Forgot your password?
typodupeerror

Comment HP Procurve (Score 1) 322

Good pricing. Lifetime warranty on quite a bit of their gear.

If you are an all HP shop, you can get HP support departments for blade, server, san, network, etc. all involved right away. It is nice that they can't blame a different vendor for an issue.

Comment Re:ECC Support (Score 1) 361

I second this. ECC Support is primary reason when I use AMD desktop processors. For something like an Asterisk server, ECC is great peace of mind. I don't need a fast processor, just something will be reliably run for great lengths of time. Remember this DRAM error report based on Google's servers? Makes sense to use AMD desktop processors when you don't need a real server.
Security

Submission + - SPAM: Widespread Attacks Exploit Newly Patched IE Bug

itwbennett writes: The first widespread attack to leverage the Internet Explorer flaw that Microsoft patched in an emergency update Thursday morning has surfaced. By midday Thursday Symantec had spotted hundreds of Web sites that hosted the attack code. The attack installs a Trojan horse program that is able to bypass some security products and then give hackers access to the system, said Joshua Talbot, a security intelligence manager with Symantec. Once it has infected a PC, the Trojan sends a notification e-mail to the attackers, using a U.S.-based, free e-mail service that Symantec declined to name.
Link to Original Source

Submission + - Mozilla Firefox 3.6 Released 2

Shining Celebi writes: Mozilla has released Firefox 3.6 today, which adds support for Personas, lightweight themes that can be installed without restarting the browser, and adds further performance improvements to the new Tracemonkey Javascript engine. One of the major goals of the release was to improve startup time and general UI responsiveness, especially the Awesomebar. You can read the full set of release notes here.
Spam

Submission + - Court rules WHOIS privacy illegal for spammers (sedo.com)

Unequivocal writes: Spammers hiding behind a WHOIS privacy service have been found in violation of CAN-SPAM. It probably won't stop other spammers from hiding (what can?) but at least it adds another arrow in the legal quiver for skewering the bottom feeders:

'A recent decision by the Court of Appeals for the 9th Circuit has determined that using WHOIS privacy on domains may be considered "material falsification" under federal law... Although the ruling does not make use of WHOIS privacy illegal, it does serve as a clear message from the court that coupling the use of privacy services with intentional spamming will likely result in a violation of the CAN-SPAM act. This is an important decision that members of the domain community should refer to prior to utilizing a privacy shield.'

Communications

Journal SPAM: FBI got 2,000 phone records with fake terrorism emergencies

The Federal Bureau of Investigation used false terrorism emergencies to illegally collect more than 2,000 phone records between 2002 and 2006. A series of e-mails and memos obtained by The Washington Post details how FBI officials violated their own procedures and strained their communication analysis unit with non-urgent requests. In many instances, approval was granted after records had been collected to justify the FBI’s actions.

Submission + - Open-Source Javascript Flash Player (HTML5/SVG) (paulirish.com) 1

gbutler69 writes: Wow! Someone has gone and done it. Created a Flash Player written in Javascript targetting SVG/HTML5 capable browsers. It's not a complete implementation yet, but, it shows some real promise. Of course, there is the ever-famous vector "Hello World!" called Tiger. This really has promise. How long before HTML5/SVG next-generation browsers like Chrome, Firefox, Opera, Safari, Epiphany, and other Web-Kit based browsers completely supplant Flash and Silverlight/Moonlight?
Bug

Submission + - D-Link warns of vulnerable routers 1

wiedzmin writes: D-Link announced today that the problem, discovered by security researchers SourceSec, affects three of its wireless routers: DIR-855 (hardware version A2), DIR-655 (versions A1 to A4) and DIR-635 (version B) and lies in D-Link's implementation of Cisco's Home Network Administration Protocol (HNAP), which allows remote router configuration. The scope of the vulnerability is greatly reduced by the fact that the above routers have not been shipped with the affected firmware by default, so only those customers who updated their firmware could be affected. Or at least this was indicated in the company's response to the SourceSac claim that all D-Link routers sold since 2006 were affected.
Microsoft

Submission + - MS: upgrade to IE8, even though it's vulnerable (pcpro.co.uk)

Barence writes: Microsoft has issued a statement urging people to upgrade their browser to IE8, after the zero-day exploit that was used to attack companies such as Google went public. According to Microsoft's security advisory: "the vulnerability exists as an invalid pointer reference within Internet Explorer. It is possible under certain conditions for the invalid pointer to be accessed after an object is deleted. In a specially-crafted attack, in attempting to access a freed object, Internet Explorer can be caused to allow remote code execution." But, although IE6 has been the source of the attacks until now, Microsoft's advisory admits that both IE7 and IE8 are vulnerable to the same flaw, even on Windows 7.
Encryption

Submission + - Only 27% Of Organizations Use Encryption (net-security.org)

An anonymous reader writes: According to a Check Point survey of 224 IT and security administrators, over 40% of businesses in the last year have more remote users connecting to the corporate network from home or when traveling, compared to 2008. The clear majority (77%) of businesses have up to a quarter of their total workforce consisting of regular remote users. Yet, regardless of the growth in remote users, just 27% of respondents say their companies currently use hard disk encryption to protect sensitive data on corporate endpoints. In addition, only 9% of businesses surveyed use encryption for removable storage devices, such as USB flash drives. A more mobile workforce carrying large amounts of data on portable devices leaves confidential corporate data vulnerable to loss, theft and interception.
Security

Submission + - Factorization of a 768-bit RSA modulus (iacr.org)

dtmos writes: The 768-bit, 232-digit number RSA-768 has been factored. From the introduction:

The number RSA-768 was taken from the now obsolete RSA Challenge list as a representative 768-bit RSA modulus. This result is a record for factoring general integers. Factoring a 1024-bit RSA modulus would be about a thousand times harder, and a 768-bit RSA modulus is several thousands times harder to factor than a 512-bit one. Because the first factorization of a 512-bit RSA modulus was reported only a decade ago it is not unreasonable to expect that 1024-bit RSA moduli can be factored well within the next decade by an academic effort such as ours . . . . Thus, it would be prudent to phase out usage of 1024-bit RSA within the next three to four years.


IT

Submission + - Uniforms for the Help Desk 5

An anonymous reader writes: I am an IT worker in a mid sized company with approximately 500 employees. There are 30 people on the IT staff, 6 of which are on the help desk. Our help desk does have significant visibility in the company, and most people know us by face (some by name). Recently the idea has been floated up the management chain to have these help desk workers wear IT department branded shirts. The idea is to promote visibility and unity. Wearing of these shirts would be mandatory Monday through Thursday. The shirts would not be identical (there would be several styles offered). We would be the only department with specific garments outside of the normal business casual dress code.

Is management out of line with the industry in promoting this sort of policy change? Is the singling out of 6 employees as "the IT guys" a step in the right direction, or does it detract from the professionalism that we are trying to display as a department?

Comment Re:Desktop vs. server? (Score 1) 501

Same here. Our linux servers run Debian and we manually select the packages that are installed. Having a very clean , methodical, minimalistic installation is what we desire on those machines. Note, we do not install Popularity Contest on those machines.

My notebook, Kubuntu, Windows, everyday apps, and tons of software I only use a couple times a year.

Even if I used Popularity Contest on our servers, would that even give any better indicator on what I really use? There are several important apps that we build from source because the Debian archives are not current enough. Does Popularity Contest take this type of thing into account? (I would guess not)

Printer

Submission + - HP accused of illegal exportation to Iran (boston.com)

AdamWeeden writes: According to research done by the Boston Globe, HP has been secretly using a third-party company to sell printers to Iran. This is illegal under a ban instituted in 1995 by then U.S. President Bill Clinton. The third-party company, Redington Gulf, operates out of Dubai and previously stated on their web site that the company began in 1997 with "a team of five people and the HP supplies as our first product, we started operations as the distributor for Iran." though now the site has been changed to remove the mention of Iran. Has HP unknowingly been supplying Iran with technology or have they been trying to secretly get by the U.S. governement's export restrictions?

Slashdot Top Deals

He who has but four and spends five has no need for a wallet.

Working...