This begs a more general question for the Slashdot community? How many have identified vulnerabilities in your company's/client's systems, only to be "brushed off?" And if the company took no action, did they ultimately suffer a breach?" top
david.emery writes "In a document from the ongoing Samsung/Apple trial, provided in both English translation and Korean original, Samsung engineers provided a detailed comparison of user interface features in their phone against the iPhone. In almost all cases, the recommendation was to adopt the iPhone's approach.
david.emery writes "Rob Maida, founder of Slashdot.org and now working for the Washington Post, made it to the Op/Ed page of the Post with a piece on 'reblogging,' including some comments on the Slashdot.org community." Link to Original Source top
david.emery (127135) writes "Time's "NewsFeed" Blog claims that Computer Programmer and Software Engineer are among the 10 LEAST stressful jobs. Guess they've never had to debug someone else's code to meet an impossible management deadline...." Link to Original Source top
david.emery writes "Bottom Line: The pros suck at predicting Apple performance, particularly when it comes to Earnings per Share and Revenue, when compared to the amateur blogs that provide financial analysis of Apple." Link to Original Source top
david.emery writes ""Microsoft and Toyota on Wednesday announced a $12 million partnership through which the companies will create an advanced digital information and communication system for the Japanese automaker's cars." Apparently it also includes connections to Microsoft's Cloud ("Azure") servers." Link to Original Source top
david.emery (127135) writes "WikiLeaks editor Julian Assange went from being "imaginative, energetic (and) brilliant" to a "paranoid, power-hungry, megalomaniac," a former colleague charges in a new book out Thursday.
Further we read:
Domscheit-Berg "damaged" WikiLeaks infrastructure and "stole material," WikiLeaks said Wednesday, and the website said it is taking legal action against him-- though Domscheit-Berg denied that.
(I'm not clear on what it would mean to 'steal material' from something like WikiLeaks...)" Link to Original Source top
david.emery (127135) writes "From the story: The title said he told international reporters: 'Well, they're informants so, if they get killed, they've got it coming to them. They deserve it.' The book continues: 'There was, for a moment, silence around the table.'
The allegations were made in a new book published today by the Guardian timed to coincide with another title released by the New York Times.
It also reveals that Assange was so worried that he was being followed by U.S. intelligence services that he disguised himself as a woman, it has been revealed." Link to Original Source top
david.emery (127135) writes "CNet's Greg Sandoval provides his analysis/spin on the Tenenbaum decision reducing statutory damages. Among other items, it claims the Tenenbaum decision will make negotiating settlements harder, and is likely to be appealed with an assertion that the judge exceeded her authority. As seems to be typical in these cases, the litigation can go on and on until one side drops out through exhaustion." Link to Original Source top
david.emery (127135) writes "Wired.com has obtained and published a copy of the search warrant for Jason Chen. This details some pretty funky behavior on the part of Brian Hogan (iPhone finder), such as tossing flash cards into the bushes, dropping off computers at churches, and some snarky emails from Brian Lam to Steve Jobs. This adds more detail to what increasingly looks like anything but 'innocent behavior' in this case. Regardless of what you think about publishing photos of the iPhone, it's really hard to view this behavior as "someone trying to return a lost item."" Link to Original Source top
david.emery (127135) writes "MacOS and iPhones that haven't been jailbroken fare pretty well (although vulnerabilities exist, there's not been a lot of exploitation). Apple does come in for criticism for 'time to fix' known vulnerabilities. Jailbroken iPhones are a mess. The biggest risk to Macs are Trojan Horses, often from pirated software." Link to Original Source top
david.emery writes "A CNet column by Matt Asay cites an interview between Microsoft's Brad Brooks and CNET's Ina Fried (http://news.cnet.com/8301-10805_3-10064580-75.htmll).
Asay points to the comments by Brooks to the effect that not using Microsoft products constitutes a 'tax' for alternatives. Here's a quote
There's going to be an application tax, which is if you want choice around applications, or if you want the same type of application experience on your Mac versus Windows, you're going to be purchasing a lot of software.
and Asay's analysis/commentary:
In other words, it's cheaper to continue paying the Microsoft tax, wherein companies give up any hope of future innovation or industry competition, than to try that dreaded, costly thing called "choice."
Particularly with things like Open Office, is there really a problem with alternatives to Microsoft? How much does choice really cost?" Link to Original Source
david.emery writes "Yesterday I got a strange email bounce from groups.yahoo.com, and something didn't look right in the headers about where the message was going. nslookup on groups.yahoo.com yielded the following:
; > DiG 9.4.2-P1 > groups.yahoo.com a +multiline +nocomments +nocmd +noquestion +nostats +search;; global options: printcmd
groups.yahoo.com. 43 IN CNAME groups.yahoo3.akadns.net.
groups.yahoo3.akadns.net. 68 IN A 188.8.131.52
akadns.net. 37394 IN NS use3.akadns.net.
akadns.net. 37394 IN NS eur1.akadns.net.
akadns.net. 37394 IN NS zd.akadns.org.
akadns.net. 37394 IN NS usw2.akadns.net.
akadns.net. 37394 IN NS zb.akadns.org.
akadns.net. 37394 IN NS use4.akadns.net.
akadns.net. 37394 IN NS za.akadns.org.
akadns.net. 37394 IN NS asia9.akadns.net.
akadns.net. 37394 IN NS zc.akadns.org.
asia9.akadns.net. 33620 IN A 184.108.40.206
zb.akadns.org. 1087 IN A 220.127.116.11
zc.akadns.org. 608 IN A 18.104.22.168
zd.akadns.org. 1270 IN A 22.214.171.124
eur1.akadns.net. 32741 IN A 126.96.36.199
use3.akadns.net. 35723 IN A 188.8.131.52
use4.akadns.net. 29133 IN A 184.108.40.206
Today I did the same, and got something that looked a lot more correct:
; > DiG 9.4.2-P1 > groups.yahoo.com cname +multiline +nocomments +nocmd +noquestion +nostats +search;; global options: printcmd
groups.yahoo.com. 142 IN CNAME groups.yahoo3.akadns.net.
yahoo.com. 66848 IN NS ns8.yahoo.com.
yahoo.com. 66848 IN NS ns6.yahoo.com.
yahoo.com. 66848 IN NS ns1.yahoo.com.
yahoo.com. 66848 IN NS ns3.yahoo.com.
yahoo.com. 66848 IN NS ns2.yahoo.com.
yahoo.com. 66848 IN NS ns5.yahoo.com.
yahoo.com. 66848 IN NS ns4.yahoo.com.
ns5.yahoo.com. 154843 IN A 220.127.116.11
ns6.yahoo.com. 150553 IN A 18.104.22.168
ns8.yahoo.com. 62351 IN A 22.214.171.124
ns1.yahoo.com. 63924 IN A 126.96.36.199
ns2.yahoo.com. 63924 IN A 188.8.131.52
ns3.yahoo.com. 63864 IN A 184.108.40.206
ns4.yahoo.com. 63781 IN A 220.127.116.11
This wasn't just me. My ISP's sysadmin did nslookup yesterday and got the same weird results (akadns.net) last night. So, is this evidence of DNS poisoning? Did someone somehow get the wrong data into the larger DNS infrastructure? Enquiring minds want to know!...