Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Buying New Commercial IT Hardware Isn't Always Worthwhile (Video)

dave562 Re:Slashvertisement? (77 comments)

What are you talking about? USB 3.0 is significantly faster than USB 2.0. I work in a business where we have to transfer data on physical media due to the volumes involved. We ship hundreds of drives a month. Our clients refuse to accept anything other than USB 3.0 anymore because the previous generation is too slow.

6 hours ago
top

Buying New Commercial IT Hardware Isn't Always Worthwhile (Video)

dave562 How much does a front page ad cost? (77 comments)

I swear we saw an identical article a few months ago.

Go away.

We do not want your advertisements. Nobody wants your old gear. I pay you guys to haul it away, not sell it back to me on Slashdot.

6 hours ago
top

Researchers Test Developer Biometrics To Predict Buggy Code

dave562 Re:Why is it always developers? (78 comments)

Of course they get measured. In the long term if they deliver too many screwed up projects, their superiors stop giving them projects.

Ultimately it is the developer's responsibility to push back against stupid managers and give them honest feedback about what can and cannot be done.

8 hours ago
top

Researchers Test Developer Biometrics To Predict Buggy Code

dave562 Re:Why is it always developers? (78 comments)

On a more serious note, a single developer mistake can potentially affect millions of end users (in the case of an application like Windows). Therefore it makes sense to focus on the developers. "With great power comes great responsibility" and all that.

8 hours ago
top

Exodus Intelligence Details Zero-Day Vulnerabilities In Tails OS

dave562 Re:Classic Spook Stuff... (124 comments)

Have no fear. /. is collection friendly, with the data being sent in plaintext. They have all of our posts, and sort them for content and categorize them by context.

10 hours ago
top

Exodus Intelligence Details Zero-Day Vulnerabilities In Tails OS

dave562 Re:Conspiracy theory (124 comments)

Now THIS is the level of paranoia that I like to see.

11 hours ago
top

Exodus Intelligence Details Zero-Day Vulnerabilities In Tails OS

dave562 Re:Classic Spook Stuff... (124 comments)

You you realize that you forgot to fnord that and they can totally see what you wrote, right?

11 hours ago
top

Exodus Intelligence Details Zero-Day Vulnerabilities In Tails OS

dave562 Re:what environments allow USB boot? (124 comments)

The kind of environment where the attacker is a sysadmin with access to the box and the ability to do whatever they feel like with BIOS, including enabling USB boot.

The default security posture of most organizations these days is to assume that a trusted insider will exploit the system at some point. Therefore everyone is implementing damage mitigation techniques so that they can respond quickly and understand the scope of the inevitable breach when it does occur.

Everyone is watching everyone else. The security guys get access to the firewalls and the IDS, but cannot touch the servers. The server guys cannot touch the backups. The backup team cannot initiate a restore without two levels of change control approval. It is a serious PITA for everyone involved and a gross inefficiency.

The first time an auditor told me that they cannot trust me, my knee jerk reaction was to tell them to go fuck themselves. Eventually I realized that I am in a very risky position with access to a lot of sensitive information. The key is not that they do not trust me, it is that they CANNOT trust me. While I may be trustworthy, who is to say that someone else in my same position, with my same level of access, is also trustworthy? Just like I have to assume that any executable downloaded from the internet is potentially full of malicious code, the risk management folks have to assume that every sysadmin in the organization is potentially full of malicious intent.

11 hours ago
top

Verizon Boosts FiOS Uploads To Match Downloads

dave562 Re:happy users! (228 comments)

This...

Last I heard, Verizon was scaling back / had stopped expanding their FiOS network. Is that still the case?

While this is great news for current FiOS subscribers, it means fuck all to the rest of us who do not, and likely will not ever have, FiOS.

yesterday
top

Ars Editor Learns Feds Have His Old IP Addresses, Full Credit Card Numbers

dave562 A whole lot of whine (202 comments)

I read the article and while one might question why data is being stored that is almost a decade old, the data itself is not that big of a deal. Basically the airlines store all the information about how he bought the ticket and what his preferences were (seat assignments, meal choices, etc.) The call center agents kept notes on why he called.

All of the information is benign. They kept his credit card information in plain text which is lame, but I have yet to see a story about a CBP breach that led to a bunch of fraud. It could happen, and they should probably encrypt the data in the future, but it is not a massive, conspiracy re-enforcing revelation.

The only disconcerting thing is the length of the data retention. Once it is obvious that the plane did not go down and nobody flying was involved in any subsequent terrorist activities, the data should be purged.

2 days ago
top

FCC Approves Plan To Spend $5B Over Next Five Years On School Wi-Fi

dave562 Contracting here I come! (54 comments)

I am tired of solving virtualization challenges and figuring out how manage petabytes of data. I'm going to take the next couple of years off and setup a consulting company installing WAPs in schools. That is obviously where the money is at....

about two weeks ago
top

William Binney: NSA Records and Stores 80% of All US Audio Calls

dave562 Re:Spock: 'member (278 comments)

When 9/11 was happening in real time, there were multiple news reports of TWO crash sites in Pennsylvania. There was the primary crash site, and then a secondary site a couple of miles away. At the secondary site, it was mentioned that the tail of the plane was found there.

After the first or second day of reporting, that story was squashed and never brought up again.

about two weeks ago
top

William Binney: NSA Records and Stores 80% of All US Audio Calls

dave562 Re:Uh (278 comments)

Yes, EMC.

Oddly enough, the correct answer was down modded to 0. Good to see that the NSA is actively working to keep the details of their operations in the dark.

For those of you who want to get in on the publicly sanitized version of the technology, have a look at..

http://www.emc.com/campaign/gl...

about two weeks ago
top

Arecibo Radio Telescope Confirms Extra-galactic Fast Radio Pulses

dave562 Alien Farts (95 comments)

Problem solved.

Next?

about two weeks ago
top

William Binney: NSA Records and Stores 80% of All US Audio Calls

dave562 Re:Spock: 'member (278 comments)

I missed that. Any references still around to it?

The 9/11 piece of info that sticks around in my mind is the "second crash site" in Pennsylvania. The site where the tail of the plane landed.

about two weeks ago
top

William Binney: NSA Records and Stores 80% of All US Audio Calls

dave562 Speech to Text (278 comments)

Step 1. Collect all audio
Step 2. Convert speech to text
Step 3. ???
Step 4. Profit

The IT guy and geek in me gets all excited thinking about all of the cool technology that they are leveraging.

The civil libertarian in me shudders knowing how easily they are able to contextualize and analyze the communications with the intent of subverting public discourse.

The cynical part of me is starting to believe that the average American really does not care because they are so conditioned that they have zero desire to enjoy any sort of true freedom. As long as they have access to shopping malls, housing and alcohol / caffeine / prescription drugs, they will be content.

about two weeks ago
top

William Binney: NSA Records and Stores 80% of All US Audio Calls

dave562 Re:Uh (278 comments)

Want to guess who their storage vendor is?

Hint... they are a three letter agen^H^H^H.. company.

about two weeks ago

Submissions

top

Citrix or VMware for VDI access to SaaS application?

dave562 dave562 writes  |  about a year ago

dave562 (969951) writes "Editors, this is for ask Slashdot.

Given the need to provide a remote desktop to clients who want speedy access to an in house, Windows based (yeah, yeah, I know, I know...) SaaS application, which vendor has the best offering, Citrix or VMware? If it matters, I am looking at a user base of 500-5000 users in the next two to three years. I come here to ask this question because I figure if anyone has really used this technology, in the wild, and lived through the boot storms, I/O challenges and other technical and administrative challenges with this technology, they are probably a /. reader.

I am currently leaning towards Citrix. Their web gateway simplifies the external access component. It also supports two-factor auth and federation. Their client is also very stable at this point and works on all devices, from desktops to laptops to tablets and smartphones. The technology is fairly secure, enough so that we can leverage it to prevent the average user from mapping drives, or printers, or otherwise exfiltrating data from the environment. While on the other side of the coin, universal driver support makes it easy to enable those features when necessary.

I am only really considering VMware because we already have the licenses for their VDI product. Based on some cursory research, it would require more investment on our time to properly configure external access for clients. They do seem to be making some strides on the resource utilization front though. Specifically I'm talking about the full and linked clones.

I am sure that there are a dozen other nuances of the two products that I have not even begun to scratch the surface of. The main driver of desktop virtualization in this case is application performance. We have hundreds of users who are using a web based app to review large documents (10-50MB each). The bandwidth costs and performance challenges of clients having disparate levels of connectivity are both alleviated by using a remote connectivity solution like Citrix / RDP."
top

AAPL tracks MSFT peak for peak

dave562 dave562 writes  |  about a year and a half ago

dave562 (969951) writes "The more things change, the more they stay the same. In 1999, Microsoft had a run up to what proved to be the company's highest market capitalization ever. Now in 2013, Apple reached similar highs. The jury is still out as to whether or not AAPL has peaked, but this article from ZeroHedge provides an overlay of the market caps of these two tech titans, and makes some suggestions about where AAPL is heading.

So Slashdot, is Apple really that different? Or does the market have a limited pool of capital to allocate to technology companies, no matter how sought after their products are?"

Link to Original Source
top

Industrial Control System (ICS) Security Investment Growing Substantially

dave562 dave562 writes  |  about a year and a half ago

dave562 (969951) writes "Smart grid industrial control systems (ICS) remain in a state of flux. Security is still viewed as a cost-limitation exercise by many utilities, and advances toward meaningful regulations remain halting. But the utility industry as a whole appears better informed of cyber risks to grids and substations, likely portending more cyber security deployments in the next one to two years. According to a new report from Pike Research, a part of Navigant's Energy Practice, the market for smart grid ICS cyber security will reach $369 million in 2012 and grow to $608 million by 2020.

Technological innovation in this market is stagnant, according to the report, and security vendors do not share a consistent view of this market. While many general-purpose security vendors have not yet seen the growth they had expected, vendors that specialize in control systems security are receiving more requests for proposals than ever. Vendor approaches to the market also vary: some strategically propose a full cyber security solution for an entire control network, while others take a more tactical approach and propose only solving specific problems. Whether taking a strategic or a tactical approach, vendors must orient their discussions with utilities around solving operational and business problems, not technical concepts.

Are any Slashdotters working in this field? What sort of approaches are you taking? Tactical fixes, or strategic solutions?"

Link to Original Source
top

DoJ investigates eBook price fixing

dave562 dave562 writes  |  more than 2 years ago

dave562 (969951) writes "The U.S. Justice Department's antitrust arm said it was looking into potentially unfair pricing practices by electronic booksellers, joining European regulators and state attorneys general in a widening probe of large U.S. and international e-book publishers.

A Justice Department spokeswoman confirmed that the probe involved the possibility of "anticompetitive practices involving e-book sales."

Attorneys general in Connecticut and, reportedly, Texas, have also begun inquiries into the way electronic booksellers price their wares, and whether companies such as Apple and Amazon have set up pricing practices that are ultimately harmful to consumers."

Link to Original Source
top

Android cuts into Apple's margins

dave562 dave562 writes  |  more than 2 years ago

dave562 (969951) writes "Reggie Middleton at BoomBustBlog offers some insightful analysis about how Android is impacting Apple's market share.



The maddening pace of Android technology development is simply too much for Apple to keep pace, or at least keep pace with while maintaining those fat margins. So what do they do? they release a marginally improved product that has yet to match the 6 month old Android flagship tech that is about to be refreshed/replaced/updated in exactly ONE WEEK!



He goes on to point out how Google has backed Apple into a corner, and they will have no choice but to cut into their fat profit margins in order to stay competitive.



Lower prices and/or higher technological bars will lead to lower margins. For those that are paying attention, it is evident that it is already happening. The disappointment felt throughout the web at the release of the iPhone 4GS was not due to Apple releasing a subpar product. It was due to Android raising the bar so high that Apple simply could not match it without busting its extremely fat (72%) margins.



What does this mean for Apple's share prices? I think the answer is obvious."

Link to Original Source
top

FCC Release Broadband Report

dave562 dave562 writes  |  more than 2 years ago

dave562 (969951) writes "Today the FCC released the results of their study that was focused on measuring real world broadband performance for residential customers across the United States. The study examined service offerings from 13 of the largest wireline broadband providers using automated, direct measurements of broadband performance delivered to the homes of thousands of volunteers during March 2011. Myself and many other Slashdot readers participated in the study."
Link to Original Source
top

Rural broadband cost $7 million per home

dave562 dave562 writes  |  about 3 years ago

dave562 (969951) writes "In an analysis of the effectiveness of the the 2009 stimulus program (American Recovery and Reinvestment Act of 2009 or ARRA), one of the programs that was investigated was the project to bring broadband access to rural America. Some real interesting numbers popped out.

Quoting the article, "Eisenach and Caves looked at three areas that received stimulus funds, in the form of loans and direct grants, to expand broadband access in Southwestern Montana, Northwestern Kansas, and Northeastern Minnesota. The median household income in these areas is between $40,100 and $50,900. The median home prices are between $94,400 and $189,000.

So how much did it cost per unserved household to get them broadband access? A whopping $349,234, or many multiples of household income, and significantly more than the cost of a home itself.""

Link to Original Source
top

RIMs downward spiral continues

dave562 dave562 writes  |  more than 3 years ago

dave562 (969951) writes "The always insightful and forward looking guys at Zero Hedge bring the latest details in RIMs stock valuation. Layoffs are on the horizon as RIM misses their earning targets and continues to lose ground to Apple and Android. Is RIM on the way to becoming the MySpace of the smartphone market?"
Link to Original Source
top

FCC pressured to reject AT&T / T-Mobile deal

dave562 dave562 writes  |  more than 3 years ago

dave562 (969951) writes "Sprint Nextel, joined by an army of thousands of consumers, have filed requests for the U.S. Federal Communications Commission to block AT&T's proposed acquisition of rival mobile carrier T-Mobile USA.

AT&T has argued that it needs T-Mobile's spectrum to keep up with growing demand for mobile broadband service. Sprint disputed that argument, saying AT&T already controls the most spectrum of any U.S. mobile carrier. AT&T is the "industry laggard" in deploying next-generation mobile broadband, a source close to Sprint said Tuesday."

Link to Original Source
top

Rural broadband subsidy program wasteful

dave562 dave562 writes  |  more than 3 years ago

dave562 (969951) writes "An analysis of federal broadband stimulus projects awarded by the Department of Agriculture’s Rural Utilities Service (RUS) finds the program’s funding of duplicative broadband networks has resulted in an extremely high cost to reach a small number of unserved households.

The study shows that the RUS’ current program is not a cost-effective means of achieving universal broadband availability.

  RUS’ prior broadband subsidy programs have not been cost effective, in part because they have provided duplicative service to areas that were already served by existing providers,"

Link to Original Source
top

Social Media as a Tool for Protest

dave562 dave562 writes  |  more than 3 years ago

dave562 (969951) writes "Stratfor provides good analysis and insight into the realities of using Social Media like Facebook and Twitter as revolutionary tools.

"
The role of social media in protests and revolutions has garnered considerable media attention in recent years. Current conventional wisdom has it that social networks have made regime change easier to organize and execute. An underlying assumption is that social media is making it more difficult to sustain an authoritarian regime — even for hardened autocracies like Iran and Myanmar — which could usher in a new wave of democratization around the globe. In a Jan. 27 YouTube interview, U.S. President Barack Obama went as far as to compare social networking to universal liberties such as freedom of speech.

Social media alone, however, do not instigate revolutions. They are no more responsible for the recent unrest in Tunisia and Egypt than cassette-tape recordings of Ayatollah Ruholla Khomeini speeches were responsible for the 1979 revolution in Iran. Social media are tools that allow revolutionary groups to lower the costs of participation, organization, recruitment and training. But like any tool, social media have inherent weaknesses and strengths, and their effectiveness depends on how effectively leaders use them and how accessible they are to people who know how to use them.""

Link to Original Source
top

China's Double-edged Cyber-sword

dave562 dave562 writes  |  more than 3 years ago

dave562 (969951) writes "Stratfor analyst Sean Noonan shares his commentary on the capabilities of China's cyberwarfare capabilities, and the challenges and threats that those same capabilities bring to maintaining social order within the country.

A recent batch of WikiLeaks cables led Der Spiegel and The New York Times to print front-page stories on China’s cyber-espionage capabilities Dec. 4 and 5. While China’s offensive capabilities on the Internet are widely recognized, the country is discovering the other edge of the sword.

China is no doubt facing a paradox as it tries to manipulate and confront the growing capabilities of Internet users. Recent arrests of Chinese hackers and People’s Liberation Army (PLA) pronouncements suggest that China fears that its own computer experts, nationalist hackers and social media could turn against the government.
"

Link to Original Source
top

Goldman Sachs programmer trial sealed

dave562 dave562 writes  |  more than 3 years ago

dave562 (969951) writes "Goldman Sachs' lawyers have asked the Federal judge to seal the court room during the trial of Sergey Aleynikov. Aleynikov was one of the programmers who developed Goldman's High Frequency Trading (HFT) programs. What does this say about the state of the financial indudstry? Given the problems HFT seems to have caused over the last few years, shouldn't more light be shone into the dark corners of how it works?"
Link to Original Source
top

Doubts on Iranian regime change via social media

dave562 dave562 writes  |  more than 4 years ago

dave562 (969951) writes "Dr. Foaud Ajami was recently interviewed by Stanford University. He is a Senior Fellow of the Hoover Institution and the Chair of the working group on Islamism and the International Order. Among the topics discussed were Twitter and Facebook. Dr. Ajami seems skeptical about enacting regime change in Iran via the social media. He says that he is "worried about people who believe that Twitter and Facebook and so on will overthrow the Iranian regime.""
Link to Original Source
top

Integrating Linux into the Microsoft Enterprise

dave562 dave562 writes  |  more than 5 years ago

dave562 (969951) writes "I have to admit that despite getting Slackware running on a 486 in the mid-1990s, I never really picked up on Linux. At this point I've realized that the handwriting is on the wall, and I need to get with the program (better late than never, right?).

My first project has been to setup Ubuntu (8.04) and get Subversion running. The Ubuntu install went flawlessly. Subversion has been a struggle, but I finally got it to work with TortoiseSVN and was able to upload files into my repository. The experience required tweaking some permissions via chmod. I've realized that I'm very uncomfortable with integrating Linux into the Windows world, and I don't have any idea of where to start.

I've read vague descriptions of OpenLDAP, and I have a feeling that I should be looking in that direction.

Can any of you recommend some good books about integrating Linux and Windows? What I am specifically interested in is being able to control the access of Windows (Active Directory) groups to resources on the Linux box. I will be looking into Samba as well, but I need to control access to more than just network file shares. For example, to be able to get TortoiseSVN to transfer (Import) files into the repository, I had to give the "world" rxw rights to some of the sub-directories in the Subversion repository. I'm fairly certain that is a huge security hole right now. In an ideal world, I would have liked to create a group in Windows, and only allow those people access to the directories. Longer term it would be great to be able to replace Active Directory with something else that can handle access controls to the Windows boxes and network file shares. Where I work Windows will never go away because of some industry specific applications, but it would be great if I can minimize the role that it plays on the backend.

Beyond books, what are some of the real world tools and solutions that you guys are using when you have to make Linux live in an Active Directory environment?

If it matters, I'm not married to Ubuntu and have already considered giving CentOS a try. I work at a shop with a heavy investment in HP hardware, and HP has great support for RHEL, so I figure CentOS will probably be a good foundation for where I am working."
top

Maxtor drives contain password stealing trojans

dave562 dave562 writes  |  more than 6 years ago

dave562 writes "According to this ComputerWorld article http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9046424&intsrc=hm_list, Seagate hard drives that were assembled in Taiwan were shipped with firmware that phoned home to two servers based in China. The Chinese government is denying any involvement in the incident. The software appears to steal passwords to online gaming websites."

Journals

top

Oh the irony

dave562 dave562 writes  |  more than 4 years ago

I originally started reading Slashdot because of my curiosity about Linux. I've been on the internet since the early 1990s and have been working in corporate IT since the mid-1990s. My original experience with networking in a corporate environment was Novell Netware and I've since spent most of my time using Microsoft Windows servers. In the decade plus that I've been working in IT I've developed a fairly platform agnostic approach to meeting the needs of business. It's all about the best tool for the job as far as I'm concerned.

Recently where I work we have hired a new CFO and he oversees IT. He is a big proponent of OSS software and Linux. He hates Microsoft with a passion and believes that we should be replacing Windows boxes with Linux where ever possible. He wanted to use Subversion for version control on some budget documents, and of course he wanted to run it on Linux and have SSH access into the Linux box.

Being a Linux neophyte I went ahead and downloaded Ubuntu 8.04 LTS server. I used apt-get to get all of the updated versions of the software from the repository. I configured Subversion and setup the repository for the files. I setup SSH so that the CFO could use Tortoise and Putty to remotely access the files. Everything was working well up until this morning.

My users were calling and emailing with complaints of the internet being slow. Given that we upgraded to a 7.5MB connection over the weekend, my initial thought was that something was wrong with the ISP. I checked the firewall and saw that there were 65000+ open connections and the logs were filled with warnings of SYN floods coming from the Linux box. I logged into it, ran a netstat -a and found pages upon pages upon pages of open connections on port 22 to random boxes all over the internet. Sure enough, the Linux box was completely owned and being used to attack other boxes.

I find it ironic that here I am in a Windows shop with twenty plus servers running everything from SQL to IIS to Exchange on public facing connections. I have a few boxes with exposed terminal services connections so that vendors can get in an do remote support. I put one Linux box on the network and open it up to the internet and it lasts less than three months.

I find myself remembering all of the comments about how *nix is more secure by default. How OSS software is more secure because so many people are looking at the code. Microsoft software sucks and it's a huge target that is going to crumble as soon as you plug it into the network.

I realize that in this case a lot of what happened probably has to do with my own inexperience with Linux. If I had over a decade of experience using Linux day in and day out I'm sure that I wouldn't be in the situation that I'm in right now. I do consider myself a fairly competent network admin though. I did my best to harden the box. I only exposed SSH to the internet. I downloaded all of the latest software updates from the repository using the built in apt-get mechanism. Despite all of that, the box still got owned. So I write this journal entry to point out that nothing is simple. There are a lot of zealots out there who take it for granted that their OS of choice is secure and stable. They spout off about how it is perfect for everyone, and every job and fits in every situation. They take for granted that they've forgotten so many of the glitches, the gotchas, the key workarounds that are necessary in any sort of production environment.

Every software has bugs. Every software has exploits. Every software takes a skill set tailored to the package itself in order to properly use it. There really should be licenses to use software in business environments where sensitive data is involved. Even the best intentioned admins who are doing the best that they can do are bound to miss things. They don't miss them because they are incompetent or because they are malicious. They miss them because they don't have the experience to realize that they are missing things.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...