Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:Virtualize (Score 1) 142

ESX-I ftw. Ignore any recommendations for VM Player/Workstation, you'll lose a lot of resources to system operating system over head. I built a ESX-i server for less than $200 bucks 16GB of ram with Phenom II 945. This included 3TB of storage and an Antec case. On this set up I virtualize 45-50 OS's simultaneously with no problems.

Comment Security expert point of view. (Score 5, Interesting) 88

As a security engineer(CISSP&CSSLP) with several years of experience in C&A and pen testing, I must say that the results aren't a surprise by any means. What I DO find disturbing is the amount of detail provided in a public report given the fact that the FAA has yet to fully apply it's remediation strategies for the vulnerabilities identified. Is there any info as to what tools they used for app testing? My experience shows that tools such as App Detective and Web Inspect actually inflate the number of findings. This is due to the fact that the applications identify vulnerabilities by instance and not by category/type.
The Military

Submission + - Leaked: Entire equipment list of US forces in Iraq (

James Hardine writes: There are many reports on the Wikileaks release of a spectacular 2,000 page US military leak, possibly the most militarily significant leak of the war. The leak consists of the names, group structure and equipment registers of all units in Iraq with US army equipment. It exposes secretive document exploitation centers, detainee operations, elements of the State Department, Air Force, Navy and Marines units, the Iraqi police and coalition forces from Poland, Denmark, Ukraine, Latvia, Slovakia, Romania, Armenia, Kazakhstan and El Salvador. The material represents nearly the entire order of battle for US forces in Iraq and is the first public revelation of many of the military units descr ibed. Among other matters it shows that the United States has violated the Chemical Weapons Convention.
Hardware Hacking

Submission + - Students Design Open Source Video Card 1

acronica writes: With the Open Graphics Project advancing slowly a few students picked up the idea to do it all smaller, faster, and more importantly, cheaper. From the site; "We'd love to have an OGD1 card and are amazed by it's specifications, but for us and a lot of people, this card is simply too much. So that's where this card comes in, to give you all the fun of developing on programmable hardware, designing video cards and architectures, for a price that won't hurt your wallet." Will this make way for open source enthusiasts to build a true open source system?

NIST Opens Competition for a New Hash Algorithm 187

Invisible Pink Unicorn writes "The National Institute of Standards and Technology has opened a public competition for the development of a new cryptographic hash algorithm, which will be called Secure Hash Algorithm-3 (SHA-3), and will augment the current algorithms specified in the Federal Information Processing Standard (FIPS) 180-2. This is in response to serious attacks reported in recent years against cryptographic hash algorithms, including SHA-1, and because SHA-1 and the SHA-2 family share a similar design. Submissions are being accepted through October 2008, and the competition timeline indicates that a winner will be announced in 2012."

Submission + - Germany passes invasive surveillance law 2

An anonymous reader writes: Today at 14:05, the German parliament passed an extensive surveillance law, including an extremely extensive data retention duty for all telecommunication providers. They must now gather and store virtually all data generated by an act of telecommunication, including for example IP addresses, Email headers, Phone number and the location of mobile subscribers. This gargantuan amount of data has to be kept for six months.

These records may be accessed for all crimes "committed by means of telecommunication", allowing virtually unlimited access for law enforcment agencies.This is the first time in the history of the German republic that a basic human right (the secrecy of correspondence) is abolished in it's entirety. (German, it's all over the german internet by now)

In related news, German secretary of interior Wolfgang Schäuble, compared objectors to Adolf Hitler: (also in German)

Slashdot Top Deals

If I were a grave-digger or even a hangman, there are some people I could work for with a great deal of enjoyment. -- Douglas Jerrold