Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment Re:Fended? (Score 1) 56

Often what they can do is redirect the traffic through scrubbing centers or clusters that are distributed along multiple paths so that the data is scrubbed at network PoPs (places where multiple hundreds of gigabits or terabits of capacity is in place) - well upstream of any local routing gear or switching gear.

Comment Re:Many programs assume thread safety (Score 1) 97

Yes, there are certain actions in python that are already considered to be atomic and they may be able to keep that. I doubt it though. Python has had locking and semaphores for quite some time. Programs that *really* needed multi-threaded performance just used the multiprocess module instead and then used queues to pass the information around .My guess is they'll implement this by adding an option to the multithreading module to allow for globalLock=false during instantiation of the multithreading class. Historically python is pretty good about maintaining backwards compatibility unless absolutely necessary.

Comment Re:Don't pay these people (Score 3, Interesting) 49

After working in digital forensics for a number of years and computer security for over a decade. I can absolutely tell you that you are 100% wrong.

IT security can stop even the most technologically illiterate people from being a vector of compromise. Through the use of various network monitoring tools, e-mail filtering, web traffic filtreing, firewalling, multi-factor authentication, authentication logging, event correlation, security automation and orchestration tools it is absolutely possible to not only detect but prevent an end-user from causing a catastrophic or even mild problem for an organization.

Beyond that, any IT program should have offline backups that can be restored from in the event of a ransomware event occurs. 3-2-1 backup scheme is IT 101. If a company is not backing up their data, it obviously isn't that important to them.

The ransomware problem is absolutely a company's fault for not having adequate IT staff and protection

Comment Re:Is this a balanced article? (Score 1) 123

There was a scene in "The Newsroom" (the one with Jeff Daniels) where they discussed this very logical fallacy. Not every story has more than one side, not every story has two sides. There is a bias towards fairness that is demanded in reporting. Sometimes a bad idea is just a bad idea. Sometimes a bad thing is just a bad thing. Sometimes there is no fairness because there is nothing to be fair about.

Comment Re:Gonna need a big drone (Score 1) 49

Use high voltage and a lightweight metal for power transmission so the line can be minimal in size. Use fiber optic (much lighter than CAT5/CAT6) for data. The high voltage lines can double as the hard tether line since there's two of them you have redundancy already in the cable and they likely have enough tensile strength to hold onto the drone.

Comment Re:Surreal... (Score 2) 52

This law only makes it so that the CCP can punish companies that don't pay the appropriate bribes. This law also doesn't stop the CPP from collecting user data (one of the biggest anti-privacy groups in existence). It's all for show.

Comment Re:So really: How Cybercriminals Stole $81 Million (Score 1) 49

Working in the digital forensic space, many, many, many, many, (i'll say it again) many, corporations still have networks where once you're inside, you're trusted. This means easy access to e-mails. You'd be surprised how much detail about a company's infrastructure, operations, organization, supply chains, points of vulnerability that you can gather just by reading employee e-mails. People send diagrams all over the place, ask questions about systems, ask about product purchases, have invoices, account numbers, project updates, everything in e-mail. You get access to a company's e-mail and you have all the intelligence and control you need. Ownership of an e-mail makes it easy to impersonate someone (which is why phishing is so successful). There's no need for an inside job when you're already inside.

Comment Re:Swapping a computer isn't rocket science anymor (Score 2) 111

Replace the whole computer from something bought off the web. The specs for I/O should still be available. Program it and get it up there. The hardest part would be creating some custom I/O (physical) ports to plug into the board, but software should be able to handle most of the interface work through them. Then shield it. Send up a SpaceX mission to do the swap. For the last 30 years chemical processing plants and other high tech facilities have been continually automating/computerizing. They have to fix and replace outdated PLCs all the time. This isn't anything all that different (if at all). In the real world, as opposed to universities, research, and NASA, this kind of issue is fixed fucking daily. So come on, this is a ridiculous issue to overthink. In fact, I'd give it to SpaceX to fix straight out. They seem to be the only ones looking at the idea of working in space as a routine activity. They said the rest of the unit is fine, so swap the computer and bring it back online.

Oh wow, look at you go, you outsmarted NASA and JPL. The environment in space isn't different from terrestrial environments at all. Just Amazon some PC parts to the space station. They'll work just fine. /s

Comment Re:Can Anybody Even Fix a Thirty-Year-Old Computer (Score 1) 111

Replace the whole fucking computer for fuck's sake. There must be design docs that show the physical I/O ports and their specs. I'd be surprised if they couldn't buy parts from NewEgg or Amazon that would work. Put them in a shielded box if need be but I think it would be stupid to try to over-engineer something that someone in a modern day chemical or other manufacturing facility could fix in a day or two.

Example of a modern day armchair scientist right here. Where'd you get your doctorate in aerospace engineering? How is over-simplistic drivel like this modded up?

Slashdot Top Deals

A university faculty is 500 egotists with a common parking problem.

Working...