Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. ×

Comment this applies to all EU and Canadian citizens too (Score 1) 114

Under the treaties that the US signed with the EU and with Canada, this applies to all such recordings - even in the US or stored in the US - of any conversations of citizens of the EU and of Canada.

Next time, don't sign treaties which overrule laws passed by Congress.

Submission + - Java and Python FTP Attacks Can Punch Holes Through Firewalls (csoonline.com)

itwbennett writes: Over the weekend, security researcher Alexander Klink disclosed an interesting attack where exploiting an XXE (XML External Entity) vulnerability in a Java application can be used to send emails. At the same time, he showed that this type of vulnerability can be used to trick the Java runtime to initiate FTP connections to remote servers. After seeing Klink's exploit, Timothy Morgan, a researcher with Blindspot Security, decided to disclose a similar attack that works against both Java's and Python's FTP implementations. 'But his attack is more serious because it can be used to punch holes through firewalls,' writes Lucian Constantin in CSO Online.

Comment My female colleagues and friends agree (Score 1) 904

I have heard this from so many women scientists, systems engineers, and other IT specialists who are female.

There is a problem.

My key ROI on this is:

1. Stop using the old boys network, your frat buddies, to find recruits. Set a goal of 50 percent promotions, 50 percent board position candidates, and 50 percent new hires being female.

2. If you think having one woman in the after hours drinking means you're diverse - you're wrong.

3. If you're female, stop undercutting other women when they have ideas. Most groups won't hear a woman's idea unless at least two women agree with the idea. If a male steals credit for the idea, call it out right there. Don't wait for a "good moment to bring it up". There is no good moment.

4. If you find 1-3 impossible, then you're just pretending you're a real business.

Submission + - Wyden to Introduce Bill to Prohibit Warrantless Phone Searches at Border

Trailrunner7 writes: A senator from Oregon who has a long track record of involvement on security and privacy issues says he plans to introduce a bill soon that would prevent border agents from forcing Americans returning to the country to unlock their phones without a warrant.

Sen. Ron Wyden said in a letter to the secretary of the Department of Homeland Security that he is concerned about reports that Customs and Border Patrol agents are pressuring returning Americans into handing over their phone PINs or using their fingerprints to unlock their phones. DHS Secretary John Kelly has said that he’s considering the idea of asking visitors for the login data for their various social media accounts, information that typically would require a warrant to obtain.

“Circumventing the normal protection for such private information is simply unacceptable,” Wyden said in the letter, sent Monday.

Submission + - SPAM: Gitlab post-mortem: Proper naming convention prevents mistakes

AmiMoJo writes: Gitlab's very public meltdown has been mostly recovered now. If there is one thing we can learn from this incident, it's the importance of proper naming conventions. The person responsible for the mistake intended to operate on "db2.cluster.gitlab.com", but accidentally wiped "db1.cluster.gitlab.com" instead.

What naming conventions do Slashdot readers use and have you experienced any similar failures?

Comment Actually, isn't that a religion there? (Score 1) 207

Fairly sure I saw a documentary on The Norden (the series is on YouTube) and one episode was about Religion, in which a US Baptist minister went to various Northern European countries. One was Sweden and he met one of the church members of the Data Sharing Religion, who believed that copying data and streaming was a sacred act.

Submission + - Deleting your Yahoo email account? Yeah, good luck with that (zdnet.com)

An anonymous reader writes: Several Yahoo users, who last year decided to leave the service, told us that their accounts remained open for weeks or months after the company said they would be closed.

News broke in September of a massive state-sponsored cyberattack that led to the theft of 500 million records — then thought to be the largest theft of records in history. That alone was enough for some to take action and delete their accounts, months before the company admitted it was hacked again — this time taking 1 billion accounts.

One user told me that they deleted their account "the day the breach was announced" in late September. But as of the end of January, he was still receiving messages that were automatically forwarded from his Yahoo inbox.

Another user told me that they thought their account was "supposedly-terminated" days after news of the hack broke, but confirmed his account was still active — when it should have closed by December.

Slashdot Top Deals

Much of the excitement we get out of our work is that we don't really know what we are doing. -- E. Dijkstra

Working...