Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re:Great! (Score 1) 527

You must have had a way different interview than me. I got the NEXUS card back 4 years ago. I just had to say I traveled between US/Canada a lot for work. I didn't have to disclose any bank account info or family info. I provided the iris scan and finger prints.

It definitely makes customs easier to go through.

Comment If you're firewalled the vuln is not a worry. (Score 3, Informative) 44

In the electric utility industry if you are considered bulk power and have critical assets your firewalls must be configured with DENY (http://www.nerc.com/files/CIP-005-3.pdf) as the default rule and only allow defined connections. All the big players in the US and Canada have their control networked segmented off and they don't have access to the Internet.

Feed Google News Sci Tech: Nintendo Admits It Used PS3 and Xbox Footage in Wii U Presentation - PC Magazine (google.com)


Nintendo Admits It Used PS3 and Xbox Footage in Wii U Presentation
PC Magazine
If you thought the game footage seen at yesterday's Nintendo press conference at E3 looked better than anything you ever saw from Nintendo, you were right. In fact, you're still right: Some of the clips were actually from Xbox 360 and ...
Nintendo admits E3 Wii U reel used PS3 and Xbox 360 clipsVentureBeat
E3 2011: Wii U Highlight Reel Sexed Up with PS3 and 360 FootageGamePro.com
Wii U network to rival Xbox LIVE and PSNVideogamer.com
Examiner.com-Guyism-T3
all 77 news articles

Security

Submission + - Many Stuxnet Bugs Still Unpatched by Siemens (threatpost.com)

Trailrunner7 writes: The media storm over the Stuxnet worm may have passed, but many of the software holes that were used by the worm remain unpatched and leave Siemens customers open to a wide range of potentially damaging cyber attacks, according to industrial control system expert Ralph Langner.
Langner said that the media paid too much attention to the four, zero day Windows vulnerabilities that enabled the Stuxnet worm, but overlooked the other security holes used by the worm. Unlike the Windows vulnerabilities, which Microsoft quickly fixed, many of the holes in Siemens' products remain unpatched, he contends.

Langner enumerates three types of exploits used by Stuxnet — only one category of which (Windows operating system exploits) have been closed. The other two are Windows applications exploits aimed at Siemens Siemens Simatic Manager and the Siemens WinCC SCADA application, and controller exploits aimed at Siemens S70-300 and 400 series controllers.

Slashdot Top Deals

OS/2 must die!

Working...