Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

Smartphones For Text SSH Use Re-Revisited

jlmale0 Please discuss tolerable duration or use case (359 comments)

Even though everyone's pain threshold is different, please mention tolerable duration of use. For me, I've got an iPhone 3 with Touch Term Pro. There are some idiosyncracies with its onscreen keyboards, but once learned, its decent. This is sufficient for short tasks, but I wouldn't want to use this setup for more than about 7 minutes. This is sufficient for checking service status and kicking off one or two things, but troubleshooting is right out.

more than 3 years ago
top

Keith Elwin Wins Pinball World Championship

jlmale0 Re:He's a pinball wizard . . . (110 comments)

And the difference between a witch and a warlock?

Witches don't have wands.

more than 4 years ago
top

There is no...

jlmale0 Re:Here's how it works... (314 comments)

Movies which are built from made up scripts based on little insight are easy to spot because generally they aren't very compelling. ... While it is possible for idiots to channel greatness for short bursts, consistently excellent material must come from people who have worked on themselves and who had accumulated knowledge and wisdom.

Thank you for succinctly explaining episodes I, II, and III.

more than 4 years ago
top

SeaMicro Unveils 512 Atom-Based Server

jlmale0 Re:What does a normal rack consume? (183 comments)

I believe the 8kw was the stat for a rack (42U with 4 of these units). The stat for a single 10U box was 2kw.

more than 4 years ago
top

SeaMicro Unveils 512 Atom-Based Server

jlmale0 Re:Other options (in 10U, 240 opteron cores can fi (183 comments)

The point isn't so focused on how many processors you can fit in that space, it's power consumption.

The link you provide details 2 1100W PSUs. That's in 2U. The summary quotes just under 2000W for one 10U server. Just looking at that, you're running at 1/5th the power consumption.

more than 4 years ago
top

What Is the Future of Firewalls?

jlmale0 Re:Google's capirca (414 comments)

Thank you, AC. This is exactly the kind of project/ideas was looking for.

more than 4 years ago
top

ZFS Gets Built-In Deduplication

jlmale0 Re:Any other file systems with that feature? (386 comments)

... deduped them to 18% of their original size

He's claiming 82% dedup savings with this. That's roughly five times greater than what you credit.

Even with the price overhead, I'd still consider a solution like this because I can replicate all my data on one storage appliance more easily than implementing replication across X commodity servers. Yes, I like to spend money to make my life easier. :)

more than 4 years ago
top

ZFS Gets Built-In Deduplication

jlmale0 Re:Open Source Cures Cancer (386 comments)

While I appreciate the sentiment, it only applies to Big, Irreplaceable (tm) things. Tape libraries would be an example. Office software would not. Even if you have software that's mandatory, there are other ways to mitigate risks. Clustered servers for fail-over. Replication. Alternate installs in the form of development and test environments. If Wine breaks in the middle of my big project, I may research the issue and debug the problem, but if I'm under a time crunch, I'm just going to move to a working machine. Yes, paying for support is one valid risk mitigation strategy, but it's far from the only one.

more than 4 years ago
top

If I Had To Choose, I'd Be A ...

jlmale0 Demon Penguin? (481 comments)

Who fears this? After all, to counter:

/etc/init.d/penguind stop

more than 4 years ago
top

If I Had To Choose, I'd Be A ...

jlmale0 Re:Missing option (481 comments)

Lich is just the retirement plan for a long and successful Necromancer career.

more than 4 years ago
top

Time Warner Cable Modems Expose Users

jlmale0 re: the summary (185 comments)

My initial, gut response to this was sheer horror. They list exploit and target side-by-side! The only mention of a fix is that it's to be 'released soon', informing any malicious agents out there that now is the time to strike.

Reading the Wired article, the right thing was done. Big company was sitting on their hands, and now that publicity has been made, they're starting to move.

Wired did the right thing. But this summary, it's fear-mongering and bad journalism.

about 5 years ago
top

Internet Traffic Shifting Away From Tier-1 Carriers

jlmale0 Re:Holy Fuck, the free market works! Imagine that (153 comments)

An interesting analysis. However, I don't see the same conclusion. These content providers are routing around the Tier 1 providers because they're too big. Yes, it's the internet at work, routing around the inefficiencies, but not because of T1 business practices, but because they get better, cheaper service doing it themselves.

These aren't new non-Tier-1 major backbone providers. They're simply behemoths who've outgrown the playground. They're not reselling their access, they're providing bridges into the other silos. To me, this is a disheartening turn of events. While I don't see any of these companies cutting off access to the other silos (becoming AOL 2.0), they're locking up access in direct business-to-business agreements. If MS and Google decide to provide QoS on traffic X, or entirely block traffic Y, it's a matter between those two companies. Whereas, should a T1 provider do the same thing, we'd all be up in arms. Granted, The number of players makes these kinds of scenarios unlikely, but this direct linking starts to hide these kinds of concerns.

about 5 years ago
top

Sonar Software Detects Laptop User Presence

jlmale0 Re:Why ? (167 comments)

I'm guessing you're a student, using your laptop at a coffee house, bookstore, or library.

At my place of work, everyone has a laptop on their desk (with docking station and extra monitor). For myself, I take my laptop somewhere twice a month; for the rest of the time, it's effectively a desktop.

Stepping back into my college days, I still think this kind of app is useful. What about stepping away from a study group to take a call? How about preventing your pr0n-loving roommate using your laptop to visit his sites and getting your PC infected with malware?

about 5 years ago
top

Sonar Software Detects Laptop User Presence

jlmale0 Re:I wonder how... (167 comments)

This is a concern? Copies of my severed head are in short supply. Hell, I don't even have one!

about 5 years ago
top

Apple Kicks HDD Marketing Debate Into High Gear

jlmale0 Re:Its been done for years already (711 comments)

Actually, the answer is the same in both instances: Large installed user base.

Americans use inches, pounds, and gallons because they were raised that way and they can speak to almost anyone else in that environment with those units.

1000,000,000,000 bytes == 1 terabyte to the common consumer because they don't care to appreciate the difference. They may have been told the exact definition but it makes no difference in their daily life. Why should they care?

In both cases, what's "easier" or "correct" to the technical worker, doesn't work for the masses.

more than 5 years ago
top

FBI Investigating Mystery Laptops Sent to US Governors

jlmale0 Re:Interesting angle on social engineering... (329 comments)

The article notes that the seized laptops were part of an order that shipped to 10 offices; all have been tracked down. Still, you're right, we don't know about other orders. I think it's a brilliant idea, the free laptops. If it's a software only attack, they have to be wary of those departments that reimage PCs to standard images.

more than 5 years ago
top

The Mindset of the Incoming College Freshmen

jlmale0 Re:Completely lost on them...... (383 comments)

The Oregon Trail is available at the app store, and I have a copy. :) I recall fun times from many hours at the local college library playing OT on an Apple IIe. While the Iphone edition is fun, it's been reinvented for the phone. It has the hunting, but it also has "telegraph games" (think Simon rather than learning Morse code), and you now have to navigate your way down rivers instead of simply fording them and losing a member to drowning. It's a good game, but it doesn't stack well to memories. Sadly, I've yet to die from dysentary.

more than 5 years ago
top

Feds At DefCon Alarmed After RFIDs Scanned

jlmale0 Re:What do you bet... (509 comments)

MAD is essentially irrelevant. Firing a gun (and even killing someone) will not cause a large-scale firefight where a significant portion of the population dies. But if you insist...MAD acttually very much DID work. No one was willing to pull the trigger. There wasn't even any 'limited warfare'. It DID work.

No 'limited warfare'? Korea? Vietnam? Nicaragua?

And rather than say, 'no one was willing to pull the trigger' Plenty were willing to pull the trigger, but they were restrained by more reasonable men. Read RFK's account of the Cuban Missile crisis; the theme of restraint and grace regardless of confidence in personal strength comes across clear.

A gun has nothing to do with motivation. It does make a fight very one-sided though. But you mistake motivation for capability. A sufficiently motivated person can generally wound or kill another with relative ease.

Agreed, and stipulated in my post.

Let's take a different perspective. If all gun control laws were abolished...carry an AK-47 down 5th ave in NYC if you like...who would rob convinience stores? You KNOW every owner will have a gun. Heck, at that point assume 10% of people carry. There's a good chance someone in the store has a gun too then. Criminals stupid enough to attempt armed robbery might get one or two chances at it and then the trip to the morgue pretty much guarantees an end to the crime spree. Rob someone's house? Sure...till the owner's neighbor shoots you as you leave.

The "everyone's armed" scenario is a Mutually Assured Destruction scenario. You can carry whatever you want; I'll carry whatever I want - nothing's going to happen because we're both armed. I disagree. Rather, you're going to try and shoot first to make sure I don't shoot first because I've got a gun.

Your description relies on neighbors or strangers to come to your aid. What's to prevent the burglar from also bringing friends? Or, rather, he chooses a time when you're alone.

The whole argument begins to lead to one of continuing escalation. This atmosphere builds a mindset of paranoia, fear and from the strain of it 24/7: stress. Is this the society we want to promote?

the best defense is a good offense

an often enough cited quote, yes. Let me quote this: If all you have is a hammer, everything begins to look like a nail. So, to paraphrase for this discussion: If all you have is a gun, everything begins to look like a target. No, thank you. I pass.

more than 5 years ago

Submissions

top

What is the Future of Firewalls?

jlmale0 jlmale0 writes  |  more than 4 years ago

jlmale0 (1087135) writes "When I mess with my WAP/router at home or coordinate with the network team at work, it seems like I'm stuck in 1995. We're still manually listing IP address/port combinations for our firewall rules. There's a certain simplicity to this when dealing with a single system, but there are firewalls everywhere these days. What's available for managing complex firewall arrangements? What's being developed? Can I take a visio diagram, run it through a script and get a list of firewall rules? What about a gui that illustrates the current system configuration and then lets me drag and drop systems across firewalls, and have the individual firewall ports automatically configured? What about tying a firewall into an authentication system so that when jdoe logs in, only then are the firewalls opened to pass her traffic? What about managing distributed firewalls so that one repository of rules opens up your system's firewalls, the DMZ firewall, and the public firewall all at once?

Let's get a conversation started. What cool projects do I need to know about? What cool management features would you like to see? What's next for firewall management?"

Journals

jlmale0 has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?