Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Comment Sysadmin Day Events and Discounts (Score 2) 200

We're celebrating in Columbus, OH this evening at the Three Legged Mare...

http://eevent.com/lopsa-columbus/2013sysadminday

Events all over the place, more listed here...

https://lopsa.org/content/sysadmin-day-events

LOPSA has a significant discount for renewing members and new members until Sunday...

https://lopsa.org/content/sys%C2%A0admin-day-discount-until-728

Happy System Administrator's Day!

IT

Submission + - Searching for Backdoors from Rogue IT Staff (serverfault.com)

WHiTe VaMPiRe writes: When IT staff are terminated under duress, there is often justification for a complete infrastructure audit to reduce future risk to a company. sysadmin1138 recently answered a question on Server Fault that provides a through exploration of the steps necessary to maintain security. Read more at How do you search for back doors from previous IT?

Comment Re:Who is PCI compliant? (Score 1) 157

Was this supposed to be moderated Funny?

If you focus on the high-level requirements, it is certainly easy to take them out of context.

Quoted from the PCI document [1], "Malicious software, commonly referred to as âoemalwareââ"including viruses, worms, and Trojansâ"enters the network during many business approved activities including employeesâ(TM) e-mail and use of the Internet, mobile computers, and storage devices, resulting in the exploitation of system vulnerabilities. Anti-virus software must be used on all systems commonly affected by malware to protect systems from current and evolving malicious software threats."

Is Linux commonly affected by malware? No auditor is going to expect UNIX servers to have anti-virus software installed.

Item 6, "Ha!" ... nevermind the multiple detailed requirements under the high level bullet.

PCI is fantastic. It allows IT departments leverage to implement sometimes costly best practices that companies prefer to consider cost centers.

I'm still hoping you're just trying to be funny.

[1] https://www.pcisecuritystandards.org/security_standards/download.html?id=pci_dss_v1-2.pdf

Slashdot Top Deals

A committee takes root and grows, it flowers, wilts and dies, scattering the seed from which other committees will bloom. -- Parkinson

Working...