Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Space

Nearby Star May Have More Planets Than Our Solar System 102

The Bad Astronomer writes "HD 10180 is a near-twin of the Sun about 130 light years away. It's known to have at least six planets orbiting it, but a new analysis of the data shows clear indications of three more, for a total of nine! This means HD 10180 has more planets than our solar system. And whether you think Pluto is a planet or not, all nine of these aliens worlds have masses larger than Earth's, putting them firmly in the 'planet' category."
Technology

Video Plantronics Helps Make Remote Workers' Lives Easier (Video) 233

If you're working at home or from a coffee shop or, really, anyplace outside your company's offices, they need to hear you when you talk, and you need to hear them. The same goes for dealing with clients via VOIP or video, the two communications techologies that seem to be driving POTS into obsolescence faster than we thought possible just a few years ago. In this video, Plantronics PR person Karen Auby -- who works remotely most of the time herself -- explains how Plantronics products help make work easier in a world of "unified communications."

Comment Re:So what? (Score 1) 1046

We have an unarmed victim, making the supposed deadly threat unlikely. That would mean Zimmerman shot him without a credible fear for his life

Martin was a well-built athlete. Zimmerman, not so much. If Martin started a fight, it's highly probable that he didn't know Zimmerman was armed.

If Martin sucker-punched Zimmerman and started beating on him before Zimmerman brandished a weapon, then that makes it a legitimate use-case of SYG.

(Please note that I am prefacing these statements with 'if' since we do not know for certain. I am merely presenting a case where SYG could legitimately be used and argued for)

We have evidence that the victim was attempting to retreat (evenm though not obligated to do so) which further suggests there was no threat to Zimmerman's life

No. The evidence we have shows that Martin was being followed by Zimmerman for the purposes of surveillance (911 call about a suspicious person by Zimmerman), not that Zimmerman was pursuing Martin with a weapon drawn or the threat of violence.

Again, that makes the claim that Zimmerman was reasonably fearful for his life look rather weak.

You seem to be proceeding on the basis of faulty information.

Comment Re:Zimmerman claimed he was beaten about the head (Score 1) 1046

There are two problems with this argument -

(1) He was treated by EMTs before being brought into custody. This is standard procedure - the cops don't want a suspect dribbling blood all over their police station and moaning in pain while trying to piece together events.

(2) A higher resolution video has been released that seems to show evidence of injuries: http://www.breitbart.com/Big-Journalism/2012/03/31/New-Hi-Def-Vid. (You may disagree with Breitbart, but the video is relevant regardless of who posts it).

Comment Re:So what? (Score 2) 1046

(1) Citation needed. Not aware of Florida law in particular, but Zimmerman was licensed to use his firearm. Further, 'neighborhood watch' programs are not regulated in any capacity that I'm aware of - they are simply just bands of civilians who have to follow the same laws that individual civilians do. He is permitted to carry his firearm as a civilian regardless of whether or not he's doing it under the auspices of a 'neighborhood watch' program that the government makes no special deference to.

(2) This is common sense that Zimmerman should have followed. It's not a legal commandment, however.

(3) The suggestions of the 911 dispatcher are not legally binding in any way. 911 dispatchers are not officers of the law, nor does the 911 dispatcher really have full situational awareness of what is going on.

Comment Re:So what? (Score 1) 1046

The authorities don't press charges unless they believe they have a reasonable case to proceed on. The police can't just arrest because "just because". Sometimes the price of due process and defense of civil rights includes letting possible criminals walk free for a while while the authorities do their job behind the scenes to build up a more solid case.

Instead of misdirecting your rage at the local officers, you should be looking at the SYG laws that put a heavy burden of proof on the prosecution to prove that people like Zimmerman did not legitimately defend themselves under the SYG law. That's why he's walking free today - Zimmerman can simply say that the event happened a certain way and with no opposition witnesses and of course, no Trayvon Martin, there was no immediate basis to claim he was wrong.

The authorities *are* putting together a grand jury where all the known facts will be evaluated and a case will be opened if the grand jury believes there is sufficient evidence to proceed.

Comment Re:So what? (Score 2) 1046

Erm, the case *is* being investigated. For one thing, he was taken into custody for questioning the night of the incident. I also believe that local officials actually tried to present this case to a prosecutor and was denied due to lack of evidence. Now work is being done to present this case to a grand jury. How can you say that there is no investigation?

It's amazing how much misinformation is being spread out there that is fueling a lot of pointless emotions.

Software

Ask Slashdot: It's World Backup Day; How Do You Back Up? 304

MrSeb writes "Today is World Backup Day! The premise is that you back up your computers on March 31, so that you're not an April Fool if your hard drive crashes tomorrow. How do Slashdot users back up? RAID? Multiple RAIDs? If you're in LA, on a fault line, do you keep a redundant copy of your data in another geographic region?"

Comment Re:Not worrying (Score 1) 126

Wow. Just wow.

Please don't tell me you're in any way shape or form responsible for IT security.

I hope you understand that graphical exploit kits do exist that target UNIX systems. This commenter pointed it out.

An attacker who knows what he is doing will attack both Windows and UNIX systems. One that doesn't will just use a tool that a skilled person wrote to "point and click" his way into a box regardless of what OS it is running.

Comment Re:No (Score 1) 671

I respect your point, but I think you overlook some very easy to imagine scenarios where the laptop can be compromised.

One case would be the employee has his laptop out, lets say in a meeting (but this could be anywhere, like the airport lounge, cafe, and etc.). Employee is distracted for a while (maybe a phone call, or maybe somebody is striking up a long-winded conversation) - somebody has physical access to the laptop for a minute or two. A backdoor is loaded on the laptop during the distraction. The usual Windows group policies to lock out the laptop after 5 minutes are meaningless.

Is it farfetched? Maybe you think it is. But a long time ago, people never thought the exploits we battle today would be a problem on the Internet.

Again, the question goes back to what this employee is really doing. Does he want his ass on the line if his Ubuntu laptop gets compromised and then later traced back to his laptop? It's really situational. Not all mobile users handle sensitive data or are really targets for attacks. Not all laptop users travel - many laptops are just issued for home and office use.

Comment Re:No (Score 2) 671

As an alternative, you can also compromise the boot loader and/or device driver that is used to actually enter the password to decrypt the system. Since the loader/driver itself is not encrypted, it is subject to being compromised.

Once the correct password is entered in later by the authorized user, the password can either be stored somewhere (maybe in the MBR) or if you're clever enough, you can actually use the compromised driver to run unauthorized code once the system is connected back to the internet.

Then there is the cold boot attack.

Encryption helps, but does not seal up all possible avenues of attack.

Comment Re:No (Score 1) 671

1. The laptops carry sensitive data. Treating them as hostile is a good start, but it in no way validates leaving the user to install his own malware/crapware, etc.

Strawman. Nobody said the employee should be deliberately installing malware. What kind of idiot would think that is a good idea?

The point is situational - if the employee can be responsible enough to secure the laptop and get away with it (i.e. they don't have a little Hitler in the IT department with a keylogger running or something), then by all means I don't personally have a problem with it.

If the employee is actually handling sensitive data (i.e. something where law enforcement, lawyers, SEC, or shareholders might get involved if there is a breach or loss), then it is probably in his best interests to let the IT department take the heat if the laptop is hacked, stolen and then subsequently recovered, or found manipulated by a virus later.

IT departments are pretty good about patching Windows/MS Office etc

I love how you speak for all IT departments.

Just who's post is the 'tarded one now? (If you can bait the flames, then you can take the flames too!)

Slashdot Top Deals

"You can have my Unix system when you pry it from my cold, dead fingers." -- Cal Keegan

Working...