Please create an account to participate in the Slashdot moderation system


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:First lesson (Score 2) 107

How exactly would being on a /64 prevent such an attack against a publicly facing entity? These attacks are not address space scanning attacks at all, they are known and publicly published IP addresses (in this case, DNS servers). Flood the public facing IP (the DNS server) would be exactly the same if IPv4 or IPv6. The only thing this would temporarily mitigate is the fact there are far fewer devices/users on the IPv6 network, so less of a botnet to control currently.

Comment Re:Not a fair comparison (Score 1) 445

So much of this! And also, knowing people in helpdesk positions to do extensive tracking of trouble ticket issues in their offices (not IBM, but similar scale corporations), the top support tickets were either account password resets or printers not working or inability to access shared file resources. NONE of these issues had to deal with the local OS whatsoever, but instead had to deal with remote machines. This one particular office used the IBM AS400 server system, and printed reports through it, this would fall under your "legacy" software support definition for sure! The company switched client (Windows XP/7 to 10) and server (AS400 to some web-based system) at the same time, so the same "correlation" of the OS being the difference could just as easily been the same, when in reality it was better server architecture that solved their particular problems.

Comment Re:Can anyone please explain (Score 4, Interesting) 32

The big deal is about big transactions. This most likely isn't going to be used in the consumer credit card / debit card market, but more likely in the large purchase department. Buying a car/house? Waiting a few minutes vs hours/days for credit reports to return. Transferring millions/billions of dollars between accounts, who's auditing it? Blockchains significantly reduce the amount of work in this department while essentially eliminating fraud, since the dollars can be tracked from transaction to transaction.

Comment No more USB (Score 1) 306

Wait, no more USB ports!? Oh wait, no, there it is. It has USB-C. This isn't the "removal" of USB like almost all of the text is trying to portray, this is merely the change from one style of USB port to another. This is absolutely a non-issue. It has been known all along that USB-C was designed from the get-go to be a more universal port, offering charging for laptops too. AND, there is absolutely nothing stopping anyone from using a USB-C to USB-A/B/Mini/Micro/Male/Female cable to plug in literally every single existing USB device into this port. Need more ports? Just get a USB-C to "standard" USB 3.0 HUB.

Comment My main question (Score 1) 38

My main question: should there be a regulatory agency who oversees various types of security practices for companies? There is already PCI standards, but that is brought on by the credit card industry, not government, and the penalty for not being compliant is just a small fee each month. An example of a problem I've seen in the wild: my old ISP transmits user passwords in plain text via unsecured email messages. This means the odds are also extremely high that they're also storing the passwords as plain text instead of properly hashed values. With this being an ISP, it wouldn't take much to perform as DOS attack on their entire network, just compromise their user account database, "login" to each account, and simply shut off service. When I spoke with the CEO and senior level techs in person at the company in question, they simply gave me a "that's not our problem" attitude, and the issue was never fixed. What sort of recourse should happen at that point, especially when there is the extreme monopoly practice with ISPs, limiting the options to switch to a more competent competitor?

Comment Re:Host Your Own Damn Files (Score 1) 31

As an added note: you wanna make this shit as simple as possible? Just install FreeNAS. It has all this built in. Need "cloud" (automatic doc syncing between desktops), there is the OwnCloud plugin with a desktop client that does this right there built in. This whole process is actually really damn simple compared to what it was years ago.

Comment Host Your Own Damn Files (Score 2) 31

Repeat after me: HOST YOUR OWN DAMN FILES. Put them on a good quality local server with ZFS backed storage. Set up automated snapshots. Then setup automated ZFS send/recv to another off-set (geographically diverse, so at least a few hundred miles away) server.

When files are borkt locally, just pull em out of your snapshots, or just entirely revert to a snapshot. Local server is borkt? Just pull the contents from the remote server. For an added bonus, sync to multiple remote locations, especially because co-location hosting and bandwidth is so damn cheap now.

Slashdot Top Deals

egrep patterns are full regular expressions; it uses a fast deterministic algorithm that sometimes needs exponential space. -- unix manuals