Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re:Why would Putin fear Clinton? (Score 1) 769

Um, what would you consider to be a qualification?

I mean, it seems like a good answer would be "Six years as secretary of state, plus eight more years of meeting world leaders as First Lady -- and then another six years as a U.S. Senator." Your response is "Nah, that's not experience....."

So what is?
Crime

Journal Journal: Driving Tips 5

Keep your tires properly inflated

Always use your seat belt

If you drive a nice car, wear a chauffeur's cap, and seat all passengers in back.

And make damn sure to check your tail lights before leaving the house! It also would help if the covers can resist a couple of whacks with the billy club. Shopping tip - Try to replace the bulbs with multiple LEDs. They last much longer and are harder to knock out.

Comment Re:Alfred Hitchcock (Score 1) 296

> Alfred Hitchcock was known as the "master of suspense" precisely because he avoided chopping the scene to pieces with a million different camera angles.

I was all set to argue with this. ("Then how do you explain the shower scene in Psycho?") But actually, yeah, it's preceded by a long, slow, continuous take of the door to the bathroom opening. And for that matter, there's that whole long scene in "The Man Who Knew Too Much" where the orchestra keeps playing, slowly, slowly, and there's tension pretty much because the scene is dragging on...

Submission + - Would you trust medical data stored on AWS by CareMonkey? (caremonkey.com)

rolandw writes: My teenage daughter's school in the UK wants me to approve the storage of her full medical details in CareMonkey. CareMonkey say that this data is stored on AWS and their security page says that it is secured by every protocol ever claimed by AWS (apparenlty). As a sysadmin and developer who has used AWS extensively for non-secure information my alarm bells are sounding. Should I ignore them and say yes? Why would you refuse?

Comment Re:Summary heaps praise on advertising (Score 1) 109

If you want to be a man and not a little boy, you can admit that you were wrong and should do your own homework before you judge others.

Geez, man why the abuse?

I worked briefly at Digital Equipment Corporation in the early 1990s. I was feeling wistful from your comment about how much things had changed over the years, remembering when Yahoo was actually a king. (A friend of mine told me he remembers when Yahoo's address still contained stanford.edu.) Usenet, FTP, HotWired.com, Napster...

That seems to me like the real substance of this discussion. Anyways, thanks for your thoughts on Digital Equipment Corporation.

___
Long live the dreamers, long live the net

Submission + - SSL Bug Exposes 33% of HTTPS Servers, Warns Red Hat (thenewstack.io)

destinyland writes: The OpenSSL project discovered a new bug in 21-year-old code hiding in servers that run TLS for secure communications. SSLv2 "should no longer by considered safe," warns Red Hat's security blog, "and should not be used in a modern environment... the attacker could impersonate the server on what is expected to be a secure connection." It's called DROWN — Decrypting RSA using Obsolete and Weakened Encryption. It uses a man-in-the-middle attack to break encryption, and 33% of all secure HTTPS servers are vulnerable, according to one security site, which offers a tool to check your vulnerability. "Even though this old version of SSL is not used much these days, it continues to be supported by many servers," adds the Qualys security blog, calling SSLv2 "old and crazy-vulnerable". The solution? Disable SSL v2 on all servers.

Submission + - Red Hat warns of Linux 'Skeleton Key' Vulnerability (thenewstack.io)

destinyland writes: Last week, security experts at both Red Hat and Google found a new flaw in the glibc library used in most Linux systems that enables remote code execution. "Through this flaw, attackers could remotely crash or even force the execution of malicious code on machines without the knowledge of the end user," warns Red Hat's security blog, providing a list of affected products and services. Security expert Dan Kaminsky calls this flaw "unusually bad" and "a skeleton key of unknown strength." And Wolfgang Kandek, the CTO of cloud security provided Qualys, warns that "This is critical and will only get worse in the next couple of weeks."

Slashdot Top Deals

To iterate is human, to recurse, divine. -- Robert Heller

Working...