Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Linux Kernel Git Repositories Add 2-Factor Authentication

Zan Lynx Finally as secure as MMO games (49 comments)

Finally the Linux kernel which runs almost the entire Internet is as secure as my MMORPG accounts. About time. :P

about 1 month ago
top

Multipath TCP Introduces Security Blind Spot

Zan Lynx Security Trying To Hold Back Progress, Again (60 comments)

So here we have security vendors trying YET AGAIN to hold back progress in Internet protocols. They did it with window scaling, ECN and IPv6. Each new invention doesn't work with their snake oil so they either disable it or tell people not to use it.

They like to lock down HTTP too, preventing anything that doesn't "look right." As if a server would respond to PUT or OPTION if it didn't intend to support that.

about a month and a half ago
top

Ask Slashdot: Is Running Mission-Critical Servers Without a Firewall Common?

Zan Lynx Re: Fire(wall) and forget (348 comments)

Software that monitors the traffic for unusual patterns or attack patterns is not a firewall. It is an IDS (or IPS depending on configuration) such as Snort.

Consumer desktop PCs have "antivirus" software which is a combination of firewall, IDS, antivirus and other malware detection systems. Enterprise network admins have firewall, IDS, NAT, and many other systems with each one configured separately.

Network admins have many words for things like Eskimos do for snow because precision is important.

about a month and a half ago
top

German Court Rules That You Can't Keep Compromising Photos After a Break-Up

Zan Lynx Oil Paintings (334 comments)

What about oil paintings? Didn't a lot of the Old Masters paint nudes? I bet some of them broke up with the subjects of the painting too.

about 4 months ago
top

ARIN Is Down To the Last /8 of IPv4 Addresses

Zan Lynx Re:Now is the time to create IPv5 (306 comments)

I love it when people who don't know anything about networking invent solutions to problems. As if actual IETF engineers were all idiots.

about 5 months ago
top

Click Like? You May Have Given Up the Right To Sue

Zan Lynx Re:If only (216 comments)

Or since I apparently can't edit and my memory is faulty, the definitions of the words that make up "To regulate Commerce with foreign Nations, and among the several states, and with the Indian tribes;"

about 5 months ago
top

Click Like? You May Have Given Up the Right To Sue

Zan Lynx Re:If only (216 comments)

Because of the definitions of inter, state, and commerce.

about 5 months ago
top

Click Like? You May Have Given Up the Right To Sue

Zan Lynx Re:If only (216 comments)

But how do you know which parts are relevant to you?

I mean, you might think a little thing like the Constitution is perfectly clear when it lays out the rules for regulating interstate commerce. I bet you didn't know that growing wheat on your own small farm and eating it yourself is interstate commerce.

about 5 months ago
top

Microsoft's Attempt To Convert Users From Windows XP Backfires

Zan Lynx Re:the one flaw in that (860 comments)

I was wrong about XP needing to map all 3 GB of video RAM.

It is more accurate to say that Windows XP limits the GPU to a 256 MB window. The GPU would perform a lot better if all of its memory was mapped for direct access.

The newer pieces of GPU hardware and drivers are using zero-copy direct memory access with addressing that is the same on the GPU and the CPU which allows sharing of data structures without copies or modifications. That can't be done in a 256 MB window, or if it can, not well.

about 6 months ago
top

Ask Slashdot: Does Your Employer Perform HTTPS MITM Attacks On Employees?

Zan Lynx Re:Necessary sometimes (572 comments)

Just saw the bit about epoxy. MAYBE the keyboard started out epoxied in place but when I saw it it sure wasn't. IT needs to put in a new keyboard, they probably chipped it out and replaced it. Not much would stop the user from doing that either.

about 6 months ago
top

Ask Slashdot: Does Your Employer Perform HTTPS MITM Attacks On Employees?

Zan Lynx Re:Necessary sometimes (572 comments)

How do you expect the keyboard is attached? USB. I've actually seen this, in person. A machine with sealed USB ports ... and a USB keyboard and mouse. Really. What was IT thinking?

I bet the IT guy who did the job was a contractor. 'Uh yeah, here's a work order to seal up all the open USB ports.' "What about the keyboard?" "Doesn't say. Don't ask questions: its 20 hours of easy work at $60/hr."

about 6 months ago
top

Microsoft's Attempt To Convert Users From Windows XP Backfires

Zan Lynx Re:Getting rid of XP would mean I can't do my job (860 comments)

No the problem is in the hardware.

If there are super specific timing requirements then invent a new standard with the commands you need. Then put a little microprocessor on the serial port end in charge of waiting for some particular signal and responding in precisely 23 milliseconds. Or whatever.

about 6 months ago
top

Ask Slashdot: Does Your Employer Perform HTTPS MITM Attacks On Employees?

Zan Lynx Re:Assume it (572 comments)

Mine never has.

about 6 months ago
top

Ask Slashdot: Does Your Employer Perform HTTPS MITM Attacks On Employees?

Zan Lynx Re:Necessary sometimes (572 comments)

Well, if I was really into industrial espionage I might do something like bring a USB stick loaded with my zipper program, but instead of storage set to look like a keyboard. Plug it in, open Notepad and have it type the executable out into a file.

I've noticed that a lot of places disable USB storage but don't disable file execution from writable directories.

about 6 months ago
top

Microsoft's Attempt To Convert Users From Windows XP Backfires

Zan Lynx Re:Getting rid of XP would mean I can't do my job (860 comments)

Sounds like the real answer to this problem is an improved USB to serial dongle. If this is a serious problem for electronics engineers, they are the perfect people to fix it. Whatever the problem with the USB to serial interface is, fix it. Then sell your improved serial port adapter for $100. Profit!

about 6 months ago
top

Microsoft's Attempt To Convert Users From Windows XP Backfires

Zan Lynx Re:the one flaw in that (860 comments)

Windows 8 doesn't slow anything down. Check some benchmarks. It is faster than XP in most things. Here's one from a casual Google: http://itnews2day.com/2013/02/...

Windows XP is 32-bit only. Windows XP does not like hyperthreading or quad core CPUs. XP doesn't perform well on high bandwidth WAN connections. Its old SMB file transfer speeds are atrocious on gigabit LANs. It doesn't allow threaded GPU accesses and only supports old DirectX versions. It doesn't understand Advanced Format hard drives or SSDs. USB 3 on XP is buggy as hell. (in my experience)

If you installed a super modern GPU with 3 GB video RAM on XP, it would fall over and die because it has to map those 3 GB into 4 GB of space.

So, in at least this case, the OS didn't slow down. And without it new hardware wouldn't work at all.

about 6 months ago
top

Microsoft's Attempt To Convert Users From Windows XP Backfires

Zan Lynx Re:Tired... (860 comments)

Sure you can. But what is Chrome on iOS? It is a user interface skin over Safari is all it is. Not actually Chrome.

about 6 months ago
top

Ask Slashdot: Does Your Employer Perform HTTPS MITM Attacks On Employees?

Zan Lynx Re:Assume it (572 comments)

Of course you have rights. So does your employer. And using your employer's network gives your employer the right to see what is traveling over his network.

about 6 months ago
top

Ask Slashdot: Does Your Employer Perform HTTPS MITM Attacks On Employees?

Zan Lynx Re:Necessary sometimes (572 comments)

They shouldn't. A simple second level of encryption such as an encrypted ZIP file defeats any automatic scanning for confidential keywords or anything similar.

about 6 months ago
top

Intel's New Desktop SSD Is an Overclocked Server Drive

Zan Lynx Re: The caps are electrolytic (111 comments)

Eh. Except that a blue screen or if you have to do a forced power-off will lose data and require a chkdsk run. I ran my desktop that way for a little while (with a UPS) but it had problems.

about 7 months ago

Submissions

Zan Lynx hasn't submitted any stories.

Journals

Zan Lynx has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>