Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Compare cell phone plans using Wirefly's innovative plan comparison tool ×

Comment Intrepid (Score 1) 55

I applaud their efforts, even though I'm a little horrified at the lengths to which we'll go in our quest to remove anonymity.
While I'm sure there are good uses this can be put to, I wonder if any of the researchers questioned whether this was really a good idea...

Now, if this system was capable of identifying the person responsible for {insert bad corporate act(s)} through the corporate veil well enough for them to be meaningfully punished, that would be incredible!

Comment *yawn* (Score 4, Insightful) 228

The Server Application in Windows 10 isn't running inside of a hypervisor; it's "running on the OS, getting all the benefits of performance and system access, as well as expanding the potential attack surface." eWeek reports on a new threat discovered by Alex Ionescu, the chief architect at cybersecurity company Crowdstrike, which begins with the fact that "The Windows file system is also mapped to the Server Application, such that the Server Application will get access to [...] files and directories."

Ionescu says "There are a number of ways that Windows applications could inject code, modify memory and add new threats to the Server Application running on Windows." According to eWeek, "The modified Server Application code in turn could then call Windows APIs and get access to system calls to perform malicious actions that might not be mitigated."

I'll Tell you what else increase your attack surface: Turning the computer on.
Didn't RTFA (naturally!), but the summary fails to convince me that this is more than incrementally worse than running...well...MOST applications that do anything useful on Windows.

Comment Improvements (Score 1) 241

Oh? So more/better qualified candidates have become available to apply for positions at Apple? Great! Although, I'm not entirely convinced that Apple had anything to do with that...
err..or were you saying that Apple has become a little better at hiring people that will make it look more Politically Correct?

Comment Re:Flash! (Score 1) 60

I think GP was perhaps alluding the Gutmann method (35-pass) of sanitizing data on a hard-drive. Which method has been obsolete since the late 90s, as it was specifically designed to wipe HDDs using MFM/RLL (how magnetic signals detected on the hard-drive were interpreted). With newer magnetic media, one pass is honestly "good enough". Three passes using a well-known standard can afford you better peace of mind while also allowing you to comply with most official "secure wipe" requirements.

Unless GP specifically meant Flash/chip-based storage, in which case, your best bet may be a drive that destroys its media if the drive's enclosure is compromised.

Comment Responsibility (Score 1) 37

Might as well check this box off on the "obvious points to cover" list:

* Without considering whether or not Valve is reasonably at fault, I'm going to go ahead and say that the man who filed the first suit indicated above wasn't winning. Gee whiz, Mom! I didn't know that actions have consequences, and that sometimes, you lose! Again, regardless of whether Valve should be on the hook or not, I doubt he'd have filed suit if he was a better bettor.
* For the second lawsuit, where the supposed victim is/was a minor, same question: Was he winning? I imagine that to be slightly less a factor, as his parent(s) might be aware that winning streaks can end in tears. However, WHERE WAS HE GETTING THE MONEY? How was he spending it online? Not so hard as it once was, but perhaps they figure that their perfect little angel would never have engaged in such mischief if hadn't corrupted hi pure, innocent heart.

Sometimes this stuff gets under my skin. I understand that demonstrating you've been harmed by another party is an important step to convincing the courts to intercede (and/or convince another party to make changes BEFORE it goes to court), but that doesn't mean it can't piss me off.

Submission + - SPAM: Advanced Manufacturing Technologies through Space Electronics

An anonymous reader writes: Space electronics has led to the development of advanced manufacturing technologies spanning across robotics, to remote operations and specialized materials. Innovative practices and technologies grasped from space learning have influenced several areas including creation, testing and manufacturing of new material creation
Link to Original Source

Submission + - U.S. Spy Agency Trialling Live Video Recognition Tech To Spot Terrorists

An anonymous reader writes: A new surveillance technology will allow for the immediate, automatic detection of suspicious behavior in live video feeds. The research project, led by the IARPA unit at the U.S. Office of National Intelligence, proposes a recognition system dubbed Deep Intermodal Video Analytics (DIVA), which is able to scour through multiple live video streams and pick out potential criminal and terror activities.

Describing the project, IARPA officials noted: ‘The DIVA program will produce a common framework and software prototype for activity detection, person/object detection and recognition across a multi-camera network. The impact will be the development of tools for forensic analysis, as well as real-time alerting for user-defined threat scenarios.’

Submission + - Cancer Is A Man-Made Disease Due To The Excesses Of Modern Life (pilotnewsweb.com)

An anonymous reader writes: There are very few species on earth who would have created diseases which kill them. Human being is one of them. Scientists are of the opinion that cancer is purely man-made disease resulting from the excesses of modern life.

Slashdot Top Deals

The computing field is always in need of new cliches. -- Alan Perlis

Working...