Forgot your password?
typodupeerror

Comment Re: Why donâ(TM)t we watch everything? (Score 4, Informative) 52

The sky is huge. Most supernovas we survive are going to be very far away and are not very bright from our point of view. Therefore you need a big telescope to collect enough light to see them. The bigger the telescope is, the more of a minimum magnification level youâ(TM)ll have. There for youâ(TM)ll only be able to see a small fraction of a percentage of the sky at a time. Projects that survey the entire sky (e.g. those that look for asteroids) can take several months with just one telescope. Most large ground based telescope installations are dedicated to various research projects, usually studying one area of the sky. Not all of them can operate all the time due to weather. Until we have a large array of telescopes in space, itâ(TM)s unlikely weâ(TM)ll be able to constantly monitor the entire sky at any magnitude level enough to catch one off events like this. So therefore, amateur astronomy is still important.

Comment Re:Unencrypted = Stupid (Score 1) 645

I'm sure they were encrypted. AES-256 is a symmetric encryption algorithm. The key has to be stored somewhere, many times in the same database the credit card numbers are being stored. How else would the credit card numbers get stored to the database in the first place? If they got system level access (which from what they are saying, it sounds like they did...), I'm sure they have encryption keys as well.

Comment Re:passwords? (Score 1) 645

If they don't store them plaintext, they still have to store a hash (MD5, SHA2, etc...). If they know the hash algorithm (which I'm sure they do if they got DB access), they could easily run a brute force attack on the hashes that will crack any weak passwords (which I'm sure many are). Even password hashes on Linux systems can be cracked if the passwords are weak and the attacker has time. See http://www.openwall.com/john/.
Earth

GPS Receiver Noise Can Be Used To Detect Snow Depth 51

cremeglace writes "Scientists at the University of Colorado at Boulder have found a use for GPS besides finding restaurants or the occasional road-that-doesn't-exist: it can be used to measure snow depth. The new technique, which takes advantage of distortions of the GPS signal after it reflects off the snowpack, may potentially improve weather forecasts by allowing meteorologists to track snowfall patterns. ScienceNOW has the story, which one geophysicist describes as 'a classical case of one person's noise becoming another person's signal.'"

Comment Re:Scary that they sold the disk at all (Score 1) 369

i'd use "dd if=/dev/urandom of=/dev/sda" Urandom is slower but better..

If you have access to dd, you probably have access to shred. It makes several passes using different patterns (25 by default), and has the option of zeroing the drive on the last pass. I believe it meets DOD standards. I'm not sure how effective it is with slack space, which often holds recoverable data even after running utilities that are supposed to wipe data off drives, but dd wouldn't be any better.

Shred works on a filesystem level to delete individual files on the drive. Worse than that, it only works on a subset of filesystems (primarily Linux and Unix based).

You want something that wipes *everything* from the drive, no matter what the filesystem is. dd, or dcfldd (which is what I prefer to use) does a sector by sector copy of data from a source to a destination. So the following command:

dd if=/dev/urandom of=/dev/sda

Will effectively fill the hard drive with random data making and data recovery impossible.

Security

Submission + - What to Do When Your Security is Breached

ancientribe writes: When you've got a full-blown security breach on your hands, what do you do? If you've been smart, you'll already have a computer security incident response team — and a plan — in place. But many companies are too resource-strapped to have a full-blown, fully-tested incident response strategy. Here are some tips on what to do — and what not to do.

http://www.darkreading.com/document.asp?doc_id=120 172&WT.svl=news1_2
Privacy

Widespread Spying Preceded '04 GOP Convention 471

Frosty Piss alerts us to a story in the New York Times reporting on details that are emerging of a far-flung spying operation lasting up to a year leading up to the 2004 Republican National Convention. The New York Police Department mounted a spy campaign reaching well beyond the state of New York. For at least a year before the convention, teams of undercover New York police officers traveled to cities across the US, Canada, and Europe to conduct covert observations of people who planned to protest at the convention. Across the country undercover officers attended meetings of political groups, posing as sympathizers or fellow activists. In at least some cases, intelligence on what appeared to be lawful activity was shared with other police departments. Outlines of the pre-convention operations are emerging from records in federal lawsuits brought over mass arrests during the convention.

Slashdot Top Deals

The moon is a planet just like the Earth, only it is even deader.

Working...