Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Re:In other news (Score 1) 255

There you people go again, assuming i want to waste my time on "customizing" website feeds just because it bites over too wide an audience. I don't wanna, i like a bit of variety within reasonable limits. this whole selecting everything you get fed day in and day out really narrows your world view, and if you don't think that market data on you is being auctioned off, you are sorely mistaken.

Comment Re:In other news (Score 1) 255

DICE must be trying to piss of ppl like me who've slashdotting for way over a decade. If i have to go fucking reddit (bring the flamewar, but that site makes me want to end my life. you can only see so many stupid fucking posts of cat/omgthishappenedtodaylookatmecuzimnarcissistc pictures.)

Comment Nothing new (Score 0) 59

This is nothing new at all, sadly. Things like this have directly lead to less openness amongst hackers an has lead to an influx of shady interests trying to gain favor. From the bottom of my heart I sincerely hope you burn in this thing they call hell if you sell these monkeys these weapons of mass destruction to make a buck. They have no clue what power they wield.

Comment Re:Marijuana should be legalized (Score 1) 132

I'll bite; The ignorance in this one. Seriously, one can consume marijuana in a variety of ways. IMHO smoking is one of the poorest ways to consume it. Some prefer edibles, some prefer vaporization, some even drink it it, hell you can turn THC(and the other stuff) into an acetate (you know like some certain painkillers' active ingredient form) and absorb through the skin. I think most people will agree that smoking is less than ideal, and smoking anything is most likely harmful to you. I was a smoker of cigarettes for ..a long time, once i rid myself of that *shit*, there was little to no appeal in smoking cannabis anymore, but to me consumption has many positive upsides so i found a better consumption. Just because people smoke something it doesn't mean that is the only method of administration. Frankly, the vaporizer smells less(almost nothing), tastes better and yields a much cleaner high - and my airways, lungs and so forth clearly feels different. You know could ban smoking the plant in public without banning the plant or it's use. I remember smoking on airplanes: I was a child, and even then I understood how bat shit crazy that was.

Comment Re:What was the goal ? (Score 1) 73

Kaspersky was likely targeted because they are very popular in that that part of the world: Russia, middle-east, so forth. Owning Kaspersky, if indeed it was a complete compromise, in effect means you can access data(potentially execute) from every single computer that runs Kaspersky software: you are in a position of trust at this point. Trust is a _dangerous_ thing in computer security terms, do not let this fool you. As most antivirus software will send home "suspecious" files for analysis, I expect they would leverage this functionality to have well hidden backdoor in legit, properly installed software. Of course, here is also the source code: bug hunting it much easier with it, hence why the only program with even a slight chance of being trustworthy is one you can get the source code to, given that someone with the proper skills audits it. It's about high time we realize that closed source ecosystems is horrible for security; because it can be challenging to actually audit, or at least time consuming. I wish hackers would stop selling script kiddie-ready 0days to governments, these people have no idea of the power they wield with these things. I'm looking at you the grugq, etc: you people are a disgrace to every hacker in the known universe and you are actively helping authoritarian regimes and agencies with no oversight to suppress people and other countries, and profiting off it. In any event, I believe that the stuxnet team learned a lesson from their run of stuxnet in Iran; namely that there are easier targets to compromise to get in there with better access, because how do you beat the people you can't beat? you join them.

Comment Re:network partitioning/firewalls (Score 1) 189

AFAIK There is a history of hacking into german state networks by all sorts of people over the years: Everything from vandalism to espionage. While firewall and IDS and so forth are all theoretically nice things, the theory could be incomplete: 0day can happen to anyone. Identifying exploits in binary streams over the network can be quite difficult, as they can be encrypted, encoded, obfuscated, and often times are just using vanilla functionality to leverage a bug that _nobody_ knows about and this is mighty hard to find. The sad fact of the matter is that many, if not most, of people in charge of security couldn't exploit a buffer overflow so save their lives. They have little to no understanding of the underlying mechanics of attacks and are dependent on high level (snake oil) tools from 3rd party vendors to even have a fighting chance to see what is going on. Everyone talks a big game and yet the core of hackers in the world who know their stuff is nowhere near as big as the number of people in the info-sec industry, obviously someone is incompetent. Google is right: Finding bugs, well worthwhile bugs, is hard. It wouldn't be an art if it wasn't. It's fun tho :)

Slashdot Top Deals

He keeps differentiating, flying off on a tangent.

Working...