An anonymous reader writes: I do some contract work on the side, and am helping a client set up a new point-of-sale system. For the time being, it's pretty simple: selling products, keeping track of employee time, managing inventory and the like. However, it requires a small network because there are two clients, and one of the clients feeds off of a small SQL Express database from the first. During the setup, the vendor disabled the local firewall, and in a number of emails back and forth since (with me getting more and more aggravated) they went from suggesting that there's no need for a firewall, to outright telling me that's just how they do it and the contract dictates that's how we need to run it. This isn't a tremendous deal today, but with how things are going, odds are there will be e-Commerce worked into it, and probably credit card transactions... which worries the bejesus out of me.
So my question to the Slashdot masses: is this common? In my admittedly limited networking experience, it's been drilled into my head fairly well that not running a firewall is lazy (if not simply negligent), and to open the appropriate ports and call it a day. However, I've seen forum posts here and there with people admitting they run their clients without firewalls, believing that the firewall on their incoming internet connection is good enough, and that their client security will pick up the pieces. I'm curious how many real professionals do this, or if the forum posts I'm seeing (along with the vendor in question) are just a bunch of clowns.
schwit1 writes: New research by astronomers suggests that the Milky Way is about half as massive as previously estimated. It was thought to be roughly the same mass as Andromeda, weighing in at approximately 1.26 x 10^12 solar masses (PDF). This new research indicates its mass is around half the mass of Andromeda. "Galaxies in the Local Group are bound together by their collective gravity. As a result, while most galaxies, including those on the outskirts of the Local Group, are moving farther apart due to expansion, the galaxies in the Local Group are moving closer together because of gravity. For the first time, researchers were able to combine the available information about gravity and expansion to complete precise calculations of the masses of both the Milky Way and Andromeda. ... Andromeda had twice as much mass as the Milky Way, and in both galaxies 90 percent of the mass was made up of dark matter."
Andreas Kolbe writes: The Daily Dot's EJ Dickson reports how she accidentally discovered that a hoax factoid she added over five years ago as a stoned sophomore to the Wikipedia article on "Amelia Bedelia, the protagonist of the eponymous children's book series about a 'literal-minded housekeeper' who misunderstands her employer's orders," had not just remained on Wikipedia all this time, but come to be cited by a Taiwanese English professor, in "innumerable blog posts and book reports", as well as a book on Jews and Jesus. It's a cautionary tale about the fundamental unreliability of Wikipedia. And as Wikipedia ages, more and more such stories are coming to light.
An anonymous reader writes: Earlier this year, just over half of the military officers put in charge of U.S. nuclear launch facilities were implicated in an exam cheating scandal. The Air Force conducted regular exams to keep officers current on the protocols and skills required to operate some of the world's most dangerous weapons. But the way they graded the test caused problems. Anything below a 90% score was a fail, but the remaining 10% often dictated how a launch officer's career progressed. There might not be much functional difference between a 93% and a 95%, but the person scoring higher will get promoted disproportionately quicker. This inspired a ring of officers to cheat in order to meet the unrealistic expectations of the Air Force. Now, in an effort to clean up that Missile Wing, the Air Force is making the exams pass/fail. The officers still need to score 90% or higher (since it's important work with severe consequences for failure), but scores won't be recorded and used to compete for promotions anymore. The Air Force is also making an effort to replace or refurbish the aging equipment that runs these facilities.
Lucas123 writes: The Alliance of Artists and Recording Companies is suing Ford and General Motors for millions of dollars over alleged copyrights infringement violations because their vehicles' CD players can rip music to infotainment center hard drives. The AARC claims in its filing (PDF) that the CD player's ability to copy music violates the Audio Home Recording Act of 1992. The Act protects against distributing digital audio recording devices whose primary purpose is to rip copyrighted material. For example, Ford's owner's manual explains, "Your mobile media navigation system has a Jukebox which allows you to save desired tracks or CDs to the hard drive for later access. The hard drive can store up to 10GB (164 hours; approximately 2,472 tracks) of music." The AARC wants $2,500 for each digital audio recording device installed in a vehicle, the amount it says should have been paid in royalties.
An anonymous reader writes: We heard a couple weeks ago about an incredibly pushy Comcast customer service representative who turned a quick cancellation into an ordeal you wouldn't wish on your enemies. To try and find out what could cause such behavior, The Verge reached out to Comcast employees, hoping a few of them would explain training practices and management directives. They got more than they bargained for — over 100 employees responded, and they painted a picture of a corporation overrun by the neverending quest for greater profit. From the article: 'These employees told us the same stories over and over again: customer service has been replaced by an obsession with sales, technicians are understaffed and tech support is poorly trained, and the massive company is hobbled by internal fragmentation. ... Brian Van Horn, a billing specialist who worked at Comcast for 10 years, says the sales pitch gradually got more aggressive. "They were starting off with, 'just ask," he says. "Then instead of 'just ask,' it was 'just ask again,' then 'engage the customer in a conversation,' then 'overcome their objections.'" He was even pressured to pitch new services to a customer who was 55 days late on her bill, he says.'
jrepin writes: Today, a child without access to a computer (and the Internet) at home is at a disadvantage before he or she ever sets foot in a classroom. The unfortunate reality is that in an age where computer skills are no longer optional, far too many families don't possess the resources to have a computer at home. Linux Journal recently had the opportunity to talk with Ken Starks about his organization, Reglue (Recycled Electronics and Gnu/Linux Used for Education) and its efforts to bridge this digital divide.
An anonymous reader writes: Every time a city- or state-wide disaster strikes, services to help the victims slowly crop up over the following days and weeks. Sometimes they work well, sometimes they don't. Today, city officials in San Francisco and Portland announced a partnership with peer-to-peer lodging service Airbnb to work out some disaster-preparedness plans ahead of time. Airbnb will locate hosts in these cities who will commit to providing a place to stay for people who are displaced in a disaster, and then set up alerts and notifications to help people find these hosts during a crisis. The idea is that if wildfires or an earthquake forces thousands of people to evacuate their homes, they can easily be absorbed into an organized, distributed group of willing hosts, rather than being shunted to one area and forced to live in a school gymnasium or something similar.
An anonymous reader writes: Brian Krebs reports on information from Columbia, Md.-based threat intelligence firm Cyber Engineering Services Inc. that attackers thought to be operating out of China hacked into the corporate networks of three top Israeli defense technology companies. The attackers were seeking technical documents related to Iron Dome, Israel's air defense system. "IAI was initially breached on April 16, 2012 by a series of specially crafted email phishing attacks. ... Once inside the IAI’s network, [the attackers] spent the next four months in 2012 using their access to install various tools and trojan horse programs on systems throughout company’s network and expanding their access to sensitive files, CyberESI said. The actors compromised privileged credentials, dumped password hashes, and gathered system, file, and network information for several systems. The actors also successfully used tools to dump Active Directory data from domain controllers on at least two different domains on the IAI’s network. All told, CyberESI was able to identify and acquire more than 700 files — totaling 762 MB total size — that were exfiltrated from IAI’s network during the compromise. The security firm said most of the data acquired was intellectual property and likely represented only a small portion of the entire data loss by IAI." Most of the stolen material pertained to Arrow III missiles, UAVs, and ballistic rockets.
schwit1 writes: "With a drive of 157 feet on Sunday, the Mars rover Opportunity broke the Soviet record, set by Lunokhod 2 in 1973, for the longest distance traveled by a vehicle on another planet. "If the rover can continue to operate the distance of a marathon — 26.2 miles (about 42.2 kilometers) — it will approach the next major investigation site mission scientists have dubbed "Marathon Valley." Observations from spacecraft orbiting Mars suggest several clay minerals are exposed close together at this valley site, surrounded by steep slopes where the relationships among different layers may be evident. The Russian Lunokhod 2 rover, a successor to the first Lunokhod mission in 1970, landed on Earth's moon on Jan. 15, 1973, where it drove about 24.2 miles (39 kilometers) in less than five months, according to calculations recently made using images from NASA's Lunar Reconnaissance Orbiter (LRO) cameras that reveal Lunokhod 2's tracks."
An anonymous reader writes: The first teaser trailer for the final installment of the Middle Earth saga, The Hobbit: The Battle of Five Armies, debuted at Comic-Con, and now Warner Bros have made it available online. While the trailer contains some nice shots on a visual level, very much in keeping with the Lord of the Rings trilogy, about 80% of the trailer's awesomeness is provided by the background music. Pippin's mournful song from Return of the King plays intercut with the doomed mission that Faramir leads on his father Denethor's orders.
chicksdaddy writes: A four-year-old vulnerability in an open source component that is a critical part of Android leaves hundreds of millions of mobile devices susceptible to silent malware infections. The vulnerability affects devices running Android versions 2.1 to 4.4 ("KitKat"), according to a statement released by Bluebox. The vulnerability was found in a package installer in affected versions of Android. The installer doesn't attempt to determine the authenticity of certificate chains that are used to vouch for new digital identity certificates. In short, Bluebox writes, "an identity can claim to be issued by another identity, and the Android cryptographic code will not verify the claim."
The security implications of this are vast. Malicious actors could create a malicious mobile application with a digital identity certificate that claims to be issued by Adobe Systems. Once installed, vulnerable versions of Android will treat the application as if it was actually signed by Adobe and give it access to local resources, like the special webview plugin privilege, that can be used to sidestep security controls and virtual 'sandbox' environments that keep malicious programs from accessing sensitive data and other applications running on the Android device. The flaw appears to have been introduced to Android through an open source component, Apache Harmony. Google turned to Harmony as an alternative means of supporting Java in the absence of a deal with Oracle to license Java directly.
Work on Harmony was discontinued in November, 2011. However, Google has continued using native Android libraries that are based on Harmony code. The vulnerability concerning certificate validation in the package installer module persisted even as the two codebases diverged.
New submitter meeotch writes: According to a new study by the Urban Institute, 35% of U.S. adults with a credit history (91% of the adult population of the U.S.) have debt "in collections" — a status generally not acquired until payments are at least 180 days past due. Debt problems seem to be worse in the South, with states hovering in the 40%+ range, while the Northeast has it better, at less than 30%. The study's authors claim their findings actually underrepresent low-income consumers, because "adults without a credit file are more likely to be financially disadvantaged."
Oddly, only 5% of adults have debt 30-180 days past due. This latter fact is partially accounted for by the fact that a broader range of debt can enter "in collections" status than "past due" status (e.g. parking tickets)... But also perhaps demonstrates that as one falls far enough along the debt spiral, escape becomes impossible. Particularly in the case of high-interest debt such as credit cards — the issuers of which cluster in states such as South Dakota, following a 1978 Supreme Court ruling that found that states' usury laws did not apply to banks headquartered in other states.
Even taking into account the folks who lost a parking ticket under their passenger seat, 35% is a pretty shocking number. Anyone have other theories why this number is so much higher than the 5% of people who are just "late"? How about some napkin math on the debt spiral?
An anonymous reader writes: Electronic Arts has announced a new program called "EA Access," a subscription-based service that will grant Xbox One users access to a small catalog of EA's popular games, as well as early trials of upcoming games. They're beta testing the service now, and the available games are FIFA 14, Madden NFL 25, Peggle 2, and Battlefield 4. (More titles will be added later.) They're charging $5 per month or $30 per year. It probably won't ever include their newest releases, but it's interesting to see such a major publisher experimenting with a Netflix-style subscription service.
An anonymous reader writes: Wladimir Palant is the creator of the Adblock Plus browser extension, but he often gets asked how it compares to a similar extension for Chrome called Adblock. In the past, he's told people the two extensions achieve largely the same end, but in slightly different ways. However, recent changes to the Adblock project have him worried. "AdBlock covertly moved from an open development model towards hiding changes from its users. Users were neither informed about that decision nor the reasons behind it." He goes through the changelog and highlights some updates that call into question the integrity of Adblock. For example, from an update on June 6th: "Calling home functionality has been extended. It now sends user's locale in addition to the unique user ID, AdBlock version, operating system and whether Google Search ads are being allowed. Also, AdBlock will tell getadblock.com (or any other website if asked nicely) whether AdBlock has just been installed or has been used for a while — again, in addition to the unique user ID." Of course, Palant has skin in this game, and Adblock Plus has dealt with fallout from their "acceptable ads policy," but at least it's still developed in the open.
From the Firepick website: 'We are developing a really cool robotic machine that is capable of assembling electronic circuit boards (it also 3D prints, and does some other stuff!). It uses a vacuum nozzle to pick really tiny resistors and computer chips up, and place them down very carefully on a printed circuit board.' There are lots of companies here and in China that will happily place and solder components on your printed circuit board, but hardly any that will do a one-off prototype or a small quantity. And the components have gotten small enough that this is really a job for a robot (or at least a Waldo), not human fingers. || There are obviously other devices on the market that do this, but Firepick Delta creator Neil Jansen says they are far too expensive for small companies, let alone individual makers.
The Firepick Delta Hackaday page talks about a $300 price for this machine. That may be too optimistic, but even if it ends up costing two or three times that amount, that's still a huge step forward for small-time inventors and custom manufacturers who need to populate just a few circuit boards, not thousands. They have a Haxlr8r pitch video, and have been noticed by TechCrunch, 3DPrintBoard.com, and Adafruit, just to name a few. Kickstarter? Not yet. Maybe next year. Open source? Totally, complete with GitHub repository. And they were at OSCON 2014, which is where Timothy found them. (Alternate Video Link)
astroengine writes: New observations from NASA's Saturn-orbiting Cassini spacecraft have revealed at least 101 individual geysers erupting from Enceladus' crust and, through careful analysis, planetary scientists have uncovered their origin. From the cracked ice in this region, fissures blast out water vapor mixed with organic compounds as huge geysers. Associated with these geysers are surface "hotspots" but until now there has been some ambiguity as to whether the hotspots are creating the geysers or whether the geysers are creating the hotspots. "Once we had these results in hand, we knew right away heat was not causing the geysers, but vice versa," said Carolyn Porco, leader of the Cassini imaging team from the Space Science Institute in Boulder, Colo., and lead author of one of the research papers. "It also told us the geysers are not a near-surface phenomenon, but have much deeper roots." And those roots point to a large subsurface source of liquid water — adding Enceladus as one of the few tantalizing destinations for future astrobiology missions.