) contains only the public half of the key, to be signed by the CA's key which results in the CA attesting that the information is verified.

The entity whose key was signed always maintains control of the private key. Which, to me, is the reason that public-key encryption is not "over". The NSA would have to strong-arm every single holder of an SSL key, not just the Certificate Authorities.

Granted, though, those private keys are not often held terribly securely - they're most often just files on a server that aren't even password-protected, because that requires an admin to type in passwords whenever the Web server is restarted. They COULD be held in an HSM, a hardware security module much like a TPM on steroids, but that's very expensive and difficult to set up.

However, none of this means that public-key crypto is broken. It's possible that individual sites could be compromised via this route (Facebook, Google, etc) but as a whole, no.

Comment Re:There is already encryption in HAM band (D-star (Score 1) 371

The hardware isn't from Icom, it's from DVSI and available, at least on paper, to anybody that wants to pony up for a pre-programmed DSP from them. The existence of the DV Dongle from Internet Labs completely disproves your statement.

Now, as I've previously posted, I don't like that it's a proprietary codec that is only implemented in hardware, but that doesn't mean "you need to buy decryption keys [...] from Icom". Let's keep this conversation factual, shall we?

Slashdot Top Deals

If this is a service economy, why is the service so bad?