Forgot your password?
typodupeerror

Comment Re:No, disks with sensitive data have to be destro (Score 1) 168

There should be no sensitive data on any disk. NIST SP 800-88 specifies cryprographic erase. If the org has implemented a state-of-the-art security program, their storage servers should have HSMs that are used to encrypt said data. Simply separating the HSM from the drive meets NIST SP 800-88.

Comment Re:Sorry, You're not getting old drives. (Score 1) 168

NIST SP 800-88:
> "While most devices support some form of Clear, not all devices have a reliable Purge mechanism. For moderate confidentiality data, the media owner may choose to accept the risk of applying Clear techniques to the media, acknowledging that some data may be able to be retrieved by someone with the time, knowledge, and skills to do so. Purge (and Clear, where applicable) may be more appropriate than Destroy when factoring in environmental concerns"

FIPS 199:
> "Confidentiality High: The unauthorized disclosure of information could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.

NIST SP 800-60 v2r1
> " Impact level is usually high where safety of major critical infrastructure components or key national assets is at stake."

This is to say, unless someone is going to die, the confidentiality impact is probably moderate, and the risk-balanced approach in 800-88 is cryptographic erase, purge, or maybe even just clear.

Power

Engineers Develop Electric Car Battery That Can Heat Itself During Winter (popularmechanics.com) 118

Engineers at Penn State have created a battery that can self-heat, allowing for rapid charging regardless of the outside cold. The battery can reportedly provide a 15-minute rapid charge at all temperatures, even when the cold is as low as minus 45 degrees Fahrenheit. Popular Mechanics reports: Batteries have both positive and negative terminals. The scientists placed thin nickel foil with one end attached to the negative terminal and the other end creating a third terminal. When a temperature sensor attached to a battery detects that the battery is below room temperature, it then sends electrons flowing through the nickel foil. This heats the battery up until it's above room temperature again. When the sensor detects that the battery is above room temperature, that's the sign that charging that can begin again. Electric current flows into the battery, rapidly charging in a more efficient state. After 4,500 cycles of testing, the new battery only showed a 20 percent capacity loss, which could provide approximately 280,000 miles of driving and a lifetime of 12.5 years. This is compared to a conventional battery that "showed a 20 percent capacity loss after only 50 charges," reports Popular Mechanics. Penn State released a press statement with more details.
The Internet

Confirmed: FCC Will Try To Regulate Internet Under Title II 379

An anonymous reader writes: FCC Chairman Tom Wheeler has published an op-ed explaining how and why the FCC will "use its Title II authority to implement and enforce open internet protections." He says, "These enforceable, bright-line rules will ban paid prioritization, and the blocking and throttling of lawful content and services. I propose to fully apply—for the first time ever—those bright-line rules to mobile broadband. My proposal assures the rights of internet users to go where they want, when they want, and the rights of innovators to introduce new products without asking anyone's permission. ... To preserve incentives for broadband operators to invest in their networks, my proposal will modernize Title II, tailoring it for the 21st century, in order to provide returns necessary to construct competitive networks. For example, there will be no rate regulation, no tariffs, no last-mile unbundling. Over the last 21 years, the wireless industry has invested almost $300 billion under similar rules, proving that modernized Title II regulation can encourage investment and competition."

Comment Not necessarily all of Illinois (Score 1) 323

I actually live in the school district that has created the issue. You can find the original printed notice here:
    https://drive.google.com/file/...

From the language used, they seem to believe that their policy is enforceable by law. However, the actual text of the law says nothing about compelling access to a personal social network profile. This leads me to believe that a degree of incompetence has invaded the district's administration. Shocking, right?

I don't expect it to happen, but nonetheless I am telling my kids that if any authority figure at school asks for access to any of their personal accounts, they should defer to me so I can pass the issue along to the lawyer.

Comment Re:Dropbear (Score 2) 148

This comment is funny, because:
> 2013.56 - Thursday 21 March 2013
> - Added hmac-sha2-256 and hmac-sha2-512 support (off by default, use options.h)

So now, as I work to build an appropriate dropbear binary (or possibly go straight for the openssh package), I can sit here and contemplate all the time and effort that I am saving by using dropbear.

Comment Re:This helmet scares me. (Score 1) 126

Mostly agree with the parent comment.

Note that helmet-mounted bluetooth interfaces have existed for years, and many mid-to-upper range helmets are designed for those optional systems. Take away the HUD, add a modern smartphone, and I have all the Skully's useful-to-me features at a fraction of the cost.

Comment Re:Updated? (Score 3, Insightful) 117

The "new" news is the release on the A8-7600; and only about 7 months late. Most of the reviews for that processor were published in January, which is shameful really.
http://www.anandtech.com/show/...

But now that it is out, it is at a good price, decent computationally, very good power envelope. It's a good option for productivity-only desktops, at a fraction of the price of a 7850K or an i3-4330.

Comment Re: You asked for it (Score 1) 227

They shouldn't. Two other positions exist which would be more to libertarian liking.

One option would be to oppose the sanctioned monopoly that net neutrality supporters want to regulate. By providing competition, it will be easy for the free market to punish ISPs who choose to discriminate between traffic sources. A side effect of this choice is a snarl of wires on the telephone poles - one for each local ISP. Also, this option is unlikely to work where all communications lines have been buried.

Libertarians could compromise to a second option - the common carrier option. This position yields the physical connection to stringent government control (like telephone networks, power grid, etc) but allows any company to make use of said infrastructure. Essentially, the wire is socialized, but everything that it carries is free-market.

Slashdot Top Deals

Your mode of life will be changed to EBCDIC.

Working...