Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×

Comment Re: How the hell is this still a problem? (Score 1) 49

Knowledgeable hacker takes job at Arby's running a register or slicing meat. Hacker waits until he can get unsupervised physical access to store system (a Windows PC, presumably). Hacker arranges off-site access to system. Hacker quits job, accesses system remotely and has his way with them.

That is an interesting scenario but I am betting it will be another case of the attackers compromising a third party vendor and then working their way into the system like the Target breach, the Wendy's breach, etc. A business can have the most robust security system in the world, but if their business partners are lax it is all for nothing.

Comment Re:Bring broadband to all Americans... (Score 1) 292

Yes, we want to bring broadband to all Americans... so my ex-clients can gouge the shit out of them with rent-seeking behavior, unneeded service caps and fees, and charging content providers that aren't directly owned by the ISP access fees after we shitcan Net Neutrality!

Not to be all devils advocate but the same thing was said about Tom Wheeler when he was picked by Obama to head the FCC. And Wheeler ended up being a strong advocate for Net Neutrality and tried limiting cable and telephone monopolies. Of course the odds are that Ajit Pai will be so deep in the pockets of the cable and telephone companies that it would take a search team three weeks to find his nose, but it is not unheard of that a former lobbyist bites the hand that fed them.

Comment Re:Non-zero sum (Score 4, Insightful) 90

Intimidation.

They were not intending to go through with the suit and were using the threat of having a $200,000 judgment against here as a way to pressure her into removing her review. They were hoping she would cower and hide away, not bitch SLAAP them for $26K with the help of an actual honest lawyer.

Comment Re:CHina's Mistake (Score 1) 742

Sure, as long as you're ready for the next iPhone model to cost twice as much as the previous one and be capable of less. There are reasons why manufacturing and assembly line jobs have moved out of the USA, you know.

Damn those OSHA requirements and labor laws, I want my cheap iPhone now!

Comment Re:SJW (Score 1) 287

the evidence is evidence no matter how it is obtained. That's the only logical way.

"A confession is a confession no matter how it is obtained. That's the only logical way."
Throwing away the bill of rights to convict someone we don't like is a very slipper slope we should not go down. They are there to protect from wrongful convictions and while it does allow the guilty to go free if proper procedures are not followed by the state like in this case, I prefer that to the alternative.

Comment Re:Rotten tomatoes indeed (Score 3, Insightful) 407

Also... change.org was neat for a while..

Did change.org petitions ever actually accomplish anything? I am serious cause change.org sounds like a site for people to sign onto a petition no one will read. Does the petition ever get sent anywhere? Let alone to anyone who can make decisions?

Not trying to be rude but at least with paper petitions the recipient knows someone did the legwork to get people to sign. Change.org seems to be the epitome of armchair activism.

Comment Re:Turnabout IS fair play... (Score 1) 765

Typically when a company lays off an employee (or a few employees) as part of a layoff, how much notice do they give?

Usually it's immediate and involves a security escort to HR.

This, so much this. If your employer is one of the good ones and treats their employees fairly then feel free to give two weeks or however long it takes for a handover.
However if they just got done firing 1000 employees so the VP can make his bonus, and you are one of the skeleton crew left feel free to drop their ass like a bad habit. They show no loyalty and should get none in return.

Comment Re:Strong enough for a man, made for a woman (Score 2) 858

You just have to look at the outpouring of rage from whiny-ass MRA manbabies regarding the re-boot of Ghostbusters with an all-female cast to see how this mechanism plays out.

Funny, most of the MRA groups I know of are more concerned with social issues like disparate child custody decisions, prison sentencing and other inequalities in the justice system biased against men. The only group I have heard make statements on the Ghostbusters movie was the Red Pillers at Return of kings. Was that what you were referring to?

Remember the outrage over the latest Star Wars? How the MRAs were going to boycott? They degrade all of masculinity with their incessant whining.

Again not familiar with MRA's weighing in on popular movies, Return of kings did though and you should rightfully ignore them, they embarrass everyone including MRA's so please do not conflate the two.

Comment Re:Damnit, it is a MEDICAL INSTRUMENT! (Score 1) 266

MEMO TO IT GUYS: Stop treating medical instruments like they're desktop computers! Find another solution, or AT LEAST be smart about how you're installing your junk on it, IT IS A MEDICAL INSTRUMENT, DAMNIT!

To you it is a medical instrument, to would be attackers it is yet another unpatched windows box. How IT views something is not the same as how you do and if the organization's perimeter is breached your medical instrument might be a low hanging fruit for exploitation. Granted after exploiting it they may not find anything particularly useful on the device itself but they might find credentials to use elsewhere in the network. You have to remember cases like Stuxnet where the worm targeted Windows boxes used for running centrifuges, everyone else saw centrifuges but the attackers saw windows.

Now I am not defending the IT guys, if the system cannot have antivirus on it then it cannot have antivirus on it. The proper solution would be to keep the device off the network or isolate it inside it's own network away from everything else. They should be able to work with systems that cannot run AV and design security around that, not slap AV on everything and call it secure.

Slashdot Top Deals

We all agree on the necessity of compromise. We just can't agree on when it's necessary to compromise. -- Larry Wall

Working...