Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment automated fix already out (Score 2) 79

Unless you don't update AV definitions, this is a nonissue. The AV definition files dated 5/16/16 rev24 included an updated av engine component that fixes this vulnerability. By the time I heard of this issue, our SEPM server had already downloaded the defs with fixed engine and 3/4 of our enterprise was already up to date.

Biotech

Artificial Wombs In the Near Future? 367

New submitter DaemonDan writes "The first successful pregnancy by IVF was accomplished over 50 years ago, essentially creating a multi-billion dollar industry. Many scientists are trying to take it one step farther with a 100% test tube baby brought to term in an artificial womb. 'Cornell University's Dr. Hung-Ching Liu has engineered endometrial tissues by prompting cells to grow in an artificial uterus. When Liu introduced a mouse embryo into the lab-created uterine lining, "It successfully implanted and grew healthy," she said in this New Atlantis Magazine article. Scientists predict the research could produce an animal womb by 2020, and a human model by early 2030s.' The author of the article seems to believe that birth via artificial wombs could become the new norm, but is it really feasible, desirable or even affordable for the majority of Earth's population?"
GUI

What Is the Future of Firewalls? 414

jlmale0 writes "When I mess with my WAP/router at home or coordinate with the network team at work, it seems like I'm stuck in 1995. We're still manually listing IP address/port combinations for our firewall rules. There's a certain simplicity to this when dealing with a single system, but there are firewalls everywhere these days. What's available for managing complex firewall arrangements? What's being developed? Can I take a Visio diagram, run it through a script, and get a list of firewall rules? What about a GUI that illustrates the current system configuration and then lets me drag and drop systems across firewalls, and have the individual firewall ports automatically configured? What about tying a firewall into an authentication system so that when jdoe logs in, only then are the firewalls opened to pass her traffic? What about managing distributed firewalls so that one repository of rules opens up your system's firewalls, the DMZ firewall, and the public firewall all at once? Let's get a conversation started. What cool projects do I need to know about? What cool management features would you like to see? What's next for firewall management?"

Comment Re:How did this end up on the main page? (Score 5, Informative) 311

The SHA-1 hash is available on any official downloads (Vista, Office 2007, etc) from Microsoft. That includes TechNet, MSDN, and Connect (Beta testers) download links. For reference, b71e04564ca22e4d9928e59298eff87cf62b382b is the SHA-1 hash from the TechNet Plus download of Vista x86 (one DVD includes all versions except Enterprise).

Slashdot Top Deals

"Be there. Aloha." -- Steve McGarret, _Hawaii Five-Oh_

Working...