Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Submission Summary: 0 pending, 29 declined, 0 accepted (29 total, 0.00% accepted)

DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - How do we know if secure sites really are secure? 1

acoustix writes: We see advertising everywhere for secure, encrypted storage in the cloud. How do we really know that these providers are really encrypting the data? How can it be proven that I'm the only person who can decode and view the data? With all of the stories about the NSA and random website security breaches I would like to know if it is possible to prove that a hosting provider is truly secure with only having access using their clients and web interfaces.

Submission + - Protecting Company Data

acoustix writes: I've been tasked by my company to find a way to protect company data from rogue users. We keep firewall and web usage logs and we have the capability to archive emails. However, there is one feature that HR is requesting that seems like it would be difficult to implement. The company wants to be able to basically freeze or take a snapshot of all data that a user has access to at any given time. This seems like a huge task to me because some of our users have access to hundreds of gigabytes of data including databases and office files on windows shares.

We do have a virtual environment where taking a snapshot of data is possible, but applying the snapshot to review the data would be destructive to the data that has been created/modified since the snapshot. Is there software available that would track user access and changes?

Submission + - Volunteer Work And Contracts? 1

acoustix writes: I am a member of a loosely organized group of IT professionals in my city and I’m a full-time network administrator by trade. Recently I have been active in doing volunteer consulting for a community organization. This organization wants to move their website from the current hosting/maintenance provider to a new hosting company and use my group of IT pros as the web developers. I’m fine with this aspect as we plan to redesign the website and use Drupal. During these discussions the scope increased to include a unified website for the community organizations as well as the city website. I know that the work can be done, however there will need to be contracts signed by the IT group. This contact will include service level agreements and other basic clauses. The contract will obviously protect the community organizations, but what about my IT group? The organization is planning on donating money to the IT group to be used for training. How can we protect ourselves? One thought is to make my volunteer status conditional on the basis that I continue to have a full time job that allows me to do this volunteer work. Obviously if I were to lose my job I couldn’t afford to do volunteer work. Another thought is that this website is not used to make a profit at my expense, and if it does then I will need to be reimbursed for my contributions. I will also want an exit strategy from this project after the objectives have been met. What should we do to make sure that we’re not taken advantage of? What would you do?

Slashdot Top Deals

"All the people are so happy now, their heads are caving in. I'm glad they are a snowman with protective rubber skin" -- They Might Be Giants