Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Nothing is totally free (Score 5, Informative) 109

People need to understand that all of these "Free" services on the web aren't really free. Either they make money by displaying advertisements or they make money by selling data or they do both. What ever way they go, they need to monetize the service to pay the employees to continue providing the service.

Comment Re:Fond memories (Score 1) 178

I was 16 when I got mine and I also have fond memories with Wizardry and Ultima IV. While I started programming on my Commodore VIC-20 (in BASIC) I learned C and Pascal on my PCjr which led me to the career that I have today. Wish I would of kept it.
Security

Ask Slashdot: Preventing Snowden-Style Security Breaches? 381

Nerval's Lobster writes "The topic of dealing with insider threats has entered the spotlight in a big way recently thanks to Edward Snowden. A former contractor who worked as an IT administrator for the National Security Agency via Booz Allen Hamilton, Snowden rocked the public with his controversial (and unauthorized) disclosure of top secret documents describing the NSA's telecommunications and Internet surveillance programs to The Guardian. Achieving a layer of solid protection from insiders is a complex issue; when it comes to protecting a business's data, organizations more often focus on threats from the outside. But when a trusted employee or contractor uses privileged access to take company data, the aftermath can be as catastrophic to the business or organization as an outside attack. An administrator can block removal of sensitive data via removable media (Snowden apparently lifted sensitive NSA data using a USB device) by disabling USB slots or controlling them via access or profile, or relying on DLP (which has its own issues). They can install software that monitors systems and does its best to detect unusual employee behavior, but many offerings in this category don't go quite far enough. They can track data as it moves through the network. But all of these security practices come with vulnerabilities. What do you think the best way is to lock down a system against malicious insiders?"

Slashdot Top Deals

How many NASA managers does it take to screw in a lightbulb? "That's a known problem... don't worry about it."

Working...