Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment But then who audits the auditors? (Score 1) 184

The solution is pretty simple, but often skipped:
1) The reason for every search should be required and logged by the searcher. ...
2) The logs be randomly spot-checked by an auditor(s) who verifies the reasons given by interviewing the person(s) who searched.

But to check it the auditors need detailed access to the records. So who audits THEM?

This kind of question has been asked repeatedly since at least the Roman Empire.

(The U.S. answer to "Who guards the guardians?" , at least for direct abuse of person under color of law, is the Fourth and Fifth amendments and the "fruit of the poisoned tree" doctrine: Fail to follow the law and you don't get a conviction, because misbehaving police are FAR more of a problem for the population than even a lot of violent private-enterprise crooks going back to work. But while it does reduce the incentive, it doesn't block the behavior.)

Comment The invisible hand strikes. (Score 4, Interesting) 124

Not one organization I have ever worked for has seriously cared about IT security.

When it comes to rolling out new products, ignoring security is the norm.

This is because the "window of opportunity" is only "open" for a short time - until the first, second, and maybe third movers go through it and grab most of the potential customers. Companies that spent the time to get the security right arrive at the window after it closes.

This happens anywhere the customers don't test for and reject non-secure versions of the "new shiny" - which means enterprises sometimes hold suppliers' feet to the fire (if the new thing doesn't give them an advantage commensurate with, or perceived as outweighing, the risk) but consumer stuff goes out wide open.

Then, if you're lucky and the supplier is clueful, they retrofit SOME security before the bad guys exploit enough holes to kill them.

I expect this will continue until several big-name tech companies get an effective corporate death penalty in response to the damages their customer base took from their security failings. Then the financial types will start including having a good, and improving with time, security story (no doubt called "best practices") among their check boxes for funding.

Comment Re:Why not coax? (Score 1) 156

And the reason you cannot do this with radio is that the noise from the transmitter is greater than the received signal.

Actually you CAN manage it with radio - very difficultly, with very careful antenna design.

But the combined antenna has to be far from anything that reflects, absorbs, or just phase-shifts any substantial amount of the transmitted signal energy. If not, the discontinuity destroys the careful balance that nulls out the transmitted signal at the receiver. That gets you back to the "transmitter shouts in the receiver's ear much louder than the distant communications partner" case. So it's not very practical in the real world.

Comment Re:Why not coax? (Score 1) 156

Coax is half-duplex too

No, it's not.

With proper impedance matching networks and reasonable termination at the ends of a run you can send separate signals at the same frequency/band of frequencies down a cable in each direction. (Impedance discontinuities DO reflect some of the signal going one way back the other way, causing some interference. But even that can be "tuned out" by suitable corrections if it's too severe to just ignore.)

You can do it on a balanced pair, too. Telephones have done this with audio for more than a century, and I recall encountering a simple hack to do it all the way down to DC back in the days of discrete-transistor logic. (And it has nothing to do with two wires being involved, either. With N (= any power of 2) conductors and "phantoming" you can have up to N-1 balanced and one unbalanced two-way transmission lines on N wires.

Time Domain Reflectometry does this to FIND and MEASURE discontinuities in a cable, essentially firing a pulse down the cable and listening to the reflections, radar-style.

Comment Re:What selfish bastards (Score 2, Informative) 198

RTFA. This procedure is illegal in the USA, so the parents went to Mexico. This baby IS an immigrant.

1. The article says that this is a Jordanian couple who sought treatment from U.S. doctors, and that the U.S. doctors chose to perform their work in Mexico.

2. The article doesn't suggest that anyone was an immigrant anywhere (def'n: "a person who comes to live permanently in a foreign country.). People appear to have temporarily traveled to do stuff, then returned to their respective homes. So, the baby is an immigrant to where? The parents' home country? Because?

3. Finally, there's this little thing called citizenship by birth, which the not terribly reliable but readable-by-non-arabic-speaking-me source suggests is automatic for this child. Your own country, by definition, is not a foreign country, which means that you cannot be an immigrant to it. Similarly, for a child born abroad to a U.S. citizen parent in wedlock, odds are pretty good that they're already a U.S. citizen, falling on the "Nationality" side of the Immigration and Nationality Act.

Comment Re:No, it's not reasonable (Score 1) 131

You realise that Kosovo fought a particularly bloody war of independence against Serbia in the 1990s after the breakup of Yugoslavia and, after a period of protectionism under UN administration, declared independence from Serbia in 2008 - that independence is recognised by 109 UN members, so it is not a pseudo-state, it is a state by recognition, and Serbia would most definitely want Kosovo back if it were to be allowed...

Comment Re:Coming from Detroit (Score 1) 76

There is no security on the CAN communications of any modern vehicles that I know of. Any person connected to the bus can masquerade as anyone else.

That's why Tesla has several layers of bus, with firewalls between them, inside each car.

Get on one of the buses, you get to tweak the stuff on THAT bus. But you have to convince a firewall you're cool (i.e. doing something the firewall recognizes as legitimate) before it forwards your transaction to anything on even an adjacent bus.

Comment Re:so unbelievable its posted twice (Score 2) 181

This story is a couple of hours after the allegation story, if that story was updated with the denial and explanation now, there would be near zero discussion on the denial and explanation while the outrage about the allegation would stand in full.

That is why something as big as this is due two separate stories when the allegation and denial are that far apart - now go discuss the new "information" on the topic, does it change any viewpoints from the last story? Lets watch and find out.

Slashdot Top Deals

Just go with the flow control, roll with the crunches, and, when you get a prompt, type like hell.

Working...