Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Submission Summary: 0 pending, 129 declined, 15 accepted (144 total, 10.42% accepted)

Submission + - Windows 10 Warning: Anger At Microsoft Rises With Serious New Failure (forbes.com)

Futurepower(R) writes: Engadget writer Richard Lawler revealed that users were now trying to hack the Windows 10 registry to disconnect their local file searches from Microsoft servers (more below) “and I can't say I blame them after this episode. Microsoft owes users a better explanation than this and should make sure it's impossible for offline features to get taken out when the cloud is having an issue.”

“That’s Microsoft’s underlying tactics all along: sneak questionable mechanics into Windows with updates, backtrack only if someone noticed them, reported them and if that creates a big enough public outcry,” commented one user.

[A] Windows 10 registry hack appears to be the only 100% fix for this issue and it also disconnects Bing and Cortana online services from Windows 10 search.

Submission + - Minister in Charge of Japan's Cybersecurity Says He Has Never Used a Computer

Futurepower(R) writes: Minister in Charge of Japan’s Cybersecurity Says He Has Never Used a Computer. (Nov. 15, 2018)

Japan's cybersecurity minister has never used computers. (Nov. 15, 2018. Fixed the title.)

Quote: "Lawmakers laughed incredulously at his replies, which were highlighted in Japanese media.

It is common that older people don't use computers and don't want to learn.

Submission + - Ask Slashdot: How to isolate a network, but allow data transfer?

Futurepower(R) writes: What is the best way to isolate a network from the internet and prevent intrusion of malware, while allowing carefully examined data transfer from internet-facing computers?

An example of complete network isolation could be that each user would have 2 computers with a KVM switch and a monitor and keyboard, or 2 monitors and 2 keyboards. An internet-facing computer could run a very secure version of Linux. Any data to be transferred to that user's computer on the network would perhaps go through several Raspberry Pi computers running Linux; the computers could each use a different method of checking for malware.

Windows computers on the isolated network could be updated using Autopatcher, so that there would never be a direct connection with the internet.

Why not use virtualization? Virtualization does not provide enough separation; there is the possibility of vulnerabilities.

Do you have any ideas about improving the example above?
The Internet

Submission + - CNN pushes this year's most abusive EULA. (windowssecrets.com)

Futurepower(R) writes: "Windows Secrets has a story about CNN's use of software called Octoshape that presents an incredibly abusive EULA. If you agree to the EULA, you agree that CNN can use your bandwidth, and that you will pay any costs. Also, you lose the right to monitor your own network traffic. You can't even use information collected by your own firewall. Quoting the EULA:

"You may not collect any information about communication in the network of computers that are operating the Software or about the other users of the Software by monitoring, interdicting or intercepting any process of the Software. Octoshape recognizes that firewalls and anti-virus applications can collect such information, in which case you not are allowed to use or distribute such information."

Adobe is allowing the Octoshape company to use its Flash update install software.

What would YOU say to the CEOs of CNN and Adobe? Personally, I'm waiting for the time when all the CEOs with no appreciation of technological issues have retired."

Slashdot Top Deals

No user-servicable parts inside. Refer to qualified service personnel.

Working...