Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Comment How about all of the above? (Score 1) 229

FreeNAS which uses RAID (ZFS) and Snapshots, which then rsyncs to a local backup drive at the other end of the house. Then, at least one cloud backup contain the important stuff off-site.

Business docs use cloud apps, which keeps the data from residing locally.

Comment This isn't a victory for Behring-Breivik. (Score 3, Insightful) 491

Someone once pointed out that hoping a rapist gets raped in prison isn't a victory for his victim(s), because it somehow gives him what he had coming to him, but it's actually a victory for rape and violence. I wish I could remember who said that, because they are right. The score doesn't go Rapist: 1 World: 1. It goes Rape: 2.

What this man did is unspeakable, and he absolutely deserves to spend the rest of his life in prison. If he needs to be kept away from other prisoners as a safety issue, there are ways to do that without keeping him in solitary confinement, which has been shown conclusively to be profoundly cruel and harmful.

Putting him in solitary confinement, as a punitive measure, is not a victory for the good people in the world. It's a victory for inhumane treatment of human beings. This ruling is, in my opinion, very good and very strong for human rights, *precisely* because it was brought by such a despicable and horrible person. It affirms that all of us have basic human rights, even the absolute worst of us on this planet.

Submission + - Remembering AlexKingOrg (alexking.org)

the_webmaestro writes: Matt Mullenweg wrote a note on his blog Remembering Alex King:

One of the original WordPress developers, Alex King, has passed from cancer at far too young an age. Alex actually got involved with b2 in 2002 and was active in the forums and the “hacks” community there.

You might remember Alex King from the share icon used by ShareThis (which grew out of his Share This plugin for WordPress...), or one of his many other WordPress plugins. Of the many visionaries who've plowed the internet for the rest of us, making it a better place for us all to grow and thrive, Alex King was one of the brightest stars. Thank you Alex, so much! You are already missed more than you know!

Give someone a fish, feed them for a day. Teach them to fish, feed them (and their family) for the rest of their life! Alex was one of the internet's best teachers. So long and thanks for all the fish!

Comment Re:Privacy (Score 3, Informative) 65

Amazon's Press Release (well, blog post rather) suggests that data is encrypted at-rest. Excerpt from https://aws.amazon.com/blogs/a...

WorkMail Security Controls Let’s talk about security for a bit. WorkMail includes a number of security features and controls that will allow it to meet the needs of many types of organizations. Here’s an overview of some of the most important features and controls:

Location Control – The WorkMail administrator can choose to create mailboxes in any supported AWS region. All mail and other data will be stored within the region and will not be transferred to any other region. During the Preview, WorkMail will be supported in the US East (Northern Virginia) and Europe (Ireland) regions, with more to follow over time.

S/MIME – Data in transit to and from Outlook clients and certain iPhone and iPad apps is encrypted using S/MIME. Data in transit to other clients is encrypted using SSL.

Stored Data Encryption – Data at rest (messages, contacts, attachments, and metadata) is encrypted using keys supplied and managed by KMS ( https://aws.amazon.com/kms/ ).

Message Scanning – Incoming and outgoing email messages and attachments are scanned for malware, viruses, and spam.

Mobile Device Policies & Actions – The WorkMail administrator can selectively require encryption, password protection, and automatic screen locking for mobile devices. The administrator can also remotely wipe a lost or mislaid mobile device if necessary.

Sounds like it has the makings of a usable service.

Comment Re:Amusing.. (Score 2) 138

gMail flagged Ubisoft's email as spam and potentially bogus. I wonder how many people will think it's just another phishing attempt and ignore it now.

I actually read the source of the email to confirm the embedded links were legitimate before marking it as "Not Phishing".

Really sucks for Ubisoft that their notification system will go unheard by many GMail users!

Comment What about Mac OS X and ATI/AMD? (Score 1) 457

"BSDs in general currently lack manufacturer supported full-feature AMD graphics driver, which leads to the conclusion that Sony and AMD have likely co-developed a discrete driver for the PS4."

Really? What about the BSD-like Mac OS X and the ATI nee AMD Graphics chipsets used in the Mac Pro and Macbook Pro? Or is that relationship so far removed that AMD couldn't use that intellectual property in partnership with Sony?

Comment One time password on time limited access (Score 1) 284

Configure your VPN headend to authenticate against a RADIUS host that is configured for a one-time-password. You must provide that one-time-password to the vendor each time they wish to connect. The second time the same password is used, it should be denied. This should NOT be a token-derived password they posses, but rather something they must get from you over the phone after authenticating themselves in some other way.

Ensure that the connection has a timeout of some reasonable time that won't kick them out of a legitimate activity.

Comment What migration path? (Score 1) 413

I use all three daily! Dual-boot Windows 7 and Ubuntu on my desktop at home. MacBook Pro at work (no boot-camp), along-side a RHEL 5 desktop, Ubuntu laptop, and a Windows 7 desktop. Where I work, folks regularly use two OSes between their laptops (Win/Mac/Ubuntu) and development desktops.

Thus, there really was no migration path, unless you count giving up Windows 7 for a Mac 4 years ago as my primary work machine.

Comment TrueCrypt? (Score 1) 171

Despite export controls, one has to wonder if they'd be better off protecting themselves w/ encryption on these drives, in case of undesired interception. It's unfortunate that encryption bans can't distinguish between malicious government intent and citizens avoiding the restrictions applied by the same oppressive government.

Slashdot Top Deals

"What the scientists have in their briefcases is terrifying." -- Nikita Khrushchev

Working...