Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

US House Democrats Unveil a Health Care Plan

netcrusher88 Re:Great quote... (925 comments)

GP, that is what we call an "oh snap" rebuttal. Parent, nicely stated.

more than 5 years ago
top

Dealing With ISPs That Use NXDomain Redirection?

netcrusher88 Re:Use Full Tunnels (264 comments)

Split tunneling is a pretty trivial risk. Your typical home computer doesn't do forwarding (not to mention nothing would know how to route) and if the box is a zombie, it's a zombie - not talking to the C&C servers directly instead of via the corpnet isn't going to impair the bot software.

Split tunneling has nothing to do with the DNS issue. Configuring internal DNS servers is 100% solid if not essential advice for any VPN.

more than 5 years ago
top

Europe Funds Secure Operating System Research

netcrusher88 Re:Oh gawd , not microkernels again *yawn* (376 comments)

I dunno - will it really improve things if the FS driver has to talk to the disk driver on a different CPU? Sure, the kernel could maybe be smarter than that, but... I dunno. Either you use all those cores and take a hit on interprocess communication, or you don't use all the cores and waste some of that power.

Besides, is there any reason a macrokernel couldn't be threaded? I thought they already were.

more than 5 years ago
top

Researchers Can ID Anonymous Twitterers

netcrusher88 This is a standard timing attack (108 comments)

The application to twitter anonymous accounts is creative, but otherwise it's a standard timing attack. If user A is active while anonymous data B is passed, user A has a higher chance of having generated data B than the rest of the population.

Looks like there's some number-crunching using timing of past tweets and whatnot to see if the user is likely to be on, too. I like that.

Or it could be I'm completely misreading it.

more than 5 years ago
top

Apps That Rely On Ext3's Commit Interval May Lose Data In Ext4

netcrusher88 Re:Bull (830 comments)

Actually, Active Directory is a REALLY nice configuration frontend for LDAP and Kerberos, among others. Of course, it uses a nonstandard schema and is a pain in the ass to integrate with because of it, but that doesn't change the fact that AD is nice to use, and is in fact a rather good implementation.

more than 5 years ago
top

Living Free With Linux, Round 2

netcrusher88 Re:Lol (936 comments)

Can't speak to other distros, but Ubuntu has GDebi integrated into GNOME, which means your Skype install looks like this, with a base Ubuntu system:

1. Go to skype.com
2. Click the Ubuntu download link. The fact that you're using Linux is autodetected and the Ubuntu part is easy to figure out because the logo is visible at all times on the toolbar.
3. Double-click downloaded file (or tell Firefox to open it), which brings up a "Software Installer" window (GDebi, though that branding is hidden)
4. Click Install Software, then enter password when prompted.
4a. GDebi handles any missing dependencies via APT and installs the package.
5. Find Skype under Applications->Network

Only extra step beyond Windows there is entering your password when prompted, and that is, from a usability standpoint, equivalent to UAC.

more than 5 years ago
top

Locking Down Linux Desktops In an Enterprise?

netcrusher88 Re:What are you trying to do? (904 comments)

Ah, certainly could be 2 on Tru64. I come from a Linux-x86 world, so I just know what's typical for that. Some systems don't even require a pass for maintenance mode - it depends on the init being used, but it usually does require the root password.

more than 5 years ago
top

Locking Down Linux Desktops In an Enterprise?

netcrusher88 Re:What are you trying to do? (904 comments)

So you password either the BIOS or the bootloader, or both. And runlevel 2 won't help. You're thinking of runlevel 1, single-user mode - which usually requires the root password to get into.

The other option is doing something like init=/bin/bash as a boot option, which locking down the bootloader prevents, and booting a different OS, which locking down the BIOS prevents. This is not a difficult problem.

Oh, and Group Policy is no better than CFEngine or parrot, both of which can override the root password and system configuration back to what it was before the user mucked about. The workaround in both cases is to just disable the damn thing while having local admin, though for GP I think that does involve leaving the domain. Which doesn't block a knowledgeable user from anything anyway.

more than 5 years ago
top

Locking Down Linux Desktops In an Enterprise?

netcrusher88 Re:How about: less douchebaggery? (904 comments)

Which is not the same as 'sudo rvi'. You can set sudo to only allow certain commands, so if you allowed 'sudo rvi', you couldn't run 'sudo ~/vi'.

sudo filters by the command executed (I've seen things restricted to full command line - i.e. sudo killall -HUP ircd but not sudo killall ircd).

more than 5 years ago
top

Best Solution For HA and Network Load Balancing?

netcrusher88 Re:2-node failover solution is probably a net lose (298 comments)

Actually 2-node active-passive can be a very good idea.

Let's say you have two nodes behind a load balancer (only way to replicate functionality active-active... you could do the thing where one server is static though, like youtube does). You need a shared filesystem, so you need another node to act as a NAS. What if your app is database-backed? You can stick that on the NAS, probably. But then it's not redundant.

It's really just simpler to have unidirectional replication, then script it to switch direction upon failover. The Linux-HA project makes it relatively easy, since they've been working on that for years.

more than 5 years ago
top

The Real Risks of Obama's BlackBerry

netcrusher88 Re:i don't think obama has a blackberry (273 comments)

The Sectera Edge is in no way a Blackberry. It runs Windows Mobile. Blackberry runs a proprietary OS which is completely different from WinMo.

more than 5 years ago
top

UK Government Plans 10-Year Database of Citizens' Travel

netcrusher88 Uh... Yeah (289 comments)

So this is different from the current state of things... how? I guarantee every time you enter or leave almost any country, it's already logged. Particularly the more technologically advanced countries we know as the "First World".

more than 5 years ago
top

Students Call Space Station With Home-Built Radio

netcrusher88 Re:Your first radio (330 comments)

Yeah, but they're expensive. I can build a tuna tin transmitter from a kit for less than the price of a single FPGA.

more than 5 years ago
top

Students Call Space Station With Home-Built Radio

netcrusher88 Re:no kidding (330 comments)

Actually, contacting the ISS out of the blue is fine. You can prearrange it too, turn it into a kind of publicity thing - like they did here - but you can track the ISS on a site like Heavens Above and then just use any Amateur Radio set on the right frequencies to talk to them when they're above - search for ARISS (Amateur Radio on the ISS) for details. It takes a bit of luck to catch them when they're awake and chatting though, and you only have a short window every 90 minutes or so.

more than 5 years ago
top

Why Do We Name Servers the Way We Do?

netcrusher88 Re:Slashdot (1397 comments)

I personally hate that naming scheme, it's confusing and produces long, hard to remember and typo-prone hostnames.

NS records exist for a reason. Your example could just as easily be:

windb002.syd

Since every Windows network (and that tends to be where I see domain names like that) is a real DNS domain, there's no reason you couldn't do this. This has the added benefit of being able to push a DNS search domain based on the location of the computer doing the DHCP request, then having certain hosts that are replicated in each area subdomain, for example a CMS or a DB. Does sydwindb002 replicate to nycwindb002? Have windb002.syd replicate to windb002.nyc (and vice versa) then let users just put in windb002, and traveling users will be able to automagically use the closest and probably fastest DB server.

Or, in the case of a CMS, have one top-level CMS that refers to local ones. Say you have cms.example.com and cms.xxx.example.com. Depending on your network location, typing in CMS will either take you to the top-level CMS or the local one, which might aggregate data from the top-level one.

more than 5 years ago
top

Ubuntu Mobile Looks At Qt As GNOME Alternative

netcrusher88 Re:"" may "" "" consider "" (262 comments)

Just a note: Scribus and Inkscape aren't even close to each other. Inkscape is more akin to Illustrator - it's a vector drawing application - whereas Scribus is more akin to Publisher or InDesign - it's a publishing layout application.

more than 5 years ago
top

Best FOSS Active Directory Alternative?

netcrusher88 Re:Samba4 (409 comments)

Hear hear, re: Outlook. Evolution or Thunderbird know how to speak IMAP, SMTP, and LDAP (for address book services).

And they multithread, so they don't lock up while talking to the server. Outlook still hasn't learned to do that, as of Outlook 2007.

more than 5 years ago
top

Best FOSS Active Directory Alternative?

netcrusher88 Re:Not Samba? (409 comments)

Samba isn't really a drop-in replacement for AD. It can be a replacement for an NT4-era Domain Controller, maybe. But it only speaks NetBIOS/NetBUI and SMB. Active Directory replaces the former with LDAP and Kerberos, though I believe the Kerberos functionality can be discarded without missing much.

more than 5 years ago
top

Google Challenging Proposition 8

netcrusher88 Re:I don't get it (1475 comments)

We don't subsidize kids to encourage having kids, you idiot. We subsidize kids because kids are expensive, and it's beneficial to society at large that the kids grow up educated (guess what? people without kids subsidize public schools too) and well taken care of rather than illiterate and malnourished.

We subsidize marriage (and make it somewhat difficult to dissolve) because it is (in theory) a stable relationship, and stable relationships are good for society as a whole, just ask a sociologist. It is particularly good for children to have parents who are in a stable relationship (just ask any kid whose parents are divorced), and encouraging marriage is the easiest way to ensure that.

By the way, (just at the general audience) this isn't a valid argument against gay marriage. Gays can adopt, and many do - it's still beneficial for adopted kids to be in a stable family, regardless of the gender of their adopted parents.

more than 5 years ago

Submissions

top

netcrusher88 netcrusher88 writes  |  more than 7 years ago

Joe writes "My father uses services such as T-Mobile Hotspot and hotel Internet connections — unencrypted and insecure — quite a bit. In his line of work, he sends and receives emails with confidential content ranging from legal documents to credit card numbers. Since this has the potential to create serious problems, I have decided to try to convince him to use a VPN. However, anything he has to configure or do any significant amount of work to use — basically, anything he runs the server for — is out of the question. I know there are a significant number of third-party VPN services for this specific purpose, so can you recommend any?"

Journals

netcrusher88 has no journal entries.

Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...