Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Submission + - Cisco: Potent ransomware is targeting the enterprise at a scary rate (networkworld.com)

coondoggie writes: Enterprise-targeting cyber enemies are deploying vast amounts of potent ransomware to generate revenue and huge profits – nearly $34 million annually according to Cisco’s Mid-Year Cybersecurity Report out this week.
Ransomware, Cisco wrote, has become a particularly effective moneymaker, and enterprise users appear to be the preferred target.

Submission + - Fact checking the DNC email hack

Presto Vivace writes: NSA Whistleblower: Not So Fast On Claims Russia Behind DNC Email Hack

they have not listed intruders or attempted intrusions to the DNC site. I suspect that’s because they did a quick and dirty look for known attacks. Of course, this brings up another question; if it’s a know attack, why did the DNC not have software to stop it? You can tell from the network log who is going into a site. I used that on networks that I had. I looked to see who came into my LAN, where they went, how long they stayed and what they did while in my network.

Further, if you needed to, you could trace back approaches through other servers etc. Trace Route and Trace Watch are good examples of monitoring software that help do these things. Others of course exist probably the best are in NSA/GCHQ and the other Five Eyes countries. But, these countries have no monopoly on smart people that could do similar detection software.

Question is do they want to fix the problems with existing protection software. If the DNC and OPM are examples, then obviously, they don’t care to fix weakness probably because the want to use these weaknesses to their own advantage.

Submission + - Why Did The Stars Wars And Star Trek Worlds Turn Out So Differently?

HughPickens.com writes: In the Star Trek world there is virtual reality, personal replicators, powerful weapons, and, it seems, a very high standard of living for most of humanity while in Star Wars there is widespread slavery, lots of people seem to live at subsistence, and eventually much of the galaxy falls under the Jedi Reign of Terror. Why the difference? Tyler Cowen writes about some of the factors differentiating the world of Star Wars from that of Star Trek: 1) The armed forces in Star Trek seem broadly representative of society. Compare Uhura, Chekhov, and Sulu to the Imperial Storm troopers. 2) Captains Kirk and Picard do not descend into true power madness, unlike various Sith leaders and corrupted Jedi Knights. 3) In Star Trek, any starship can lay waste to a planet, whereas in Star Wars there is a single, centralized Death Star and no way to oppose it, implying stronger checks and balances in the world of Star Trek. 4) Star Trek embraces egalitarianism, namely that all humans consider themselves part of the same broader species. There is no special group comparable to the Jedi or the Sith, with special powers in their blood. 5) Star Trek replicators are sufficiently powerful it seems slavery is highly inefficient in that world.

Submission + - Oracle loses Itanium case, owes $3 billion to HP (indiatimes.com)

drainbramage writes: HP had an agreement with Oracle for software for the Itanium processor. Sometime after HP sunsetted the series Oracle stopped developing for that processor.
HP sued Oracle saying their agreement held even though HP had stopped development and was dropping production.
HP won.

Submission + - (Potential) Poll Question: Do you secure erase your HDD's before disposal? 1

An anonymous reader writes: (Slashdot editors: Consider making this a Poll question, please?)
https://consumerist.com/2016/06/28/study-78-of-resold-drives-still-contain-readable-personal-or-business-data/
Too many people, apparently, let their old hard drives out of their posession without adequately erasing their contents. Slashdotters, you do securely erase (or at least physically destroy) your old hard drives before allowing them to leave your control, don't you?

Submission + - Judge rules No-Fly list unconstitutional

schwit1 writes: A federal judge ruled last week that the method by which the federal government places people on the no-fly list is inherently unconstitutional, and must either be changed, or cease.

Specifically, U.S. District Judge Anna Brown said the process doesn’t give Americans on the list an effective way to challenge their inclusion. The Oregonian reports: “In a 65-page opinion issued Tuesday Brown ordered the government to come up with a new way for the 13 plaintiffs to contest their inclusion on the list that prohibits them from flying in or through U.S. airspace. The government must provide notice to the plaintiffs that they are on the roster and give the reasons for their inclusion, Brown wrote. She also ordered that the government allow the plaintiffs to submit evidence to refute the government’s suspicions.

“The decision marks a big win for the plaintiffs, all U.S. citizens or permanent residents, and the American Civil Liberties Union, which argued the case on their behalf. The plaintiffs have all been denied boarding due to their placement on the list, they argue, despite never having been charged with a terrorism-related offense.”

Comment The problem with Chromebooks (Score 1, Insightful) 130

I never saw the fascination with a device that had so little storage I can't even run off the whole contents of my camera onto if I'm not connected to the web.

Cheap? Not really. Given that for another $100 I can get better specs, a real storage device, and an operating system that's $100 to buy (I realize some don't want Windows), the cost of a Chromebook is really expensive. Not to mention Google spying on you!

Submission + - Google caught manipulating Hillary searches (youtube.com)

Trachman writes: It looks like Google is manipulating Google search prompts, by significantly artificially reducing popularity of searches that are deemed understandable. See link below for a quick video ( https://youtu.be/PFxFRqNmXKg )

Facebook has already been caught. It looks like that Google has been caught with the knife and the blood on their hands.

Google manipulation is page from the playbook prophetically depicted in the House of Cards by Underwoods and other players.

The question is if Barbara Streisand effect will prove it's effectiveness...

Submission + - The birth of IT: The IBM System/360 turns 52 (networkworld.com)

coondoggie writes: IT can trace its roots back to arguably the most important computer introduction made 52 years ago today. April 7, 1964 was the day IBM introduced its System/360, the first true mainframe for the masses, or at least that’s what it hoped on that day.

Submission + - FBI Says Tool It Bought to Hack iPhone 5c Doesn't Work With iPhone 5s or Newer (cnn.com)

An anonymous reader writes: FBI Director James Comey said Wednesday that the government had purchased "a tool" from a private party in order to unlock the iPhone used by one of the San Bernardino shooters. "Litigation between the government and Apple over the San Bernardino phone has ended, because the government has purchased, from a private party, a way to get into that phone, 5C, running iOS 9," Comey said. The FBI director also said the purchased tool worked only on a "narrow slice of phones" that does not include the newest Apple models, or the 5S.

Submission + - Ask Slashdot: Containers, virtual machines, or bare metal?

An anonymous reader writes: We're now lucky to have three different tools, each specialized to excel as a particular type of problem, and each with many open source tools helping them to remain innovative solutions to any problem at hand. When we think about the future of the data center, we shouldn't be thinking about containers, virtual machines, and bare metal deployments as either/or choices. Instead, as each continues to innovate, we can choose the best tool for the job, depending on what the problem we are trying to solve is.

All three are probably here to stay, at least for the foreseeable future. But it's still interesting to ask those among us who administer systems and applications: For your next project, how do you plan to deploy? Bare metal, virtual machines, containers, or some combination of the three?

Slashdot Top Deals

I just asked myself... what would John DeLorean do? -- Raoul Duke

Working...