Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Already possible (Score 1) 126

Having good system security is already possible. It just requires good software and good security practices.

First get some really good encryption software that can be trusted (no, Microsoft's (aka 'Apple should have weak encryption and build in back doors') BitLocker is *not* trustworthy). BestCrypt or DriveCrypt Plus Pack both seem reliable and better still neither are based in United States.

Good security practices includes having a kill key that will wipe the internal memory where the key is kept, which also wipes the operating system in memory also which crashes the computer. Hit the kill key and everything locks. Good security is the drive automatically dismounts after a set timeout period of no activity. Good security is a strong password. To over-simplify a Bruce Schneider article a key-character only gives 2 bits of entropy. A good starting place for strong drive passwords is 50 characters.

Be careful about physical security. I forget who, but the FBI wanted to get into the computer of a mobster, and the computer had a strong password. They got a secret warrant and installed a dongle on the computer which recorded keystrokes. Now days they can replace keyboards and computer mouse with look-a likes that have built in key recorders. Watch your ports and beware odd hardware. Watch out for mini-cameras that can be installed and watching your keyboard.

Be careful about online security. As Snowden pointed out the NSA does have a wide array of software to hack into peoples computers. Don't install untrusted software. Don't accept dodgy links sent to you to visit. Do use some really good VPN software (it doesn't hide you perfectly but it does make it much harder for the NSA). Install virtual systems (ex VMWare Workstation) on your computer and work on really sensitive projects in there. Use an air-gapped computer that no access to the internet, Wifi, or internal network.

Having a system with a hair-trigger vibration guard and a wire cage drive enclosure is good but misses the point. The weakest link to security is usually the person behind the keyboard.

Comment A sad pattern (Score 5, Informative) 102

Checking Google reviews... Most telling is that Build Team is removing negative posts and people that say they did a bad job are routinely labeled as fakes or malcontents. Build Team states that they "hunt" people down on Google. Build Team seems surprised when projects take much longer than promised, when sub-contractors aren't working well, or when Build Team violates local ordinances. This is the worst kind of passive-aggressive PR management that I have seen. Now the real question is what other reviews and information is Google hiding from the public?

Please Build Team, don't sic your legal team on me. The comments above are entirely my own, until you backdate it and post it elsewhere. Knowing your PR strategy, you will probably report me for terrorism...

From Google reviews... (until they remove them)
(All one star reviews)
Martin Martin
Martin Martin
5 months ago-
Previous review disappeared.

Shoddy company - AVOID AVOID AVOID
Response from the ownerin the last week
This is a fake review by an individual purporting to have been a client of Build Team. We will report this to Google.

James Mcmillan
in the last week
Warning: DO NOT USE BUILDTEAM. I had one of the worst experiences with them. Very awful standard of customer service and of building. The company has many shoddy practices, and they're trying very hard to hide this from reviews. Please use someone else!
Response from the ownerin the last week
This is a fake review by an individual purporting to have been a client of Build Team. We will report this to Google.

David Murray-Thwaites
David Murray-Thwaites
a year ago
AVOID! We had a very bad experience. Build Team are well marketed but frankly awful group to deal with. Extortion is not too strong a word
Response from the ownera year ago
Build Team have not worked for this client, and having undertaken a Google search we cannot trace the individual. We have contacted Google to report the review as spam.

Submission + - Sneaky Android Malware Makes Its Way on the Google Play Store, Again (

An anonymous reader writes: Yet again, security researchers have discovered apps on the Play Store containing malware, which somehow managed to bypass Google's review process. This time around, the infected apps showed ads every two minutes, trying to fool users into installing other apps and downloading "system updates."

This is not the first time malware coders managed to go around Google's review process.The most recent case when security firms discovered malware-infected apps on the Play Store happened at the end of April when PhishLabs experts found eleven Play Store apps phishing for banking credentials.

Previously, at the start of April, Dr.Web, a Russian antivirus maker, found 104 Android apps infected with the Android.Spy.277 spyware variant. Before even that, at the end of February, ESET also discovered 343 Android apps infected with the Porn Clicker clickjacking malware, which worked by opening invisible browser windows to access adult websites and click on their ads.

Comment Things not to do... (Score 0) 321

Don't joke about bombs at US airports.
Don't joke about having drugs in front of police officers.
Don't joke about job issues in front of your boss/HR/coworkers
Don't joke about guns anywhere (especially schools)
Don't joke about money laundering to financial institutions.

Yes people are dumb enough to think these are funny and bad things happen to them. This is not news. Next time they will (hopefully) know better.

Comment Thank you sir! May I have another? (Score 3, Informative) 389

I sure it is a coincidence that Microsoft is forcing Win 7/8 users to upgrade to Windows 10, which touts its higher security. Don't worry, if you have private information you can use the Microsoft recommended product BitLocker, made in the USA and subject to US laws. I'm certain there aren't any backdoors. I'm glad that Microsoft will share Office 365 users info with government agencies to protect us. After all, the FBI would never be abuse its power, like sharing accessing info on political opponents to discredit them. Pay no attention that Microsoft was somehow vulnerable to 'FREAK' encryption flaw (!) - nothing to worry about here. I'm sure glad Microsoft is providing free email services like Hotmail. I'm sure Microsoft has the highest standards in protecting Hotmail users info and the times it has shared private information has been completely justified besides "you agreed to the service agreement".

Comment Why is Hansmeier not shielded by the corporation? (Score 1) 69

I read TFA, as well as the past articles. What I don't understand is how the individual, Hansmeier, is financially responsible for the liabilities of the corporation, Prenda. I understand that an employee of the organization, even the head or CEO, can go to jail (ex Enron or Tyco), disbarred, and/or fired. However one of the purpose of forming a business entity is to protect the individual assets in case of corporate disaster. Are all employees liable when a corporation goes bankrupt, or just the corporate officers?

Comment Welcome back, I guess... (Score 0) 109

I loved Bloom County in the 80s. I was sad to see the strip stop. However I moved on and now there are a ton of quality comics to take its place. Do you want sharp, pointed humor? Try Non-Sequiter (ex There is, (yeah, I know the comic is semi-mostly-retired), and PhD (Piled Higher and Deeper)

I'm sorry Bloom County, you were great in the 80s but now it is the 2010s. It might be interesting to read the new strips for the nostalgia factor but that would be about it. After a certain period of time you realize it is time to move on. (Big pointed hint to George R R Martin and his over-delayed next book in the Game of Thrones series)

Comment A victory for internet trolls (Score 2) 144

The gist of this is that now statement in and of themselves cannot be actionable until it can be proven that the mind of the person making the threat actually intends harm. The defendant in this case, Anthony Elonis, argued that he was a rapper and his statements could not be taken in context (i.e. "Fold up your PFA (protection order) and put it in your pocket Is it thick enough to stop a bullet?" and "I've got enough explosives to take care of the State Police and the Sheriff 's Department.")

Internet trolls rejoice. Now anything can be said, no limits to speech, no consequences as long as it can be proven that you don't mean harm. If in doubt, just sign all threats with JK (Just Kidding) or RL (Rap Lyric). People have been kicked off flights for jokes in poor taste (bombs, threatening airline employees...) but now the intent of the threat has to be proven. The internet has always had a large troll population. Now they can come out of the shadows, raise their middle finger, grin, and make very specific threats with impunity. If caught they can laugh and say JK/RL.

This leaves a most unclear situation where it becomes far more difficult to determine at what point does a statement become abuse and actionable? This is likely to spawn enough confusion about this ruling (7-2 no less) that more cases will be heard and with opposing rulings and head back to the USC for further clarification.

Comment Review (bad, boring) (Score 2) 91

I watched the film, despite the long commercials. Essentially (for me) it is was a waste of time.

A good scifi film should raise interesting questions (what is "intelligence", "human", "purpose"...) To some degree this film tries to achieve this. A computer more-or-less becomes self-aware on a long-dead spaceship. Okay, good start. However there is no point to it whatsoever. The computer sits in a chair and thinks and then watches the spaceship explode. Questions about why would someone send a (presumably) research vessel aimlessly into deep space, why design an AI that has no mission to accomplish (no programs, projects, repairs to do?), why did the crew die of old age (advanced spaceship and no cryo-storage?). Come on, a generational spaceship with crew being born, trained, and dying would be better. What destroyed the ship at the end?

I feel this film is a weird cross not of 2001, but of "A.I." (where the entire point is to see the robot play out the end of humanity to far-future space aliens discovering the ruins) and "Silent Running" which details a man trying to save the last bio-habitat space station by sending it out into deep space before Earth can destroy it. At the end of the film he hides the habitat in deep space so Earth can't find it, and beyond their reach. So effectively it is the same thing as destroyed, and pointless.

The commercials were more interesting than the movie. The film technique may be impressive and noteworthy. However to me I'd rather watch a film with so-so technique that is entertaining (ex "Avatar") vs something that is avant-garde and boring (ex: "HENRi", "Blue")

Comment Selective data (Score 1, Insightful) 552

Studies have been done on this before where the data was "managed". Certain readings that would show no temperature increase were not included citing "old equipment" or claimed that data was not relevant to their sample set. Certain instruments that would not support a desired result would have the equipment moved from the sheltered spot it was in to a much hotter area, for example over asphalt. Environmentalist have also been caught in changing the temperature reading on certain devices to be more favorable, which they called "statistical normalization" and "variance correction". Somehow this doesn't happen to equipment that supports their conclusions. Environmentalists can have the data show anything that they want.

Slashdot Top Deals

"All we are given is possibilities -- to make ourselves one thing or another." -- Ortega y Gasset