Follow Slashdot stories on Twitter


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:"an incredibly secretive company based in Flori (Score 1) 130

I'm sitting in South Florida right now and you're absolutely right. There's no "secretive" tech being developed here. There's some tech, yes, but nothing on the cutting-edge at all. However, there is a constant stream of scam-bait coming from a bunch of old men who moved here from Jersey. They're always pitching some BS and I'm sure that's what this is.

Comment Re:Backfiring of IT's attempts to lock down Window (Score 1) 524

It's two extremes with Mac management on one side and PC management on the other. The Macs are barely managed at all, so they require virtually no support. The PCs are locked down to the point where browser plugins can't even update, which is counterproductive and adds to tech support demand.

Comment Backfiring of IT's attempts to lock down Windows (Score 1) 524

IT insists on centralized management and lockdown of Windows PCs to the point where any minor problem becomes a time consuming, difficult-to-solve issue. I've seen PCs slow to a crawl because SCCM is repeatedly failing to push down software. At other times, important software updates continually fail to install due to excessive policy restrictions. In all, it's just a continual battle of the IT support team versus the very own management infrastructure they put in place.

When our head support guy (6K users supported) was telling me how much less problems they had with Mac deployments, I asked him how his team manages the Macs. Guess what? No centralized management or lockdown at all.

Essentially, the difficulties of managing the Windows based PCs is entirely IT's own doing.

Submission + - Hardware Exploit Allows ASLR Side-Channel Attack On X86 Architecture (

An anonymous reader writes: Researchers from the State University of New York and the University of California at Riverside have developed a successful side-channel attack against the Address Space Layout Randomization (ASLR) feature of the X86 chipset architecture — an attack vector that is difficult to patch by software alone. ASLR protects the location of data stored on a computer, and mitigates against buffer overflow attacks. The attack, which is carried out on a user-level process via the Branch Target Buffer, was performed on ‘a recent version’ of Linux, but since the exploit is in hardware, it is not specific to any operating system, and is therefore a potential approach vector for hackers in Windows, Apple OS or any other system which uses this feature of the X86 chipset (that’s all of them). However no equivalent tests have been made beyond the Linux environment.

Submission + - How the Web Became Unreadable (

mirandakatz writes: If you've found yourself squinting at your computer and wondering if your eyesight is starting to go, fear not: you're probably just suffering from a design trend. As computer screens have achieved higher resolution, web design has trended toward paler, lighter-weight type that often doesn't meet accessibility requirements. At Backchannel, web developer Kevin Marks breaks down the history of this trend, and offers an impassioned plea for designers to go back to the typographic principles of print: keeping type black, and varying weight and font instead of grayness.

Submission + - SPAM: MITRE Dangles $50,000 Prize for Spotting Rogue Internet of Things Devices

chicksdaddy writes: MITRE Corporation, the non-profit corporation that helps tackle some of the trickiest technical and security challenges out there is dangling a $50,000 prize for anyone who can develop a solution for spotting rogue devices within an Internet of Things Network. ([spam URL stripped])

The company announced its MITRE Challenge IoT over the summer, saying that it was looking for ground breaking new approaches to securing diverse Internet of Things networks like those in connected homes.


"Network administrators need to know exactly what is in the environment, or the network—including when an adversary has switched out one device for another. In other words, is the smart thermostat we see today the same one that was there yesterday? We are looking for a unique identifier or fingerprint to enable administrators to enumerate the IoT devices while passively observing the network...The MITRE Challenge, Unique Identification of IoT Devices, seeks to discover possible solutions to this potential threat so our sponsors can reap the benefits of this technological evolution, while minimizing the risks." Registration was supposed to wrap up September 30, but the registration site is still online: [spam URL stripped]...

MITRE was awarded $29 million from the U.S. Commerce Department in 2014 to establish the nation’s first federally funded National Cybersecurity Center of Excellence (NCCoE). ([spam URL stripped]) Under that contract, MITRE is responsible for operating the federally funded research and development center (FFRDC) in the areas of research, development, engineering and technical support; operations management; and facilities management.

Link to Original Source

Submission + - First Computer Music from 1951 Restored (

BoxRec writes: Alan Turing was part of a team who created the earliest known recording of music produced by a computer. It starts with a few bars of "God Save the Queen", a snippet of Baa Baa Black Sheep and then Glenn Miller's swing hit In The Mood.

Slashdot Top Deals

Line Printer paper is strongest at the perforations.