Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:And these breakers are connected to the network (Score 1) 29

Airgaps only make a grid unmanagable which would lead to more poweroutages. The answer isn't airgapping, it's actually knowing security.

If your idea of security is to simply airgap then you're going to fall victim by many other attack vectors.

Exactly. Have we all forgotten about Stuxnet already? For those who don't know, Stuxnet is a worm that attacked Iran's nuclear weapons facilities. Iran had their variable speed drives airgapped (standard Siemens SCADA system). And yet, Stuxnet crossed over, and managed to reprogram the drives in such a way that they failed prematurely (and part of Stuxnet is hiding the fact that it's mis-driving the drives so they'd fail).

Airgaps simply don't work anymore - there's too much informati0on that needs to be transferred between an airgapped network and the regular network that it's now a vulnerability to get the airgapped network infected.

Comment Re:It's true (Score 1) 256

I don't think what you describe is unique to Pixar, and we have similar inflexibility in the semiconductor industry.

It's not unique. It's because your company is run by managers who realize both the nature of the work (there are deadlines that are hard to move) and there will be periods where you're working extremely long hours. But they also realize the importance of family, so they invite your family to come over and join you during break periods so you don't get all bogged down in work.

For some companies, Pixar and many semiconductor ones, allowing unauthorized personnel even in "public" areas is quite a big deal (who knows what they may see or overhear). That they allow children and spouses to hang around is a really big deal - it shows the company cares about the well-being of its workers. Sure they're in a public area, bur even in a private cafeteria often sensitive things get discussed.

So no, it's not unusual, it's only unusual in that the company cares about its people, and knows that while the crunch time is unfortunately necessary and temporary, they also know that having family over for meals means a lot to the workers. Especially since security policy can easily demand that the family be stuck outside the main door.

Comment Re:Good Idea (Score 1) 48

Bug-Fixing before release/update of any software is always a good idea, be it open source or in properitery software. So I am glad that Linus decided to wait to fix the update before pushing it out.

I think the NVMe issue is a showstopper, which is why they're taking time to fix it. If anyone isn't familiar, NVMe is an SSD attached to the PCIe bus - given we've already maxed out SATA3. NVMe bests that with the newest SSDs pushing 2GB/sec+ in reads and 1GB/sec+ in writes (SATA3 was limited to 540MB/sec, which is why all SSDs pretty much tested at that level).

It sounds like it could be a catastrophic bug and the last thing anyone wants is a kernel release that kills user data

Comment Re:If he gets busted... (Score 1) 88

Self-defense is not retribution. Third-party defense is always considered valid when a threat is imminent.

All the data we have shows that devices that are vulnerable to Mirai, et. al. will become Mirai bots in a short amount of time, and will begin attacking third-party Internet infrastructure.

If somebody can show the above claim to be false, please do so, showing reason and evidence.

But in many jurisdictions there can be limits to what you can claim as self-defense. For example, shooting a burglar running away will actually land you with manslaughter or attempted manslaughter charges in quite a few places. The response has to be measured and not excessive.

So depending on where you are, a vulnerable IoT device that getws bricked without being a part of a botnet might be seen as an excessive response, especially if you can do a more measured one instead (e.g., disable routing so it cannot get on the internet, or simply disabling it with a warning). Destroying it or bricking it may be seen as excessive. Now, if it was participating in the botnet, then maybe bricking it can be seen as an appropriate response.

Comment Re: They simply remember your UDID (Score 2) 114

They're adding functionality that Apple refuses to do. If you cheat in a Steam game, your device and account gets banned. On iOS, apparently, you just uninstall and reinstall and then you can fraudlently order cars all over again.

Actually Apple had that ability. The removed it in iOS7 because developers were abusing it for... tracking purposes. They were sending the device unique IDs to advertisers and giving advertisers a per-device view into everything - location information (if allowed), system information, etc.

Apple removed the ability to get that information because it was abused - they now present different forms of unique IDs to apps for various purposes. They have an advertising ID, resettable on user's command and a few others. It is no longer possible to track an individual device because users privacy was being compromised.

So it's not likely it's coming back - developers have shown they cannot be trusted with it.

And if Steam can ban an email and user from their network, so can Uber. Of course, I'm presuming you need an Uber account in order to hail a taxi from them, because they need to charge your credit card for the trip, then there are plenty of ways to track that. Unless a freshly installed Uber only needs a credit card, but I'm sure Uber can track those as well.

And if Uber is using iTunes account balances, then they easy way is to just stop doing that.

Comment Re:Normal practice in Corporate America (Score 1) 169

That was the case in the US from the Great Depression until the 1990s. Then we repealed the law that required banks to be so boring.

Now banks can invest in derivatives and all sorts of interesting and exciting things. When those exciting investment vehicles turn out to be garbage, we get the 2008 recession

(The 2008 recession in the US was primarily caused by bundled mortgages. Banks and bank-like entities would make a mortgage loan to any vaguely human-like entity that could demonstrate they were alive. Since a large portion of these loans were garbage that would obviously go into default, the banks and bank-like entities bundled them together and then sold "shares" of the bundle. "An individual loan in this bundle may go bad, but surely they won't all go bad!!". To further reassure investors, the bundlers took out insurance policies that were based on other bundled securities not failing. So when the housing market boom inevitably busted, all those bundles turned to shit. And since they were insured via other bundles that had turned to shit, the entire banking sector of the US was in trouble.)

Actually, that happened in the 70s. Mortgage bundling started around that time too, but of course, they only bundled AAA class mortgages together. Which worked until the late 90s or so, when all the AAA mortgages were all bundled together. Banks were happy because this made those investments less boring.

Then someone created a formula that told you how you can combine a bunch of less-than-perfect mortgages (subprime mortgages) and weigh them as if they were AAA mortgages, and banks became happy again because AAA mortgage bundles were boring, and now if they could include AA, A, and lower class mortgages but still value them as AAA mortgages, then it's exciting again.

Until people realized that such mortgage-backed securities, under closer scrutiny were crap because they were backed by crap.

Hell, people were signing up for mortgages that didn't deserve them - there was a nice acronym called NINJA - No Income, No Job Application. Of course that mortgage is going to get defaulted on.

Comment Re:Data caps (Score 1) 65

How about just get rid of data caps. My300/100 connection is uncapped with Bell. Why can't it be that way everywhere in Canada?

That's what the CRTC is trying to do with this ruling. By having all traffic count towards your cap, consumers will reasonably demand that their caps be increased. And given that caps are relatively cheap, then raising them costs very little additional money to the iSP.

By doing this ruling, they're making sure users of Netflix etc., who may have been zero rated start demanding that their ISPs give them reasonable caps and not stupidly small ones.

Comment Re:Your working assumption makes an ass out of you (Score 1) 296

So you're claiming that even where the methodology is faulty, if it differently faulty in an individual case then the person under study must be suspicious?

I don't think you really understand the "faulty" part in "faulty."

Was it faulty methodology, or just unconventional and different? As far as I know (I watched the show) it seemed like a reasonable test that is used for other purposes as well.

And yes, suspicion must be cast. Remember dieselgate? Just because VW cars passed under the standard test meant they passed under a different test. In fact, it was the fact that the test results of the different test didn't line up that caused people to wonder what was happening. And it turns out in the end that the results were being gamed - when the car detects it was being tested, it cheated.

Want another one? Melamine in milk. Chinese farmers were watering down the milk. But if you do that, they can tell because the milk protein concentration goes down as well. So they added melamine to the milk, which resulted in the measured milk protein to be back to normal.

It's entirely possible that Subway is innocent. But it's also just as likely they're cheating. They're well known to abuse their "we're a healthier alternative" to offer pretty lousy food. Heck, for a long time, their "brown bread" (or "whole wheat") actually was white bread colored brown (by the same CBC folks, too). They analyzed the ingredients, and enriched WHITE flour was the first on the list. They found additives like caramel, molasses and others were added to color the bread brown. (Yes, they added a few whole grains in there, after the fact). The reason people found out was diabetics were wondering why after eating a "whole wheat bread" sub from Subway, their blood glucose readings spiked dangerously high - turns out their "brown" bread was basically sugared white bread.

Comment Re:Your working assumption makes an ass out of you (Score 1) 296

True, the CBC investigation did things in an odd way.

However, the results from the other chicken fell into reasonable expected values (85-95% chicken). Thus, when Subway's fell well outside the expected value, something is up.

Now, granted, using the industry standard testing methods returns the right value, but you do wonder if there's something else going on - is someone gaming the system so it tests properly, or what's happening so that everyone else measures properly

Comment Re:Well there's your problem (Score 1) 106

Automatic here, I use the parking brake every time I park. It's the way I was taught to park a car, plus I know it works in the unfortunate event it has to be used as an emergency brake. Car is 40 years old btw.

I was taught the same thing. Yes, you put the car in Park. But you also engage the parking brake because the transmission does lock in Park, but it's only a little piece of metal. The parking brake is cheap, a transmission is expensive.

Also, on modern cars, there is no "e-brake" anymore. The parking brake is just that - a parking brake. You cannot use it for emergency stopping. It activates the rear brakes. The "E-brake" is really just the normal brakes, mostly because modern systems with traction controls, anti-lock brakes, etc, means each wheel gets an independent braking hydraulic taking one out doesn't take out the whole system.

Comment Re:Any chance we can port this out (Score 4, Informative) 109

It probably translates all the Linux calls into Windows calls straight into Windows' NTFS driver. So, probably not useful for what you're thinking.

Indeed that's what it is.

WSL is effectively "GNU/kWindows" where Linux ELF binaries can run on the Windows kernel using the Linux kernel personality that translates Linux calls into Windows NT Kernel calls and where security, filesystems, etc are handled by the Windows kernel as expected.

There's no linux code actually in the system (other than perhaps headers translating the syscall numbers into actual system calls). Likewise, networking is done via Windows NDIS networking, as well as all the other kernel services. Several times I had to sit down and figure out what was actually happening - I had to add an /etc/hosts entry and i needed to figure out how it worked. (Hint: WSL is a kernel layer, so what happens is glibc will look at /etc/hosts, so I should edit the ubuntu /etc/hosts, not the Windows one. The Windows one is used by the Win32 resolver, while the Ubuntu one is used by glibc, and the tools I was using use glibc).

Comment Re:What am I missing? (Score 1) 40

But Tesla is in CA, where non-compete agreements are largely void.

Key word: "largely".

If you're a low-level worker, they're basically void - non-competes and non-poaching clauses don't apply.

Non-competes and no-poaching clauses are valid for high-ranking executives though, where it's assumed they are generally intelligent enough to have their own lawyers review and revise contracts and generally have the power on the employment relationship. Plus, the compensation is generally structured around those clauses too.

Comment Re:Still Don't Get It (Score 1) 65

I still don't get it. What else would you run these apps on if not a Mac or iOS device? (To me, they've always been free so...what changed?)

You don't have to purchase a NEW iOS or Mac to get these apps anymore.

That's what's different. Of course, given that Apple has had this thing going on for years now, I'd be surprised if there was someone that wasn't already eligible for them. You'd have to be toting around a really old iPhone (probably around the 3GS era) or a really old Mac (over 10 years old) to not qualify.

Comment Re:Gerrit (Score 1) 313


Gerrit requires code be approved before it will merge it into the mainline branches. It replaces a centralized Git server.

Deployments pull from the official Gerrit mainline, while developers can push/pull into their own private branches without requiring approval. But to push to mainline requires approval and review.

And there's a full chain of custody - if some bad code gets approved, you can see all the comments and who approved the change.

It's a bit tricky if you need to revise a fix, but it just means alternate, supported forms of the standard Git commands you're used to.

Comment Re:Why cant Google just reply with a MacDonalds pl (Score 1) 448

Or why not remove Burger King from their search engine? A milder version would be pushing up a warning page when searching for Burger King or any of their trademarks...

And the MPAA and RIAA would LOVE this because it means Google CAN do it, WILL do it, and are doing it for stupid reasons.

Instead of having to "legally" prove a site is bad, why not have Google remove piracy sites for possibly having links? I mean, you removed Burger King because they embarrassed you, so why not remove these sites because no proper search engine should link to less than legitimate sites? And BK was for all intents, more legitimate.

As much as Google wants to, they can't, lest they get a flood of requests to ban all sorts of things "because you proven you can, and will do it for the silliest of reasons".

Slashdot Top Deals

In any formula, constants (especially those obtained from handbooks) are to be treated as variables.