Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Ask Slashdot: Best Way To Archive and Access Ancient Emails?

Tuxedo Jack PSTs / nightly backup (282 comments)

I use PSTs and nightly backup.

Sure, you can use GMail or the amorphous cloud for your purposes, but quite frankly, remember - if it's not in your possession, it's not as secure as it could be.

No, I don't have world-ending secrets in my possession, but yes, I do get paranoid about my data.

about a year and a half ago
top

CarrierIQ Tries To Silence Security Researcher

Tuxedo Jack You might want to send something like this to them (216 comments)

Ms. Woods,

I possess and use an HTC EVO 3D smartphone in line with my daily duties for my employer and various clients. This phone contains your employer's software (CarrierIQ for Sprint), which was bundled with the device and zero disclosure that it was installed or of its capabilities.

My device contains HIPPA-protected data (specifically relating to EMR software and the data contained therein) as well as PCI-DSS related information for my company's various clients. As such, it is protected by all manner of privacy laws, the breach of which results in severe penalties under United States law.

After reading Trevor Eckhart's research and doing some of my own, I am curious as to specifically what data your organization is capturing on Sprint's behalf, as well as to what extent they have customized their build of your software, and what its capabilities with their modifications are.

If the software, either in its original form or modified, does indeed capture data from a phone, including the ability to take screenshots or access the contents of e-mail accounts or SMS messages, this could potentially be in violation of all manner of privacy acts, depending on what data is being harvested and whether your client has the option to turn such collection on or not.

Please note that, among other techniques, I will be disassembling the binaries that I possess on my device and will be comparing it against the original ROM image that HTC has issued for this device in order to differentiate what, if any, changes are pushed out through over-the-air updates in order to determine the capabilities of the software as best I can.

To the best of my knowledge, I have never accepted any license agreements or restrictions regarding the software on my device, and as such, I am not bound to refrain from analyzing the software as I see fit, nor from having the results peer-reviewed and published once completed.

If your department is unable to answer my questions, please relay this to someone else inside your organization as you see fit.

I remain,

INSERT_NAME_HERE

more than 2 years ago
top

Verizon Cracks Down On Jailbreak Tethering

Tuxedo Jack Re:How do they tell? (286 comments)

It depends on the device you're using.

In Android and Windows Mobile 6.5/6.1/5, your NAI (network access identifier) changes based upon the type of traffic you're pushing. Tethered traffic and DUN changes your NAI to yournumber@dun.vzw3g.com. Traffic from the phone itself is simply yournumber@vzw3g.com.

Verizon has poisoned EVERY phone with Gingerbread - they have modified the OS so that activating any hotspot app, even if the phone is rooted, to trigger the NAI change and show the phrase "Tethering or Hotspot Active." The only SAFE way to tether on a Verizon phone is to run Froyo, then use free-wifi-tether's 3.x version. Alternatively, install CyanogenMod and then you can tether.

For iOS? Hell, you're screwed any way you turn.

about 3 years ago
top

Best Tablet PC For Classroom Instruction?

Tuxedo Jack Try Motion Computing. (176 comments)

They're slate PCs and they're damn good.

In my experience, Motion doesn't skimp on hardware, is reliable as hell, and the external batteries will LAST - my little brother's old LE1600 still gets six hours of battery life off the primary and secondary batteries with everything on and cranked up to full (and Win7 Professional).

No matter what manufacturer you go with, I strongly urge that you go to Windows 7 for this - the handwriting support is worlds better than in Vista, and that was a hell of a leap from XP Tablet.

They are kinda expensive, though.

more than 4 years ago
top

P2P Networks Supplement Botnets

Tuxedo Jack It would be interesting... (74 comments)

Think about it. Make a false request for a file - and then do TONS of requests for it from hundreds and thousands of other people. It's a classic DDoS attack.

However, this will rule out a lot of corporate machines from being used as bots in this fashion; most decent sysadmins filter P2P traffic.

more than 7 years ago

Submissions

top

Geocities is No More

Tuxedo Jack Tuxedo Jack writes  |  more than 4 years ago

Tuxedo Jack (648130) writes "After fifteen years of hosting sites, Geocities, a popular free web host, is shutting down its services today. Users may remember this site as being one of, if not the, largest webhosts during the late 1990s and early 2000s, and many will, no doubt, have had sites there at one time or another. Yahoo, owner of the service since 1999, is recommending that all users migrate to their paid hosting, though they are linking to free hosts for people who do not wish to pay. Goodbye, Geocities; though we'll miss the funeral, XKCD is holding its own memorial service."
Link to Original Source

Journals

Tuxedo Jack has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>