Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment How pervasive? (Score 1) 256

Factoids... "200 Billion lines of COBOL code in existence" eWeek "5 Billion lines of COBOL code added yearly" Bill Ulrich, TSG Inc. "Between 850K and 1.3 Million COBOL developers" IDC "Majority of customer data still on mainframes" Computerworld "Replacement costs $20 Trillion" eWeek Researchers at Aberdeen Group recently found that about 70% of the world's business data is still processed by mainframe applications written in Cobol. According to Gartner Group, that number is closer to 75%. "Although most people are blissfully unaware of CICS, they probably make use of it several times a week, for almost every commercial electronic transaction they make. In the whole scheme of things, CICS is *much* more important the Microsoft Windows." Martin Cambell-Kelly, "From Airline Reservations to Sonic Hedgehog" (a History of the Software Industry), MIT Press 2003 COBAL is not dead and won't die :)

Comment Re:What about china? (Score 1) 166

Australia = elected government. China = military dictatorship.

That's probably about right. Since Australia prides itself as a democracy

As an Aussie I can assure you that a vast majority of Aussie DO NOT WANT THE BLUDDY FILTER!
The number of polls and surveys have run at around 80+% against.
Why are they doing it? For basic political gain of right wing votes - plain and simple. See: http://nocleanfeed.com/ for more details


Critical Vulnerability In Adobe Reader 160

An anonymous reader writes "Core Security Technologies issued an advisory disclosing a vulnerability that could affect millions using Adobe's Reader PDF file viewing software. Engineers from CoreLabs determined that Adobe Reader could be exploited to gain access to vulnerable systems via the use of a specially crafted PDF file with malicious JavaScript content. Successful exploitation of the vulnerability requires that users open a maliciously crafted PDF file, thereby allowing attackers to gain access to vulnerable systems and assume the privileges of a user running Acrobat Reader."

(Useful) Stupid Unix Tricks? 2362

So the other day I messaged another admin from the console using the regular old 'write' command (as I've been doing for over 10 years). To my surprise he didn't know how to respond back to me (he had to call me on the phone) and had never even known you could do that. That got me thinking that there's probably lots of things like that, and likely things I've never heard of. What sorts of things do you take for granted as a natural part of Unix that other people are surprised at?

The Internet

Australian Censorship Bypassed Before Live Trials 184

newt writes "The Australian Government is planning to conduct live trials of as-yet-unspecified censorship technology. But as every geek already knows, these systems can't possibly work in the presence of VPNs and proxy servers. PC Authority clues the punters in." Maybe the ISPs secretly like encouraging SSH tunneling — and making everyone pay for the extra bandwidth used. Not really; Australia's major ISPs, as mentioned a few days ago, think it's a bad idea.
The Courts

Supreme Court To Rule On TV Censorship 426

Khashishi writes "The LA times and the Associated Press report that the FCC v. Fox Television Stations case is being heard in the Supreme Court. The FCC policy would impose a heavy fine on use of 'indecent' words on broadcast television, which Fox and others are claiming is a violation of free speech. The case was appealed after being ruled in Fox's favor in a federal appeals court in New York. Chief Justice John G. Roberts Jr. and Justice Antonin Scalia support the FCC policy of censorship." Here's a transcript (PDF) of the oral arguments.

Applied Security Visualization 45

rsiles writes "When security professionals are dealing with huge amounts of information (and who isn't nowadays?), correlation and filtering is not the easiest path (and sometimes enough) to discern what is going on. The in-depth analysis of security data and logs is a time-consuming exercise, and security visualization (SecViz) extensively helps to focus on the relevant data and reduces the amount of work required to reach to the same conclusions. It is mandatory to add the tools and techniques associated to SecViz to your arsenal, as they are basically taking advantage of the capabilities we have as humans to visualize (and at the same time analyze) data. A clear example is the insider threat and related incidents, where tons of data sources are available. The best sentence (unfortunately it is not an image ;) that describes SecViz comes from the author: 'A picture is worth a thousand log entries.'" Read on for the rest of rsiles's review.

Slashdot Top Deals

"If you can, help others. If you can't, at least don't hurt others." -- the Dalai Lama