Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Is Remote Instruction the Future of College?

INT_QRK Online delivery happens now (81 comments)

Online deliver is but one method that nearly every University offers for some number of its classes, and that number and ratio varies by program. Some classes are full classroom delivery, some are full lecture delivery, some are hybrid. I believe that's OK. The future is in whatever combination proves most effective and economical as demonstrated by some metrics that include testing and quality of subsequent work. It is best to avoid extreme positions of all or nothing.

about two weeks ago
top

DEA Paid Amtrak Employee To Pilfer Passenger Lists

INT_QRK Re:Let's play the who goes to jail game.... (127 comments)

Thing is, the NSA and the DEA both do a lot of legitimately essential work across a number of important areas. Notwithstanding any argument whether in DEA's case there might be redundancy as one of many special focus law enforcement agencies, NSA performs some unique missions nobody else does, like crypto production, for example, or performs to the same level, like coordinating foreign focused Signals Intelligence among and serving the Military branches. Also, NSA itself is so stove-piped that even if one area really was "out of control" as alleged, other parts are regular, boring, but arguably essential grunt-work for no-kidding recognizable National Security functions. The key is that regulation and oversight, which is what legitimate bureaucracy is all about, has to be consistently enforced. Bureaucratic baboonery, though ordinary and pervasive, should be astutely and vigilantly guarded against. Like entropy, systems of people will always trend towards out-of-control conditions unless well managed.

about two weeks ago
top

DEA Paid Amtrak Employee To Pilfer Passenger Lists

INT_QRK Re:Let's play the who goes to jail game.... (127 comments)

Key questions include: a. what budget line item did the $900K come from?; b. what did the funding justification documentation look like?; and, c. at what level was this approved, and by whom? If DEA has so much money laying about that they can toss it around without adult supervision, then I suggest that there may be some oversight committees who might want to have some hearings.

about two weeks ago
top

Do Dark Matter and Dark Energy Cast Doubt On the Big Bang?

INT_QRK Re:Oh good lord. (225 comments)

...and hey, I thought that with "settled science" one is never allowed to question, or even more egregious, test, a theory, right?

about three weeks ago
top

Gmail Recognizes Addresses Containing Non-Latin Characters

INT_QRK Re:Anti-Semitism (149 comments)

You are beneath contempt, and it would be otherwise intuitive that you should be ignored as an aberration. However, it is extremely important that decent people of good will realize that their opposites, people like you, are not an aberration, that you exist in the environment as a pervasive and pernicious evil, and therefore appropriate countermeasures must be put in place and vigilance maintained.

about three weeks ago
top

How long ago did you last assemble a computer?

INT_QRK Re:so, I'm in the more than 8 yrs ago camp (391 comments)

I'll bet most people today are interpreting this as simply connecting computer peripherals. The last time I assembled a computer was when I bought a chassis, mother board, RAM, Power Supply, drives, etc., separately, in parts, and assembled then configured it. I don't think this is very common anymore. Used to be.

about a month ago
top

The CIA Does Las Vegas

INT_QRK I have no idea what you're talking about...so (124 comments)

..here's a bunny... Your message is weak and garbled unless it's really only to express gratuitous rage against the U. S. intelligence community, in which case, OK, at least that part is loud and clear. If, however, your point is to discourage participation of an informed and interested party in a useful forum that, independently, addresses a valid global concern, cyber security, then your message is both muddy and unsupported.

about a month ago
top

Australian Electoral Commission Refuses To Release Vote Counting Source Code

INT_QRK Re:Security (112 comments)

The confusing part of the conversation, I think, is the straw man idea of "releasing" the source code in order for it to be determined secure. What does "release" in that context even mean? If security is in question (which I assume to mean the constituent attributes of Confidentiality, Integrity and Availability), which security should always be for such a system, then one could use a trusted broker to examine and report on inspection and test of the architecture and code without "releasing" the code so that anyone could examine it, presumably to facilitate vulnerability discovery.

about a month and a half ago
top

People Who Claim To Worry About Climate Change Don't Cut Energy Use

INT_QRK Because today's "Progressives"... (710 comments)

...are all about controlling OTHER peoples' behavior (and redistributing THEIR property).

about a month and a half ago
top

India's National Informatics Centre Forged Google SSL Certificates

INT_QRK Re:Who do they think they are? (107 comments)

I was making an observation, not an apology. Notice that I never added, "...and this is always good thing." That said, neither is it always a bad thing.

about a month and a half ago
top

India's National Informatics Centre Forged Google SSL Certificates

INT_QRK Re:All about trust (107 comments)

...and that's good. Loss of trust and confidence is the price one pays for getting caught breaching same.

about a month and a half ago
top

India's National Informatics Centre Forged Google SSL Certificates

INT_QRK Re:Who do they think they are? (107 comments)

All countries conduct espionage to the extent that they prioritize their capabilities, and against targets where they perceive threats and/or opportunities.

about a month and a half ago
top

India's National Informatics Centre Forged Google SSL Certificates

INT_QRK Re:Repercussions? (107 comments)

The bargain lies in the relatively low cost of relatively skilled labor. Other considerations, where there might be awareness, are secondary, or less.

about a month and a half ago
top

India's National Informatics Centre Forged Google SSL Certificates

INT_QRK Re:Repercussions? (107 comments)

“Power attracts the corruptible. Suspect any who seek it.” Frank Herbert, Chapterhouse: Dune

about a month and a half ago
top

Windows 9 To Win Over Windows 7 Users, Disables Start Screen For Desktop

INT_QRK Re:hmmmmm (681 comments)

A wise Buckaroo once observed that wherever you go, well, there you are. This describes exactly how I feel about a new Windows version: "okey-dokey." I'll politely wield it sans pause or undue drama when some employer supplies it and/or circumstances requires it. In the mean time, I'll continue to happily and productively employ OS X and Gnu/Linux on machines that I purchase and use. Ain't diversity grand?

about 2 months ago
top

Exploiting Wildcards On Linux/Unix

INT_QRK Re:Computers were conceived to execute user comman (215 comments)

Because, since the mainframe days, a new and unforeseen computer/user pairing had evolved. For emphasis, I'll say it again, evolved; never designed from the ground up. Smaller cheaper, but nonetheless ever more powerful, computers became available to a class of consumers spanning the general population, now networked to many other such computer/user pairs. These general-population consumers find themselves operating systems far beyond their ability (or time, inclination, etc.) to understand and safely control except as mediated by a deceptively enabling and presumed (to the user) protective interfaces. The problem is that computers are mechanisms designed to automate and execute instructions. That's what they are; and, networks are necessarily designed to facilitate communication. That's what they do. Yet, underlying system architectures and interfaces, though enabling, never evolved commensurately to the task of satisfactory trade-offs between function and security for ubiquitous employment in a general population. I have no idea what the solution is, but I suspect that we need to do some fundamental rethinking of secure architectures and user interfaces. Architectures need to more safely isolate data and logical functionality, and interfaces need to more safely mediate users interaction with devices. I confidently assert that the current architectures simply can't be secured, no matter how much junk is kludged to the task. Prove me wrong, please.

about 2 months ago
top

Exploiting Wildcards On Linux/Unix

INT_QRK Computers were conceived to execute user commands (215 comments)

...so wouldn't it be more accurate to to say that computers, like bull-dozers, can be dangerous in the hands of malicious, ill-informed, inattentive, or incompetent users? If you know of any of these archetypes, try to make them smarter, but don't allow them root privileges to anything taller than an ankle-high weed. Give them some locked-down version of Windows, without admin privileges, lots of monitoring tools and features. Consider helmets, knee-pads and child safety locks.

about 2 months ago
top

Humans Not Solely To Blame For Passenger Pigeon Extinction

INT_QRK Re:Here come the misanthropes (53 comments)

Agreed. Serves the little buggers right for being so tasty.

about 2 months ago
top

Transforming the Web Into a Transparent 'HTTPA' Database

INT_QRK Really want to share a secret Bob? Alice? (69 comments)

Maintain a physically secure, access controlled, TEMPEST hardened room in a secret protected location. Verify through periodic repeated inspection and test that all production media in the room is physically isolated from all untrusted communications networks (ideally, all networks). When you absolutely must share secret information with Alice, invite Alice to your room. Verify her identity, physically hand her the the information to read, monitor her while she reads the information, then physically retrieve the information and escort Alice out of the room when she's done. Any and all discussions regarding the information remain in the room and allowed nowhere else. Alternately and less desirably, convey the information to Alice's corresponding secure room via trusted courier. In agreement with Alice, monitor her with proven effective investigation and surveillance techniques for the duration of your trusted relationship for any behavior or conditions in mitigation to continuing a relationship of trust. This is a proven system with high, but imperfect reliability. Nothing is perfect, but anything, IMI, anything on the Internet? Not as much.

about 2 months ago
top

HP Unveils 'The Machine,' a New Computer Architecture

INT_QRK Re:Run a completely new OS? (257 comments)

If they're starting from scratch, I hope they will design for security rigor from the start. Recommend Multics as a case study. Not saying copy from architecture, but learn from intellectual approach. See http://www.multicians.org/hist...

about 3 months ago

Submissions

INT_QRK hasn't submitted any stories.

Journals

INT_QRK has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>