Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Yes, this system needs to be detonated, but... (Score 1) 1032

Not based on this guy's advice.

There are a lot of things worth discussing here: the poor quality of modern college educations, the rapacious greed that state college systems engage in so that they can offset the tax cuts their administrators are receiving, the total one-sidedness of the "responsibility" that we are expected to show toward loan guarantors. Who knows? Maybe we should all default on our student loans.

But if you were to imagine this guy's core point was a legal argument, his case would be dismissed immediately due to a lack of standing. We don't dismiss evidence based on who it's coming from, but this is not evidence. It's opinion, and we absolutely should set the value of the opinion based on the experience of the opinionator.

Comment "Enterprise Grade"..."Networking Hardware"... (Score 1) 140

You don't define precisely what you mean by these things.

* If we're talking about switches, forget it. Cisco does it better and faster, easier to manage, with more robust hardware and a better service plan (limited lifetime warranty on all fixed configuration switches!). A non-Cisco switch doing anything of value on your network is a surefire way to convince me that you are bush league.

* Routers - it really depends. What are you going to do? Just route traffic between LAN interfaces? A Cisco L3-capable switch will probably be the fastest for this job, considering that many of its traffic routing tasks can be done in hardware which has been made to spec. But if you're looking to stick with Linux, you can configure a Linux server with the hardware you require and load it up with a network protocol you need it to run. A Linux server can certainly run OSPF or BGP. However, what else are you need? Do you also need a firewall, a VPN concentrator, an intrusion detector, a WAN optimizer, a small phone system? Because if you need those things as well, a hardware router will do these things at once in addition to its routing tasks, with a better performance:price ratio. Configuring it is not hard to learn to do. If you don't have time, you can always phone someone else who's contractually obligated to fix it.

* Firewall - this is wide open. Every single piece of firewall software seems to approach things in a totally different way, especially in terms of management interfaces. I would look around for the one that communicates to you in the way you find most intuitive, and then buy the gear that runs that. While I know Linux on a server will have some powerful firewalling capabilities, I simply can't use most of the Linux-based management packages because they just don't seem to think the way I do. Hopefully this is remedied soon, because most firewall vendors are incredibly overpriced and, in the case of Cisco especially, occasionally hard to even obtain at all.

I'm no Cisco fanboy, although I do rely on them for my income (full disclosure). I also don't want to be a Negative Nancy, as I understand that not everyone warms up to the whole "you should be grateful to have our logo in your rack" attitude you get from Cisco...I certainly don't. But there is a reason beyond simple groupthink that causes people to buy their stuff - frankly, there just is no serious alternative when it comes to switches or multi-function routers.

Comment Amateurs! (Score 1) 380

This is not a brag - more like my secret shame - but it's safe to say I have driven probably more miles than any of you ever will. Somewhere along the way, I stopped caring about where my hands were on the wheel. I'd say most of the time it's my left hand at about 7:00 and my right hand on a cup of coffee, and I'd guess that most people whose jobs entail driving end up the same way.

Also, all of us pro drivers have post-traumatic stress disorder. 2 solid hours of driving in Chicago or L.A. traffic will do that. I'm not proud of it, but it is what it is. So use your turn signal or the cup of coffee is going straight on to your windshield. Which is just going to piss me off more, because I was really looking forward to the coffee. And now my hands are positioned at your shirt and your neck. Asshole.

Comment Torrenting (Score 5, Insightful) 409

Sorry, entertainment industry dicks, but until your releases meet the following criteria:

* Available digitally on day 1 of release
* Reasonable compromise between file size and quality
* Can play the media without your buggy piece of crap software
* No oppressive DRM such as rootkits
* Transportable to different players and locations
* No imaginary or irrelevant services or features bundled into the cost (I'm not paying you for anything but the content) ...I will continue to torrent. But the minute you do meet these requirements, I have no problem paying you for your product. Unfortunately, by the time you figure it out you will probably not be around anymore. :(


Submission + - Cyber Espionage Targeting Southeast Asia (

wiredmikey writes: Researchers have pulled the covers off of a cyber-espionage operation that compromised as many as 200 computers – many belonging to government ministries in Vietnam, Brunei and Myanmar.

The company discussed the research at the RSA Conference in San Francisco this week. Besides government ministries, other victims included a newspaper and more than one petroleum company. In a report, Dell SecureWorks revealed the attackers used pieces of malware tied to attack on EMC’s RSA security division in 2011, as well as the infamous GhostNet case. In addition to the victims mentioned above, there will also a handful of compromises in Europe and the Middle East. Like the other infected machines, these computers belonged to government agencies, businesses and even an embassy.

Joe Stewart, director of malware research at SecureWorks, told SecurityWeek that the targets suggest the person was working on behalf of a government or entity that wants confidential information, but there was nothing to definitely prove whoever is behind the attacks is working for a particular country.

Slashdot Top Deals

Computers are useless. They can only give you answers. -- Pablo Picasso