top Ask Slashdot: Dealing With an Advanced Wi-Fi Leech?
If some attacker is so busy attacking your network (with usually loads of other networks around it with default settings) even when you disable the easiest method of attack, are you sure leeching (accessing the Internet via your connection) is the target of the attack? Isn't it possible the attacker thinks your network has something special?
top Privacy Advocates Demand Transparency From Skype
Remember how there were big articles in the news that Skype was a problem for law enforcement and criminals were avoiding police investigations by using it. The complaints by law enforcement have stopped, which says enough to me.
top Student Expelled From Montreal College For Finding "Sloppy Coding"
I guess SkyTech is reporting all those attempted attacks from outside Canada to the RCMP on a daily basis and having complete investigations started. </sarcasm>
I have done research after a reported SQL injection vulnerability (yes, by a student who decided to report the error and got a nice thankyou for reporting it) and noted other attacks from abroad in the logs at regular rates.
top Ask Slashdot: Troubling Trend For Open Source Company
What I miss in your story and in the comments is the option "people calling who don't understand free software". I can imagine some users at companies 'thinking': We use this software in our business -> someone at our company has officially installed this -> we don't install software without a support contract -> there must be a support contract but I'm not going through the trouble of finding it.
top Should Hacked Companies Disclose Their Losses?
Remember the claimed 'damages' from hacker attacks in the 80s and 90s.. Like the E911 document worth over 80000 USD or the alleged 300 million dollar damage by Kevin Mitnick.
Usually those 'costs' were caused by companies trying to make the hacker pay for all the work surrounding the case and all the backlog in securing systems done as part of the clean-up operation in the aftermath of the break-ins.
I wonder if companies will overstate costs under these rules too or whether they will understate them because the numbers aren't used to make someone else pay.
about a year and a half ago
top Ask Slashdot: Shortcuts To a High Tech House
On a budget: remember whatever you do now gadget-wise will be old in 5 years time. But other investments can help for any future plans: enough cabling (CAT6 or CAT7) to rooms so you can wire whatever in those rooms in the future. Not just network and computers, but also phones or temperature/motion sensors. And enough outlets.
top $1.5 Billion: the Cost of Cutting London-Tokyo Latency By 60ms
There is also the good side that this will bring serious bandwidth to places where dialup over satellite is currently the way to get a bit of Internet. Scarcely populated places in northern Canada and Alaska will appreciate the chances of a bit more bandwidth!
top Slashdot Launches Re-Design
Overall I think the new design is an improvement and in line with a larger web trend to have sites easier on the eyes. Looks good here (firefox 3.6.13 ubuntu) and makes good use of the width of the browser.
Next up, IPv6!
top Major Sites To Join ‘World IPv6 Day’
Savvis invested in a new ipv6-capable network in 2006, to be finished in 2008. Savvis hosts sourceforge / slashdot (from the whois record). Yet, according to the nanog grapevine in 2010, Savvis is not yet able to offer IPv6 to customers.
Time to put 'working ipv6' on the checklist for your new hosting?
top Murdoch To Explore Blocking Google Searches
I too wondered "why hasn't anybody asked Mr. Murdoch about web standards for blocking bots like google", and asked such a question to the BBC who wrote the original article. The answer is simple: only news organizations like sky and fox news get the chance to interview him, and for some reason they never get around to asking questions like these that would not fit the views that Mr. Murdoch wants published as news.
top What To Do With Old USB Keys, Low-Capacity Hard Drives?
Securely wipe them if you must
Securely wipe them even if you intend to store them for a while until you get better use for them or will throw them away. It's boring work, but you're making sure no private data gets out. Even a simple operating system installation has a store of encrypted passwords which can be abused.
top How to Deal w/ Dubious 'Contracts'?
They say "OWN" it today.
That is false advertising (as you note). The correct wording of advertising for DVD sales would be:
You can now buy a revokable license to play this DVD on licensed
equipment in the right region of the world for a limited audience.
Any other claim would be false.