Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re:Just as well (Score 2) 368

What makes you think the firmware in your PCIe WiFi card also can't access all main memory

Something which is called an IOMMU.

https://en.wikipedia.org/wiki/...
Memory is protected from malicious devices that are attempting DMA attacks and faulty devices that are attempting errant memory transfers because a device cannot read or write to memory that has not been explicitly allocated (mapped) for it. The memory protection is based on the fact that OS running on the CPU (see figure) exclusively controls both the MMU and the IOMMU. The devices are physically unable to circumvent or corrupt configured memory management tables.

Submission + - 24-hour Switch to IPv6-only Proposed for June 8th (version6.ru)

Roman Mamedov writes: "Often cited as one of the reasons of slow IPv6 uptake, is the lack of Internet resources and services that require IPv6 for operation or access. In other words, "why bother implementing IPv6, if every website is accessible on IPv4 anyways?" To do something about this, let's continue the trend set by the World IPv6 Day in 2011 and World IPv6 Launch in 2012, this year by World IPv6 Jump, turning off IPv4 on your websites and services for 24 hours!"

Comment Re:End-to-end encryption (Score 3, Informative) 152

And how many ssh users actually check the key fingerprints and verify they match those stored on the remote host? Is that even possible in most circumstances?

Hello, have you ever used ssh? As in, at all? It raises a holy hell if the keys have been tampered with.

$ ssh hostname.tld
@ WARNING: POSSIBLE DNS SPOOFING DETECTED! @
The RSA host key for hostname.tld has changed,
and the key for the corresponding IP address xxxxxxxxxxxxxxxxxx
is unknown. This could either mean that
DNS SPOOFING is happening or the IP address for the host
and its host key have changed at the same time.
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that a host key has just been changed.
The fingerprint for the RSA key sent by the remote host is
zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz.
Please contact your system administrator.
Add correct host key in /home/username/.ssh/known_hosts to get rid of this message.
Offending RSA key in /home/username/.ssh/known_hosts:76
RSA host key for hostname.tld has changed and you have requested strict checking.
Host key verification failed.

Slashdot Top Deals

Why won't sharks eat lawyers? Professional courtesy.

Working...