Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:We Were Attacked! (Score 1) 75

"LOL! You think so? Let's say your own DNS infrastructure is a victim of this attack with the same magnitude. Are you able to handle this?"

Yep, all fucking day without even looking, and IPv6 will make it even easier. It's called a static IP address and not having more fucking domain names than you can handle.

While everyone else was fucked, my sites ran without a problem, and they all use DynDNS.

Comment The press will get burned. (Score 1) 357

Suppose you had 30,000 purloined emails, and access to the resources of a major state. A simple disinformation move would be to have minions read them all, and select and modify a tiny number (say, 5 or 10) to become explosive (add a racial slur, a phrase about keeping ill gotten gains, etc.). Make those changes, and then release the whole mess*. Wait for the press to find your land mines, enjoy. Yes, these changes could probably be disproved in court, but that's not the goal of a disinformation campaign.

In this scenario, the press will inevitably become collateral damage, but the perpetrators are not likely to care (and may even view that as a side-benefit).

* If there are integrity checks, such as MD5 sums, either hack them or remove them. I don't think that will hinder anyone with an intelligence agency behind them.

Comment Re:I'm glad somebody is on the case (Score 1) 191

" Apple chargers are incredibly over-engineered to protect against many problems."

Except for people running them off square-wave inverters, and then your touchscreen goes to utter shit because of the real Apple charger (as in the one that came with my fiance's 4S) passing along some seriously wonky power and signal. Give it a shot, hook up to an O-scope and watch for yourself. You might even be able to hear a slightly audible buzzing from the iDevice itself.

Comment And after half an hour of probing their website (Score 1) 49

I spy so much shitty code. Most of the site doesn't even serve static content from a cookieless domain, and most of the site itself is scripting/code instead of media/text.

Exploitable from the bottom up.

Turn your own people against your site first before advertising out to others, eh?

Comment Re: Were the users randomized? (Score 1) 523

The actual solution is fire everyone that has no expertise doing their own troubleshooting and hire people that possess these capabilities, company-wide.

*THEN* you can get rid of the help desk, and downsize all the other departments (including IT) because there will be far fewer support requests coming from the other departments, and the people at the computer are likely to be faster and more productive. They're also likely the kind to help you find even MORE efficiency to gain, and let you know FREELY about it. They might even have the system already designed and an implementation ready for you to try!

That's how you run shit as CIO. You get the CEO, CTO, and COO on board with that plan and go. Real lean, you can pay the fewer people remaining more money AND still manage to pocket a good chunk of money on the side.

I have no clue why the fuck anyone needs a degree to figure this out.

Slashdot Top Deals

Despite all appearances, your boss is a thinking, feeling, human being.