Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
PlayStation (Games)

PS3 Hacked? 296

Several readers have sent word that George Hotz (a.k.a. geohot), the hacker best known for unlocking Apple's iPhone, says he has now hacked the PlayStation 3. From his blog post: "I have read/write access to the entire system memory, and HV level access to the processor. In other words, I have hacked the PS3. The rest is just software. And reversing. I have a lot of reversing ahead of me, as I now have dumps of LV0 and LV1. I've also dumped the NAND without removing it or a modchip. 3 years, 2 months, 11 days...that's a pretty secure system. ... As far as the exploit goes, I'm not revealing it yet. The theory isn't really patchable, but they can make implementations much harder. Also, for obvious reasons I can't post dumps. I'm hoping to find the decryption keys and post them, but they may be embedded in hardware. Hopefully keys are setup like the iPhone's KBAG."
Image

Scientists Say a Dirty Child Is a Healthy Child 331

Researchers from the School of Medicine at the University of California have shown that the more germs a child is exposed to, the better their immune system in later life. Their study found that keeping a child's skin too clean impaired the skin's ability to heal itself. From the article: "'These germs are actually good for us,' said Professor Richard Gallo, who led the research. Common bacterial species, known as staphylococci, which can cause inflammation when under the skin, are 'good bacteria' when on the surface, where they can reduce inflammation."

Comment Documentum bad (Score 1) 438

I'm on the IT Applications side of things, not operations so my experience with this has been more as a user than as an admin (though I've helped that group on a few things)...

...but we implemented Documentum and have found it to be slow, difficult to deal with and I've heard no end of horror stories about how hard it was to implement.

In all honesty we had a properly set up sharepoint (tsk!) solution at another company and it pretty much ran itself and did the job we needed it to do. YMMV.

Comment Eleventy-billion dollars... (Score 1) 64

I would rank and identify the projects you feel are most needed in the security area and then do some research and bring the ones you can make a realistic case for. Management likes numbers but keep it concise and honest. They also like to think they, being excessively smart, hired excessively smart people so cover all your bases beforehand.

If you can say "We could buy this system which severely decreases the chances of X happening. When X happened to Bob, Inc. they lost eleventy-billion dollars in revenue, downtime, lost productivity, etc... This system has positive feedback from these five major corporations who have successfully implemented it accross their enterprise in an average of 4 months and since implementation, none of them have had X happen to them. The realistic chance that we're going to be targeted by something like this within the next five years is about 10%."

Solve for X... and Bob, Inc, "eleventy-billion", 4 months and 10%.

Also remember that while you're doing a lot of estimating on the risks/savings, so are the people who are arguing for the new ERP system or what have you. You may not win the argument, but when X happens at least you have "I told you so".

Slashdot Top Deals

The world is moving so fast these days that the man who says it can't be done is generally interrupted by someone doing it. -- E. Hubbard

Working...