Slashdot is powered by your submissions, so send in your scoop


Forgot your password?
Get HideMyAss! VPN, PC Mag's Top 10 VPNs of 2016 for 55% off for a Limited Time ×

Comment Re:No 'clear evidence' (Score 0) 1010

Sure you can try to use that argument, but the police may not agree with you. There is a reason that there is a difference between murder and man slaughter.

Not everyone is as tech savvy as those on slashdot, I see numerous violations similar to this all over the place. The main fault of Hillary is not paying attention to the procedures in dealing with Secret/Top Secret data. She relied on her staff to help remind her of those responsibilities and they failed in that.

I would compare what Hillary did is: driving a car at night without headlights on, while having a driving instructor in the passenger seat, then getting pulled over by the police.

Comment Re:DDOS is lame (Score 2) 99

> Doesn't take any special skills.

Depends on who you are attacking. Anyone who could find a weak point in AWS and take down a whole datacenter, would be impressive and quite scary.

Sure, renting a bunch of zombie machines and doing DDOS is nothing special, but rolling up your own malware (or just convincing a shit load of people to help you) is much more impressive.

Note: by impressive, I mean likelihood of a SWAT team to come down and bust your ass.

Comment Re:Good for them! (Score 1, Interesting) 230

I would think it would be more risky. Chances are the data is replicated on every machine, and is "transmitted" (network or copy by physical media) in an unencrypted form. In general I would consider it less risky using a newer system that doesn't store all the data in one place. Microsoft, Amazon, Google spend a lot more effort in securing their data than pretty much any other tech company.

Also can you provide examples of "cloud-provider based security breaches"?

Slashdot Top Deals

"In order to make an apple pie from scratch, you must first create the universe." -- Carl Sagan, Cosmos