Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment Security of open source software (Score 1) 596

The security of open source software has been both idealized and made the subject of targeted disinformation.

Generally, two philosophies exist:
that open source is more secure because it is more rigorously reviewed;
and, that proprietary software is more secure because access to the source code is limited.
While seeming contradictory, both schools of thought have validity depending on circumstances. Open source philosophy states that open source software cannot rely on obscurity for security — because the source code is transparent, security must be implemented well at the source code level. Also, open collaboration is thought to result in the earlier discovery and correction of security flaws—an aspect of the thesis that “given enough eyeballs, all bugs are shallow.

Security

Submission + - Given enough eyeballs, all bugs are shallow? (msdn.com)

root777 writes: Is the open source community far too trusting when it comes to security? Is it true that the Linus’ law is not applicable to open-source software development because, “most members of the periphery [those outside the core developer group] do not have the necessary debugging skills” and “the vast numbers of ‘eyeballs’ apparently do not exist.”

Comment It is all about Cost Benefit Analysis (Score 1) 361

If you treat it like a business problem and do a cost/benefit analysis which is what Schneier is suggesting, it may turn out to be true in this case where the cost to fix the security hole is far too expensive to cover the risk. This is common for many large businesses where they may treat the lives of people in their Data Center and hence put additional physical security controls there vs. someplace else as part of their Business Continuity/ Disaster Recovery threat assessment process. It is always a tough thing to do when you ask the question on how do you place a value to human life. The airforce puts a value on the cost to replace a pilot vs. a plane but how do you place something similar to a passenger.
Censorship

Modern Warfare 2 Not Recalled In Russia After All 94

thief21 writes "After claims that console versions Modern Warfare 2 had been recalled in Russia due to complaints from politicians and the gaming public over the infamous airport slaughter scene, it turns out the stories were completely untrue. Activision never released a console version of the game in Russia." Instead, they simply edited the notorious scene out of the PC version. They did this of their own volition, since Russia doesn't have a formal ratings committee.

Comment Whitelist it and not blacklist (Score 1) 297

Other than putting thousands of entries in my hosts file to block IP ranges, what options do I have to restrict access to locals only?

Instead of trying to blacklist entire IP ranges on who can't access your web board, instead of a deny ruleset, put in an allow only ruleset. For example, you could plug in your university IP range only in the allow and issue redirects with a proper error message on anyone outside of the allowed range

Comment Why shut down Apple store for updates? (Score 1) 519

One thing I can't figure out is why does Apple need to shut down their online store for updates? I would hope that they would treat it like any other roll out, create a test environment, make the necessary changes to your portal, update with all the new toys and products and then elevate to a production environment with the old portal pointing to the newly elevated site.

Comment Re:Alcohol (Score 1) 281

They'll also suggest a whole bunch of other, probably not so helpful stuff.

Sometimes ideas by employees just work. I know of a company which saved couple hundred thousand dollars by a employee suggestion on changing the default laser print settings from high quality to normal quality. You would be surprised sometimes in these economic conditions, how many dollars a simple employee suggestion could do. Those dollars saved probably saved some jobs.

Comment Re:Like maybe residuals and royalties (Score 1) 281

Nice in theory. In practice that will just become like the US patent system: you will have people submitting tons of general ideas that will prevent other employee to submit "derivative" ideas and/or could interfere with the company already ongoing projects.

Not always true. Most companies retain all IP( in this case ideas) whether on print or electronic media. So any upgraded "derivatives" can still be retained and put into concept

Cellphones

Turning an iPod Touch Into an iPhone 175

David Burnett recommends an eWeek article on the leading contenders to make an iPhone out of an iPod Touch. Of course your newly phone-capable iTouch needs no activation and no binding carrier contract, just Wi-Fi. One of the companies working in this space, JaJah, is bundling the software with back-end services such as billing, so that carriers — or anyone really — can offer free-calling iTouch phones.

Comment Re:TrueCrypt (Score 2, Informative) 468

When you don't need TrueCrypt or for that matter any whole disk encryption software

A Crypto nerd's imagination
Person1: His laptop's encrypted. Let's build a million dollar cluster to crack it
Person2: No Good! Its 4096 bit RSA!
Person1: Blast! Our evil plan is foiled!

What would actually happen:
Person1: His Laptop's encrypted. Drug him and hit him with this $5 wrench until he tells us the password
Person2: Got it

Source: http://xkcd.com/538/

Comment Re:Pirates (Score 1) 431

Security awareness among the general user population has improved considerably. So, as a corporation which makes a living out of selling software, would it be outlandish to suggest that they intentionally post a malicious version of the software on torrent sites. More of these situations happen, would atleast the security conscious people abandon downloading software and consider buying? Maybe

Slashdot Top Deals

Nothing succeeds like success. -- Alexandre Dumas

Working...