Follow Slashdot stories on Twitter


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - Over 70% of Seagate Central NAS Hard-Drives Infected with Malware (

An anonymous reader writes: A new malware family has infected over 70% of all Seagate Central NAS devices connected to the Internet. The malware, named Miner-C or PhotoMiner, uses these hard-drives as an intermediary point to infect connected PCs and install software that mines for the Monero cryptocurrency. The hard-drives are easy to infect because Seagate does not allow users to delete or deactivate a certain "shared" folder when the device is exposed to the Internet. Over 5,000 Seagate Central NAS devices are currently infected. The crooks made over $86,000 from Monero mining so far.

Submission + - Dissecting a frame of DOOM

An anonymous reader writes: An article takes us through the process of rendering one frame of DOOM (2016). The game released earlier this year uses the Vulkan API to push graphics quality and performance at new levels.
The article shades light on rendering techniques, mega-textures, reflection computation... all the aspects of a modern game engine.

Submission + - New Intel SSD 600P SSD Delivers NVMe Speeds At SATA Prices Below .40 Per GB (

MojoKid writes: Intel just launched a new family of low cost NVMe PCI Express Solid State drives called the SSD 600P series. The company claims the drives are "designed to deliver PCIe performance at near-SATA prices". To date, most NVMe PCIe solid state drives are roughly 1.5 – 3x the cost per gigabyte of SATA based drives, due to the inherent performance benefits and likely the added cost of NVMe controllers. Leveraging 3D TLC NAND manufactured in concert with Micron allows Intel to price the 600P aggressively. The 512GB Intel SSD 600P tested here at HotHardware is already available at street prices below $.40 per gigabyte (roughly $179), which is only slightly higher than most same capacity SATA drives and close to half the price of the average NVMe drive. The Intel SSD 600P will initially be offered in four capacities, 128GB up to 1TB. All of the drives conform to the same M.2 (2280) 80mm gumstick form factor, but performance varies depending on the capacity. The 128GB drive can offer up to 770MB/s reads and 450MB/s writes, while the 1TB drive peaks at 1.8GB/s reads with 560MB/s writes. The 600P drives performed relatively well overall in the benchmarks. When queue depths were cranked up or there were sustained, long sequential transfers, performance dropped off but that's not as common in mainstream consumer workloads, where lower queue depths and random small file transfers are more typical.

Submission + - NVidia GeForce now requires mandatory registration ( 1

An anonymous reader writes: With the newly released GeForce Experience 3.0 software, Nvidia might irk some users. While you will still be able to download the drivers from their web site sans registration, you will now be required to register in order to use the GeForce Experience software While the Experience software does add some powerful streaming features for games and is "three times faster and consumes 50 percent less memory than the old GeForce Experience", it might seem like a bit of overkill for those users that only used the software to keep their drivers up to date.

Submission + - Buggled - bankrupted by a software bug

Dharkfiber writes: Bloomberg is covering a story today ( about a hosting business that is now filing chapter 11 due to bugs in a switch. Good,bad, or ugly is it time to admit that business really can't continue without IT? When will IT training become formal curriculum in schools?

Comment Depends on the firewall, depends on the business (Score 1) 267

Next Gen Firewalls typically have three interesting features that changes this game. The first is Single-Sign-On tech that allows the ntwkr to use User ID (either on Active Directory, LDAP, or pulling it off 802.1x\RADIUS, or SYSLOG). That gives them an extra special group that they can then give extra perms to or bypass capabilities (maybe even with a coaching TOS screenie). There are lawyers, executives, and HRIS people that may need bypass to do investigations for the company or maybe the company just wants to treat people like adults, but in the case there is a HR issue or violation they need the logging. The second and third are the ability to hand application controls, URL Filtering, and GEO-IP reputation in the same security policy as the user Identity. This single-policy execution makes these firewalls a no-brainer to push whatever policies you need.

Now, I am of a mindset that technology should fix business problems and content filtering is a business problem. Depending on the business you are in and job description, the responsibilities change. I think the discussion is fairly moot due to lack of information on industry.
My opinions:
In the tech world leave it open but log everything
In the financial industry, GEO-IP, In-line antivirus, and application control (with SSL inspection) are key, but you have to be fairly open with the content filter (coaching pages).
In education, block everything (I keed, but not really)
etc etc etc

Submission + - Another Surprise In Jeb Bush's Email Cache: Viruses (

itwbennett writes: In addition to personal phone numbers and email addresses for hundreds of people who corresponded with him, there’s something else inside the cache of emails that Jeb Bush released this week: computer viruses. Alongside a Web interface to read the emails, Bush also offered raw Microsoft Outlook files, and it’s in those files where the viruses lurked in file attachments. Many are old and easily detectable with modern anti-virus software, but they still might pose a threat to some people running older computers or without anti-virus software. For example, in the email database from 2001 there are several attachments that carry the “Happy99.exe” file, a computer worm for Windows 95, 98 and NT systems, also known as “Ska,” which first appeared in 1999.

Submission + - Sony, Microsoft and Others Agree to Share Customer Data With US Government

Jason Koebler writes: On Friday, the president issued a cybersecurity executive order that creates a new framework for “expanded information sharing designed to help companies work together, and work with the federal government, to quickly identify and protect against cyber threats,” according to an emailed fact sheet from the White House.
Some groups are signing on for full information sharing, starting now. They include the Cyber Threat Alliance, which includes Palo Alto Networks, Symantec, Intel Security and Fortinet; the Entertainment Software Association, which represents Sony and Microsoft’s video game divisions, as well as many more of the largest video game companies in the country; Crowdstrike, a security firm; Box, a cloud storage company; and FireEye, a cybersecurity firm.

Submission + - Our oceans are being fed 8.8m tons of plastic annually, alarming study finds (

hypnosec writes: According to a new study that tracked marine debris from its source, 8.8 million tons of plastic ends up in the world oceans annually. Plastic waste is a global problem and until now there wasn't a comprehensive study that highlighted how much plastic waste was making it to the oceans. Latest study by researchers over at University of Georgia claim that if all the plastic waste being dumped to oceans is accounted for, it will be equivalent of five grocery bags full of plastic debris dotting each foot of coastline around the world.

Submission + - Obama set to push cybersecurity data-sharing (

An anonymous reader writes: President Barack Obama is preparing to sign a new executive order today which urges organisations to share information on cybersecurity threats with the White House and each other — a decision sparked by recent attacks including that on Sony Pictures last November. The order will set in place the new ‘information sharing and analysis organisations’ (ISAOs) initiative which aims to encourage companies to share data on cyber threats among themselves and with the Department of Homeland Security. The White House has said that the community is the next step in making businesses aware of and more familiar with security legislation, offering participating companies liability protection.The order will be signed by Obama at a day-long cybersecurity conference held at Stanford University.

Submission + - Bringing offshore into 4G connectivity

Amanda Parker writes: Reliable, high-speed communications technologies are transforming the offshore environment, improving the day to day lives of offshore workers. Having just established its first 4G network for Shell on the Norwegian continental shelf, Maritime Communication Partner explains what better connectivity will mean for the offshore sector. From autonomous drones monitoring the seafloor to advanced drilling rigs sending back detailed information to the drilling platform, offshore operations are becoming ever more interconnected. With GSN and satellite based networks both costly and restricted, telecoms specialist MCP is branching out of cruise ship communications to offer 4G connectivity to offshore operators.

Submission + - Splitting HARES, Military Grade Crypto in Malware (

Dharkfiber writes: Andy Greenberg @ Wired Magazine writes, "Software reverse engineering, the art of pulling programs apart to figure out how they work, is what makes it possible for sophisticated hackers to scour code for exploitable bugs. It’s also what allows those same hackers’ dangerous malware to be deconstructed and neutered. Now a new encryption trick could make both those tasks much, much harder." New crypto tricks being added to Malware, SSL, Disk, and now HARES packaging.

Submission + - Peak Google: The Company's Time at the Top May Be Nearing Its End writes: Farhad Manjoo writes at the NYT that at first glance Google looks plenty healthy, but growth in Google’s primary business, search advertising, has flattened out at about 20 percent a year for the last few years and although Google has spent considerable resources inventing technologies for the future, it has failed to turn many of its innovations into new moneymakers. According to Manjoo as smartphones eclipse laptop and desktop computers to become the planet’s most important computing devices, the digital ad business is rapidly changing and Facebook, Google’s archrival for advertising dollars, has been quick to profit from the shift. Here’s why: The advertising business is split, roughly, into two. On one side are direct-response ads meant to induce an immediate purchase: Think classifieds, the Yellow Pages, catalogs or Google's own text-based ads running alongside its search results. But the bulk of the ad industry is devoted to something called brand ads, the ads you see on television and print magazines that work on your emotions in the belief that, in time, your dollars will follow. “Google doesn’t create immersive experiences that you get lost in,” says Ben Thompson. “Google creates transactional services. You go to Google to search, or for maps, or with something else in mind. And those are the types of ads they have. But brand advertising isn’t about that kind of destination. It’s about an experience.” According to Thompson the future of online advertising looks increasingly like the business of television and is likely to be dominated by services like Facebook, Snapchat or Pinterest that keep people engaged for long periods of time and whose ads are proving to be massively more effective and engaging than banner advertisements.

In less than five years, Facebook has also built an enviable ad-technology infrastructure, a huge sales team that aims to persuade marketers of the benefits of Facebook ads over TV ads, and new ways for brands to measure how well their ads are doing. These efforts have paid off quickly: In 2014 Facebook sold $11.5 billion in ads, up 65 percent over 2013. Google will still make a lot of money if it doesn’t dominate online ads the way it does now. But it will need to find other businesses to keep growing. This is why Google is spending on projects like a self-driving car, Google Glass, fiber-optic lines in American cities, space exploration, and other audacious innovations that have a slim chance of succeeding but might revolutionize the world if they do. But the far-out projects remind Thompson of Microsoft, which has also invested heavily in research and development, and has seen little return on its investments. “To me the Microsoft comparison can’t be more clear. This is the price of being so successful — what you’re seeing is that when a company becomes dominant, its dominance precludes it from dominating the next thing. It’s almost like a natural law of business.”

Slashdot Top Deals

FORTUNE'S FUN FACTS TO KNOW AND TELL: A firefly is not a fly, but a beetle.