Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Cisco To Acquire Sourcefire For $2.7 Billion 38

Orome1 writes "Cisco will acquire Sourcefire, a provider of intelligent cybersecurity solutions. Under the terms of the agreement, Cisco will pay $76 per share in cash in exchange for each share of Sourcefire and assume outstanding equity awards for an aggregate purchase price of approximately $2.7 billion, including retention-based incentives. The acquisition has been approved by the board of directors of each company. Once the transaction closes, Cisco will include Sourcefire into its guidance going forward. Prior to the close, Cisco and Sourcefire will continue to operate as separate companies."

Comment Re:Elections in Australia (Score 1) 127

Of course, making their policies so easily accessible makes it easy to decide that it would be crazy for me to vote for the LDP above *any* of the major parties :).

Their perhaps laduable views on some social policy does not make up for their fetishization of property rights and the free market, along with their other economic views that they propound.

Comment Re:Elections in Australia (Score 1) 127

And indeed, in the last Australian Federal election, a minor party managed to win the seat of Melbourne demonstrating that a vote for them was definitely not wasted :).

(Sufficient people put them first on their voting papers that one of major parties was eliminated in the "instant-runoff" before them. Now the Greens are probably the biggest minor party and there were some details which favoured them, but nevertheless, Melbourne strikes me as the leftmost city in Australia, so the result doesn't appear too unusual.)

The Military

US Sentinel Drone Fooled Into Landing With GPS Spoofing 647

McGruber writes "Following up on the earlier Slashdot story, the Christian Science Monitor now reports that GPS spoofing was used to get the RQ-170 Sentinel Drone to land in Iran. According to an Iranian engineer quoted in the article, 'By putting noise [jamming] on the communications, you force the bird into autopilot. This is where the bird loses its brain.' Apparently, once it loses its brain, the bird relies on GPS signals to get home. By spoofing GPS, Iranian engineers were able to get the drone to 'land on its own where we wanted it to, without having to crack the remote-control signals and communications.'"

Comment Re:Seriously (Score 1) 294

As noted by one of the article commentators, jointly holding a patent doesn't allow you to use it defensively against the other joint holders, and it might be difficult to use it to protect other manufacturers building, say, Android phones. So, this could be the reason that joint bidding was dimissed by google.

Comment Re:Frederic Mitterrand ? (Score 1) 151

that's actually completely incorrect. there's no suggestion at all of forcible assault or beating, nor has there ever been. read the case documents. they're all available online.

do you think ANYONE, let alone high profile politicians, would support Polanski if he had used violence? do you think his victim would be calling for an end to the witch hunt (as she has for over a decade now) if he'd used violence?

Comment yes/no dialogue when restricted ability first used (Score 1) 279

my biggest peeve with the Android security model from day #1 is that this kind of thing is even possible.

every Android application has to be specifically granted a set of permissions on installation, including "able to make phonecalls that cost you money", "able to access the internet", etc. the problem is that the user only ever see this list once, fleetingly, during installation, and as everyone knows, familiarity breeds contempt so after the first couple of apps, most people stop reading the list and just click "yes". even if they read the list, once it's been authorized the application can do anything on its permission list at any time, without user intervention. this opens the gate to applications that can take photos doing so silently while the screen is off, applications that can make phonecalls doing so invisibly and undetectably, applications that can use the internet and use gps phoning home at any time with your exact location, etc. it simply shouldn't be possible.

whenever an application attempts to perform a restricted task, the OS checks that it has been granted the permission to do so and either silently permits the task, or silently disallows it. that's great, but it shouldn't stop there. the first time it's attempted a dialog box should alert the user that "steamy windows is attempting to make a phone call to that can cost you money. do you want to authorize this? yes/no/ [ x ] remember my answer and don't ask me again".

clearly "steamy windows" is going to get a "no and don't let it do it in future response", whereas the user is likely to grant "mywonderSMSclient" indefinite permission.

if there's a reason why this isn't practical, i'd like to know about it.

Slashdot Top Deals

"Maintain an awareness for contribution -- to your schedule, your project, our company." -- A Group of Employees