Please create an account to participate in the Slashdot moderation system


Forgot your password?
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re:It didn't have an off switch before (Score 1) 354

If my router drops all packets to those IP addresses, it does not matter what is hard-coded or what Widows capabilities are short-cicuited. Almost everyone now has a router and all that I have used allow dropping packets to specified destinations. Cheap ones may not.

The issue of Windows changing this is valid, though. I suspect someone (or several of them) will start serving the list of addresses being used. Someone may well already be doing this.

If you use other Microsoft services, though, those will likely break if you do this.

Comment Wow! This is SUPER SECRET! (Not) (Score 1) 368

IME and AMT have been well documented for years. The Wikipedia article has been around since at least 2007 and was flagged by an editor as reading like an Intel ad. It fully describes the basic design and functionality of the system and only varies from the article in that AMT has now been incorporated into the chipset and is no longer a separate chip.

Even that its network connection is independent of the CPU and any filtering is described.

I have been aware of AMT since it was discussed as a way to do an psueudo-console connection on modern systems that lack a serial port in FreeBSD kernel debugging discussions. I suspect that Linux discussions also show how to do this as IT IS NOT SECRET!

I'm not really comfortable about it, but it is very useful, has been designed with security in mind and should be very difficult to suborn, and Intel considers it a feature that is advertised, so IS NOT A SECRET!

Comment Re:Slow them with real traffic (Score 1) 767

The neighborhood associations need to hire someone to drive back and forward on the route at 2.5 mph during peek hours.

At least in California, this will get tickets for obstructing traffic.

The law requires that if you have 5or more cars behind you and yo9u have no cars in front of you that you pull over and allow them to pass. This even applies when you drive the speed limit, but is open and shut at 2.5 MPH. Better check on the laws where you live.

Comment Re:FM radio's last gasp? (Score 1) 340

Aside from data saving, I want to be able to listen to local sports broadcasts. Last night I missed the first half of the basketball game that was broadcast locally because the audio stream was unavailable except with a payment to the NBA for the "season" audio package. I could have streamed the telecast, but that would have severely eaten into my 3Gig of shared data for the month.

Of course, I was being cheap, I guess, but paying to listen to a game that would have been free if I had a radio was really annoying and more so as I know my phone had a perfectly good FM receiver that I could not use.

I had access to the tuner on my old HTC Thunderbolt. A pretty crappy phone, but I found the FM tuner quite nice and missed it a lot after switching to a Galaxy S4 a few years ago.

Comment Re:Too many close calls (Score 1) 349

You are attacking the Catholic (universal) church but not making any attempt to deny the facts stated.

You could argue that the total destruction of ALL civilization would have been good and you might be right to argue that. There is no question that the church is almost entirely responsible for preserving European society. It is also responsible for many wrongs, but you might be careful if you assume that the demise of Christianity would have prevented these.The fear of witches and demons was common to all cultures of the time and this predates by centuries the founding of the Christian church. Killing those believed to have "super-natural" powers has gone on throughout early and pre-civilization. Xenophobia was pretty universal and being different invited hatred and often, death.

Do you really believe that in a complete anarchy things would have been better for anyone who was seen as different?

Comment Re:Too many close calls (Score 1) 349

Religion and its attendant discipline kept civilization alive in Western Europe after the fall of Rome. I suspect it would do the same again.

That's the nicest description of the dark ages I've ever seen.

Nice or not, it is accurate. Virtually all knowledge that survived for several centuries did so in the hands of the church. (Or churches after the east-west schism of the 11th century.) Books were regularly hand copied as older copies deteriorated by priests. Almost no records from before the fall of Rome survived outside of those held by the church.

Whatever civilization survived the fall, and it was actually quite a bit, was as a result of the work of the church and its nearly universal European veneration.

Comment Re:getting my money's worth for prime (Score 1) 180

The real question, so far unanswered and, at least in this forum, unasked, is why Amazon is doing this. They are not using it to sell Prime. They seem to be keeping rather quiet about it.

My first thought is that it is tied to licensing arrangements. You know... the contracts that say who gets access to what content and when. Some verbiage in some agreement that prevents Amazon from making something available to everyone, but allows it for a restricted percentage of customers. After all, while there are a LOT of Prime accounts, they are a small fraction of all Amazon accounts.

Comment Re:Lie detector (Score 1) 290

For those not familiar with U.S. Federal budgeting, the President traditionally submits a budget proposal every year. There is no legal requirement to do so, but it has been done since the first President. The budget submitted has no legal significance at all and is sometimes simply ignored by the House of Representatives. The Constitution requires all legislation related to authorization and appropriation must originate with the House. Once approved by the House, it moves to the Senate. They may amend the legislation and, once both houses approve, it is then sent to the President for signature or veto. This is the first and only legal involvement of the President. If vetoed, it may still be approved if 2/3 of both houses agree to do so.

Both sides of this current sad parody of a government of statesmen blame the other for everything including things over which they have no control. Neither side is willing to compromise in any meaningful way and even auto commercials claim that only the weak ever compromise.

Comment Re:how the keys work (Score 1) 596

I agree with all of the issues with any disclosure of the private key except the first amendment issue. The first amendment protects an individual's right to say what he or she wants (with certain exceptions). It has nothing to say about forced disclosure of information. That comes under the fourth and fifth amendments. In this case it would not seem that the fifth is really applicable as there seems no way that this could incriminate Apple or any Apple employee, so it's the fourth that needs to be considered, There is a LOT of case law and IANAL, so I won't speak to it.

More significantly is the perception of the capabilities of the FBI's computer experts. I can assure you that they have talented people more that capable of finding the code that counts login failures and NOT calling the routine to reset the phone. They could probably build an iOS version that completely skipped the need to login, at least on a 5C which I believe lacks some of the hardware that enforces security policy in 6 and later phones.

In the end, the signing key is really the ultimate issue. It is literally the key to the kingdom and to all of the data on every iPhone and iPad.

Comment Re: On the one hand ... (Score 5, Informative) 132

As someone who WAS there, working with the security community dealing with the Morris work in 1988 and the WANK worm shortly after and as the author of the first detailed analysis of WANK (Worms Against Nuclear Killers) while at Lawrence Livermore National Laboratory, I was there when the term "cracker" was born. I can credit folks like Russell Brand (not THAT Russell Brand) with the creation of the term.

This was before the commercial Internet, before TCP/IP, and in a day when no one thought twice about having an open "guest" account on a system because computer security was not an issue. People who played around with computer code and modified system kernels, as opposed to those designing or writing them, were referred to as "hackers". We were professionals who did custom modifications to software and wrote tools to analyze them. At the time I had licensed access to the source code for a variety of systems of that day including AT&T Unix, RSX-11M, IAS, and VMS. Things like custom system calls, an un-delete command, code to allow a co-processor (FPS AP-120B) to directly access a computer's file system. These were what I was paid to do and I, like many I worked with.I called myself a hacker. I hacked code.

When the first transmittable worms, viruses, and trojans appeared, the people who wrote them were also "hackers", but those of us who hacked code legitimately didn't much care to be lumped in with the bad guys, so the term "cracker" was devised. It never really caught on. To most people, hackers are bad guys. It's unfortunate, but the horse has left the barn, and is now dead and continues to be beaten to a rotten pulp.

To this day, in the developer community the term "hacker" retains its original meaning, It's someone who hacks code, often to fix or work around limitations or bugs or to add new functionality. They still hold "hackathons" to work as a group on resolving very complex issues in open source projects and understand what "hacker" means in that context and just live with the fact that the general public has a slightly different idea of whet the word means.

Comment Verizon/UUnet used to be the best (Score 5, Interesting) 120

A few years ago, Verizon employed some to the best people in the best people in the world to handle network and routing security. They were very responsive to reports of address hijacking and related issues. Those folks have all left Verizon since they bought UUnet, though the rush for the door didn't start until about 4 years ago.

This all happened about the time I left the operational world and started moving into retirement, so I don't know the people who replaced them, but I am sure that, if they were replaced at all, that the new people were not of the caliber of those who left.

As is often the case, network security seems to have been declared a low priority at Verizon. after all, it does not make them any money. Of course, if they become known for bad security, it could have an impact on the bottom line at some point.

Slashdot Top Deals