Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Please discuss tolerable duration or use case (Score 1) 359

Even though everyone's pain threshold is different, please mention tolerable duration of use. For me, I've got an iPhone 3 with Touch Term Pro. There are some idiosyncracies with its onscreen keyboards, but once learned, its decent. This is sufficient for short tasks, but I wouldn't want to use this setup for more than about 7 minutes. This is sufficient for checking service status and kicking off one or two things, but troubleshooting is right out.

Comment Re:Here's how it works... (Score 1) 314

Movies which are built from made up scripts based on little insight are easy to spot because generally they aren't very compelling. ... While it is possible for idiots to channel greatness for short bursts, consistently excellent material must come from people who have worked on themselves and who had accumulated knowledge and wisdom.

Thank you for succinctly explaining episodes I, II, and III.


Submission + - What is the Future of Firewalls? 1

jlmale0 writes: When I mess with my WAP/router at home or coordinate with the network team at work, it seems like I'm stuck in 1995. We're still manually listing IP address/port combinations for our firewall rules. There's a certain simplicity to this when dealing with a single system, but there are firewalls everywhere these days. What's available for managing complex firewall arrangements? What's being developed? Can I take a visio diagram, run it through a script and get a list of firewall rules? What about a gui that illustrates the current system configuration and then lets me drag and drop systems across firewalls, and have the individual firewall ports automatically configured? What about tying a firewall into an authentication system so that when jdoe logs in, only then are the firewalls opened to pass her traffic? What about managing distributed firewalls so that one repository of rules opens up your system's firewalls, the DMZ firewall, and the public firewall all at once?

Let's get a conversation started. What cool projects do I need to know about? What cool management features would you like to see? What's next for firewall management?

Comment Re:Any other file systems with that feature? (Score 1) 386

... deduped them to 18% of their original size

He's claiming 82% dedup savings with this. That's roughly five times greater than what you credit.

Even with the price overhead, I'd still consider a solution like this because I can replicate all my data on one storage appliance more easily than implementing replication across X commodity servers. Yes, I like to spend money to make my life easier. :)

Comment Re:Open Source Cures Cancer (Score 1) 386

While I appreciate the sentiment, it only applies to Big, Irreplaceable (tm) things. Tape libraries would be an example. Office software would not. Even if you have software that's mandatory, there are other ways to mitigate risks. Clustered servers for fail-over. Replication. Alternate installs in the form of development and test environments. If Wine breaks in the middle of my big project, I may research the issue and debug the problem, but if I'm under a time crunch, I'm just going to move to a working machine. Yes, paying for support is one valid risk mitigation strategy, but it's far from the only one.

Comment re: the summary (Score 4, Informative) 185

My initial, gut response to this was sheer horror. They list exploit and target side-by-side! The only mention of a fix is that it's to be 'released soon', informing any malicious agents out there that now is the time to strike.

Reading the Wired article, the right thing was done. Big company was sitting on their hands, and now that publicity has been made, they're starting to move.

Wired did the right thing. But this summary, it's fear-mongering and bad journalism.

Slashdot Top Deals

You're using a keyboard! How quaint!