Follow Slashdot stories on Twitter


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:use SMS (Score 1) 113

Ever heard of "Malicious Number Porting"? Who needs to intercept SMS when your telco will do it for you?

SMS provides poor security...


At which point, none of your phone calls or SMS come thru, so you know that the device is compromised. And the attacker STILL needs the first-factor to pair with the SMS, and to have a way to trigger the security key SMS to come thru during the brief window between when the port happens and before it is noticed.

If anyone is that dedicated to hacking you, then they're going to get your data no matter what. (And if your data really REALLY is that valuable, then you'll be protecting it with something a hell of a lot more secure than this anyway....)


Submission + - AIX 25th Anniversary (

An anonymous reader writes: Twenty five years ago on January 21, 1986, IBM Austin launched a new operating system called IBM RT Personal Computer Advanced Interactive eXecutive — better known as AIX--with a new system called the IBM RT PC. The system ran on a RISC processor codenamed “ROMP” (for Research Office Products Division MultiProcessor) and was originally marketed as an engineering workstation.

Submission + - Universal Sends DMCA Takedown On 1980 Report (

An anonymous reader writes: For many, many years, every time some new technology has come along, the music industry has insisted that it's going to "kill" the industry. The player piano was supposed to kill live music. So was the radio. And, of course, every time this happens the press is willing to take the industry's word at face value. In 1980, the news program 20/20 posted a report all about how "home taping is killing music," with various recording industry execs insisting the industry was on its last legs unless something was done. Someone posted that 20/20 episode to YouTube a few years back, where it sat in obscurity until people noticed it a couple weeks ago. And suddenly, Universal Music issued a takedown notice for the show. Universal Music does not own 20/20, and there were only brief clips of music in the show. It appears the only reason for Universal to issue the takedown is that it doesn't want you seeing how badly it overreacted in the past.

Comment cheapest POTS hard-wired walmart phone (Score 1) 110

I know I probably lose geek points, but after fighting with interference on wireless phones (2.4 and 5 ghz) or headsets that don't go loud enough, I went out to Walmart, bought the cheapest POTS phone I could find that didn't have an answering machine in it. Then I bought a 50-foot handset cord, and tie-wrapped it to the side of my network rack. Yeah, I can't make it to rack # 15, but for casual "read me the diag lights" calls to vendors, works pretty good.


Submission + - Are Your "Secret Questions" Too Easily Ans (

wjousts writes: We've all seen the "secret" questions that are used to reset your password on various sites and several high-profile break-ins have resulted from hackers guessing the answers to secret question. This week, research from Microsoft and Carnegie Mellon University, presented at the IEEE Symposium on Security and Privacy will show how woefully insecure these functions are.

As reported in Technology Review:

In a study involving 130 people, the researchers found that 28 percent of the people who knew and were trusted by the study's participants could guess the correct answers to the participant's secret questions. Even people not trusted by the participant still had a 17 percent chance of guessing the correct answer to a secret question.

The least-secure questions are simple ones whose answers can be guessed with no existing knowledge of the subject, the researchers say. For example, the answers to the questions "What is your favorite town?" and "What is your favorite sports team?" were relatively easy for participants to guess. All told, 30 percent and 57 percent of the correct answers, respectively, appeared in the top-five list of guesses.


Submission + - NSA list top 25 programming errors. (

line-bundle writes: The NSA, via BBC has helped put together the list of the world's most dangerous coding mistakes. Over thirty companies including Microsoft, Department of Homeland Security got together to publish the document. The SANS Institute has more information. Just two errors listed in the document account for more than 1.5m website security breaches.

Submission + - Is a 9/80 work schedule a good thing? 4

cellocgw writes: "My company is in the process of implementing a version of "9/80," a work schedule which squeezes 80 hours' labor time into 9 business days and provides every other Friday off. I was wondering how this has been implemented in other companies, and how it's worked out for other Slashdot readers. Is your system flexible? Do you find time to get personal stuff done during the week? Is Friday good for anything other than catching up on lost sleep? And perhaps most important, do your managers respect the off-Fridays or pull people in on a regular basis to handle "crises"?"

Slashdot Top Deals

Where are the calculations that go with a calculated risk?