Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re:Why do Slashdot users continually defend hacker (Score 1) 54

Most of us have come to accept that black hats will never be punished, because on the internet it's very easy to involve multiple unfriendly countries in a crime, and when you put American and Russian agents on the same case it's very hard to get them to stop playing "my country has the biggest dick therefore I'm in charge" and start cooperating to catch the black hat. There's a subtle difference.

Comment Re:hype from google (Score 1) 33

Yep, the summary is cringe-worthy. Tensor flow is just a framework that lets you easily build multi-step pipelines for processing multi-dimensional matrices (aka tensors). The matrices/tensors flow thru the pipeline, hence the name. The main targeted application is deep neural nets, and there are layers of functionality built into TF for building deep neural nets. There are a number of other preexisting open source frameworks that provide similar functionality. TF appears well designed (very modular, good for research), but it's no game changer.

Comment Re:I don't (Score 2) 507

Because if you buy a TV for picture quality and non-smart features (4k, deep color, whatever), you'll probably end up with 'smart' just because it's the default now. 'Dumb' is getting hard to find in the middle market segment, it's either $10k audiophile grade nonsense, or $199 Walmart specials that aren't 'smart' because they're still using a chipset from 2008.

Submission + - Badlock Vulnerability Falls Flat Against Hype (threatpost.com)

msm1267 writes: Weeks of anxiety and concern over the Badlock vulnerability ended today with an anticlimactic thud.

Badlock was the security boogeyman since the appearance three weeks ago of a website and logo branding the bug as something serious in Samba, an open source implementation of the server message block (SMB) protocol that provides file and print services for Windows clients.

As it turns out, Badlock was hardly the remote code execution monster many anticipated. Instead, it’s a man-in-the-middle and denial-of-service bug, allowing an attacker to elevate privileges or crash a Windows machine running Samba services.

SerNet, a German consultancy behind the discovery of Badlock, fueled the hype at the outset with a number of since-deleted tweets that said any marketing boost as a result of its branding and private disclosure of the bug to Microsoft was a bonus for its business.

For its part, Microsoft refused to join the hype machine and today in MS16-047 issued a security update it rated “Important” for the Windows Security Account Manager (SAM) and Local Security Authority (Domain Policy) (LSAD). The bulletin patches one vulnerability (CVE-2016-0128), an elevation of privilege bug in both SAM and LSAD that could be exploited in a man-in-the-middle attack, forcing a downgrade of the authentication level of both channels, Microsoft said. An attacker could then impersonate an authenticated user.

Comment Re:Cool story. One question... (Score 1) 177

If only computing devices had some sort of a virtual pointer... One could use a dedicated peripheral to position this "pointer" over the green, underlined IFTT in the article summary. One could then press a button on the controller for this "pointer" and have a document describing exactly what the hell "IFTT" stands for and what the "If this, then that" service it refers to does delivered to them.

But alas, it is futile dream.

Comment Re:So what? (Score 1) 354

Python is like BASIC: It allows a lay person to build a 90% working tool in less time than it would take to build a consensus on what type of muffins should be at the kickoff meeting for the project to develop a requirements document for the 100% solution, and that irritates a certain type of IT people the same way PCs with BASIC irritated mainframe programmers.

Slashdot Top Deals

Stinginess with privileges is kindness in disguise. -- Guide to VAX/VMS Security, Sep. 1984

Working...