Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re: Not A Mistake (Score 1) 159

Eventually you can get Linux to boot on UEFI just fine. But it is harder than before.

It used to be that you could just put a DVD in a computer and click OK to install Linux, and that was it.

Now people people ask me for help when Linux installation fails. Usually the installation seem to succeed, but the computer cannot boot. I usually install Boot-Repair on a live USB disk, boot the computer and fix it. Boot-Repair is a nice toot but really, it should not be necessary.
    And sometimes it does not work. Early versions of the Intel NUC would fail starting Ubuntu because if expected the executable to be named uefi.exe, not grub.exe. Intel fixed it in a later firmware version. But it is telling that they created something so complex, that not even Intel could get it right.

Comment Re:What part of this is hard to understand? (Score 1) 183

So when every yahoo on your segment fires up BitTorrent your VoIP stops working? No thank you.

Basic prioritization:
1. Realtime Communications Traffic (VoIP)
2. Remote interactive sessions (RDP/SSH/Games/etc..)
3. Streaming Video ...

Except that my VoIP works just fine without any prioritization.
Prioritization will just be a way of making sure that just my kind of VoIP will become unusable.
And how are they going to determine which traffic is VoIP anyway? Port numbers?

Then again, my downloads through SSH-tunnels will be faster.

Comment Re: Duress print (Score 1) 224

IANAL, but setting up such a system could not be illegal. At the time you set it up, you cannot know who will be forcing you to unlock. It could be a member of an Armenian gang.

What happens when you are required to unlock is less clear, IMHO.

“Unlike disclosing passcodes, you are not compelled to speak or say what’s ‘in your mind’ to law enforcement,” Gidari said. “ ‘Put your finger here’ is not testimonial or self-incriminating.”

But are you required to warn them about "bad" fingers?
And you might not have told you girlfriend which of her finger, will start the self-destruct.

And even if you are required to warn them, if you _do_ believe that your rights are being violated, now they have to prosecute you, and you can argue they had no right in the first place.

Comment Encryption uses (Score 1) 43

The USB gadget support seems to be difficult.
But if you get it to work, you could e.g., have several encrypted and unencrypted filesystems on the SD-card.

Give it to someone and let them see a USB flash drive with the unencrypted data, or give them the password to some files.

Or you could have filesystems, where you can write unencrypted, but not read (from e.g. cameras)

Comment Re:i feel sorry for the poor guy. (Score 1) 461

It might not have to be unattended.

In 1992 I traveled through Moscow airport with a pressure cooker with a slide projector inside it (I had trouble keeping my luggage in one suitcase).

When they put it through the airport scanner there was a lot of shouting and they made me take it apart in a corner with concrete walls while three guys was pointing rifles at me.

Comment Re:Pretty much. (Score 1) 225

>You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License.

Note that if anyone with copyright over the kernel wins such a suit, the rights to use the kernel are lost for all time ("terminated").

That is not what that clause means. For example GPL also says that they not have to accept the license.

What it means, is that they then have distributed the kernel without permission from the GPL.
And they could get in trouble for that.

Comment Re:Anyone can intercept SSH some of the time (Score 2) 278

* SSH users should verify the identity of their systems when they first connect. ...
* We have SSH Honeypots that help us track, understand and respond to SSH attack.

You should have user honeypots. Once in a while present a fake certificate. If the user ignore the wrong fingerprint and type in the correct password, reset the account password.

Comment Re:It freakin' works fine (Score 1) 928

I totally understand why people bother making functionality, I do not need. And I like it, because it means that next time I need something it is probably already there.

What I do not like is that I am being forced (well, pressured, it *is* free software after all) to pay (with computer ressources) for something that I do not need.

Comment Re:Silly (Score 1) 87

Well, if you are the third AP owner in your neighborhood that has a network name Linksys or Home Network, you should not get into trouble.

If you named you network Logan Airport because you wanted to gain access to passengers computers, you would be breakting the law in most countries.

If you named you network Logan Airport because you were curious to find out how many would connect to it, well I am not a lawyer, but I would say you were on thin ice.

The problem with faked DHCP-servers is not so much that it can take advantage of bash vulnerabilities, most clients should now be updated and not use Bash. It is worse that they can give you bad DNS-servers. That means that the attacker can then do a MITM attack on every single connection, you make. Encryption helps, but not everything is encrypted, and many user would accept a fake SSL certificate.

If you are worried about fake DHCP servers you should configure your DHCP client to use fixed DNS servers (I use http://censurfridns.dk/). You would still be vulnerable to fake accesspoints and fake DHCP-servers that also gave you a fake gateway, but not to bad DNS-servers.
Unfortunately many networks rely on using DNS to implement captive portals for login and advertizing, so you cannot do it for all networks.

Comment Re:Silly (Score 1) 87

The hotels usually do print the name of their network on flyers, signs etc.
But an attacker does not have to make up fake names, he can just use the legit name.

At an airport you might see:

- Airport Net
- Airport Net
- HP_Printer.

Where "Airport Net" is the legit offices name, that the airport uses.
An attacker then names his AP also "Airport Net".

Then you see:

- Airport Net
- Airport Net
- Airport Net
- HP_Printer.

There is no way to know that one of the "Airport Net" AP's are not run by the airport.

And even worse.
If the attacker takes an AP e.g. a cafe and name it "Airport Net", there is a good chance that someone will automatically connect to it because they used an AP by that name in the airport.

Comment Re:Silly (Score 1) 87

Actually my client does not connect automatically.
Not that i should be a problem, except that it would keep connectiong to networks that I cannot use.

I am telling you that if I stay in a hotel, and I see a network named eg Free_Hotelname_network, then I connect to it and if it works I use it, even though for all I know that network could be running from the laptop of the guy in a room down the hall.

But I should not have care about that. It should not be necessary to trust every DHCP-server I use.

In the same way that I also visit a lot of webservers, that I do not necessarily trust. My browser should not execute insecure bash-scripts.

Slashdot Top Deals

What is worth doing is worth the trouble of asking somebody to do.