Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
Security

New "Spear Phishing" Attacks Target IT Admins 134

snydeq writes "A new breed of 'spear phishing' aimed at IT admins is making the rounds. The emails, containing no obvious malicious links, are fooling even the savviest of users into opening up holes in their company's network defenses. The authentic-looking emails, which often include the admin's complete name or refer to a real project they are working on, are the product of tactical research or database hacks and appear as if having been sent by the company's hosting provider. 'In each case, the victim remembered getting a similar sort of email message when they first signed on with a service and, thus, thought the bogus message was legitimate — especially because their cloud/hosting providers keep bragging about all the new data centers they're continuing to bring online.' The phishing messages often include instructions for opening up mail servers to enable spam relaying, to disable their host-based firewalls, and to open up unprotected network shares. Certainly fodder for some bone-headed mistakes on the part of admins, the new attack 'makes the old days of hoax messages that caused users to delete legitimate operating system files seem relatively harmless.'"

Comment Re:I get this ... (Score 1) 265

But hell no, let's just declare the DB useless when in fact the DBA / coder was useless.

It actually seems to have been some strange hardware issue(s) that have crashed the server a few times over the past month or so. Obviously I need to replace the server, which can be difficult to do as a non-profit.

But I reject the claim that either of us are useless.

Communications

Can Any Router Guarantee Bandwidth For VoIP? 414

cartman94501 writes "My wife and I use Vonage for Voice over IP at home, mainly for work-related phone calls so we don't have to give out our home number to clients and colleagues. Most of the time it works fine, but when I'm using BitTorrent or other high-bandwidth applications (purely for legal and non-copyright-violating purposes, of course), the call quality gets choppy. I have used my Linksys (not a WRT54G, so 'upgrading' it to Linux probably won't work) router's QoS feature to assign high priority to the MAC address of the Vonage box, low priority to the BitTorrent box, and medium quality to everything else, which helps a little, but not enough. Is there a router out there that would allow me to reserve, say, 75-90kbps of bandwidth off the top for VoIP and never, ever allow any application to use that, regardless of whether there's a VoIP call going on at the moment or not?" (More below)
Networking

P2P Traffic Shaping For Home Use? 288

An anonymous reader writes "My housemate uses an aggressive P2P client, that when in use makes the Internet unusable for everyone else connected to the network. After hearing about various ISPs shaping traffic to reduce P2P traffic, I was wondering if there was a solution for managing P2P traffic on a home network. I have a Linksys WRT54G available for hacking. Can Slashdot recommend a way to reduce the impact of P2P on my network and make it usable again?"
Businesses

Getting Rid of Staff With High Access? 730

HikingStick writes "I've been in the tech field for over 15 years. After more than nine years with the same company, I've been asked to step in and establish an IT department for a regional manufacturing firm. I approached my company early, providing four weeks notice (including a week of pre-scheduled [and pre-approved] vacation time). I have a number of projects to complete, and had planned to document some of the obscure bits of knowledge I've gleaned over the past nine years for the benefit of my peers, so I figured that would give me plenty of time. That was on a Friday. The following Monday, word came down from above that all of my privileged access was to be removed — immediately. So, here I sit, stripped of power with weeks ahead of me. From discussions with my peers in other companies, I know that cutting off high-privilege users is common, but usually in conjunction with a severance offer (to keep their hands off the network during those final weeks, especially if there is any ill-will). Should I argue for restored access, highlight the fact that I am currently a human paperweight, request a severance package, or simply become the most prolific Slashdot poster over the next few weeks? Does your company have a policy/process for dealing with high-privilege users who give notice? What is it, and do you make exceptions?"
Google

Google Health Opens To the Public 199

Several readers noted that the limited pilot test of Google Health has ended, and Google is now offering the service to the public at large. Google Health allows patients to enter health information, such as conditions and prescriptions, find related medical information, and share information with their health care providers (at the patient's request). Information may be entered manually or imported from partnered health care providers. The service is offered free of charge, and Google won't be including advertising. The WSJ and the NYTimes provide details about Google's numerous health partners.
Portables

2nd Generation "$100 Laptop" Will Be an E-Book Reader 286

waderoush writes "At a conference sponsored by the One Laptop Per Child Foundation this morning, OLPC founder unveiled the design for the foundation's second-generation laptop. It's actually not a laptop at all — it's a dual-screen e-book reader (we've got pictures). Negroponte said the foundation hopes that the cost of the new device, which is scheduled for production by 2010, can be kept to $75, in part by using low-cost displays manufactured for portable DVD players."
Google

Google Assists In Arrest Of Indian Man 609

An anonymous reader writes "After a Google user posted a profane picture of the Hindu saint Shivaji, Indian authorities contacted Google to ask for his IP address. Google complied. He was arrested and is reported to have been beaten by a lathi and asked to use the same bowl to eat and to use in the toilet. Not surprisingly, Google is a keen to play this down as Yahoo is being hauled over the coals by US Congress for handing over IP addresses and emails to the Chinese Government which resulted in a Chinese democracy activist being jailed." Readers are noting that these are 2 unrelated cases — the latter is several months old.
Medicine

Researchers Discover Gene That Blocks HIV 333

stemceller writes to tell us that a team of researchers at the University of Alberta claims to have discovered a gene capable of blocking HIV thereby preventing the onset of full blown AIDS. "Stephen Barr, a molecular virologist in the Department of Medical Microbiology and Immunology, says his team has identified a gene called TRIM22 that can block HIV infection in a cell culture by preventing the assembly of the virus. 'When we put this gene in cells, it prevents the assembly of the HIV virus," said Barr, a postdoctoral fellow. "This means the virus cannot get out of the cells to infect other cells, thereby blocking the spread of the virus.'"
Portables

Blu-ray In Laptops Could Be Hard On Batteries 202

damienhunter notes a Wired story on the power-hungry ways of the first generation of Blu-ray players coming soon to a laptop near you. "With the Sony-backed HD format emerging victorious from a two-year showdown with Toshiba's HD DVD, many laptop manufacturers are now scrambling to add Blu-ray drives in their desktop and notebook lineups. Next month, Dell will even introduce a sub-$1,000 Blu-ray notebook... But the promise of viewing an increasing variety of HD movies on your laptop may be overshadowed by ongoing concerns over the technology's vampiric effect on battery life. Indeed, if the first generation of Blu-ray equipped laptops are any indication, you might not get more than halfway through that movie before running out of juice completely, analysts say."

DS Games for Pre-readers? 256

ProfJonathan writes "My daughter just got a DS from the grandparents for her 6th birthday. She's only beginning to read, but wants a bunch of games of her own rather than just playing her older brothers' games. She got Nintendogs with the DS, so that's taken care of, but other relatives are asking what she might want. Can anyone recommend some good DS games that don't require reading skill, that might be age-appropriate and interesting for a 1st grade girl?" Wouldn't it be creepy if the kid had a really good brain age?

Microsoft Plans Flickr Competitor 156

An anonymous reader writes "Judging by newly posted job calls, Microsoft is now working on a Flickr-like online photo service. ZDNet reports: '"This feature team is building a next-generation photo and video sharing service that will compete with Flickr, SmugMug and other photo web solutions today. This is a 'v1' opportunity," the ad said. And video will be a part of the effort, too: "This role will work across the new Windows Live division with teams like Spaces, SkyDrive, Messenger and Hotmail to construct a winning strategy for Microsoft in photo and video sharing." Evidently, Microsoft sees the effort as an online extension of its current desktop technology.' Gundeep Hora, at CoolTechZone, feels that such a service is unlikely to succeed, and lays out the numerous challenges the company will face upon entering the market."
Google

Dvorak Says gPhone is Doomed 454

drewmoney writes "Speaking with his usual frustrated crankiness John Dvorak rants his way through an article explaining why the gPhone will never work. 'First of all, it wants to put Google search on a phone. It wants to do this because it is obvious to the folks at Google that people need to do Web searches from their phone, so they can, uh, get directions to the restaurant? Of course, they can simply use the phone itself to call the restaurant and ask! I've actually used various phones with Web capability. They never work right. They take forever to navigate. It's hard to read the screens ... I also hope that people note the fact that the public has not been flocking to smartphones of any sort.' "

Slashdot Top Deals

Where are the calculations that go with a calculated risk?

Working...