×

Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

Comments

top

Apple Says iPhone Jailbreaking Could Hurt Cell Towers

nickh01uk Security 101 for Mobile Operators! (495 comments)

Theres a nice little article over at the 360 blog here listing exactly what mobile operators frequently get wrong with their security architecture and execution. Once wonders if they understand the basics!

more than 5 years ago
top

When VMware Performance Fails, Try BSD Jails

nickh01uk There can be huge differences in performance (361 comments)

Theres a nice little article here (basic reg. required) contrasting VMware and Citrix XenServer, where the end user was forced to abandon VMware (their default choice) after suffering performance problems and after 6 months of back and forth with tech support and engineering at the vendor. In the end XenServer delivered 2x the real world performance on identical hardware with a default install. Not all workloads are equally well virtualized! N.

more than 5 years ago
top

Citrix XenServer Virtualization Platform Now Free

nickh01uk Re:I'm guessing VMWare isn't that worried (259 comments)

Re: unsupported trials.

If you'd dropped my company a line we'd have offered a supported trial with an allocated engineer (okay, time spent would depend partly on potential size of a deployment...) but you'd certainly have spent nothing finding out what the product could and could not do in a supported way. We'd probably both have learnt something, I love real-life tests :-) Sometimes there are benefits in NOT buying direct off the vendor's web store :-) End of outrageous plug! Oh, we also do VMware, I guess what Im saying is that deployment is about more than just the upfront sticker price of the product.
PK

more than 5 years ago
top

Citrix XenServer Virtualization Platform Now Free

nickh01uk Has to be good news for the customer because.... (259 comments)

it will provide free access to competitive technology, keep the established vendor(s) straight, and (eventually) will give rise to cross-platform management tools and frameworks.

At last it looks like there will be a free, supported, commercial-grade virtualization solution for those of us who dont have the budget for VMware and have been disappointed with Hyper-V and its predecessors.

I can only imagine this is unhappy news for VMware who surely must now take a reality check on their pricing. I sincerely hope they do not go the same way as Netscape, having 3 strong vendors in the market stops a lot of the kind of bad behavior you see from ERP, CRM, and BI vendors (you know who you are guys!). There was a balanced 2 minute comparison of Hyper-v, XenServer, and VMware over at the 360 blog here.

For the VMware, Xen, and Hyper-V fanboys (are there any Hyper-V fanboys yet?), calm down and take a tip from that blog:

"Providers of the core hypervisor technology will continue to play a game of technical leapfrog with one another for at least a couple of years, while those with a management, enterprise framework, or suite will claim more strategic long-term positions around "liquid infrastructure" or something else suitably bendy. What is most important right now is that you have the right information processing architecture, not any one particular product within it."

more than 5 years ago

Submissions

top

WikiLeaks, a lesson for security admins

nickh01uk nickh01uk writes  |  more than 3 years ago

nickh01uk (749576) writes "No data, no matter how carefully guarded, is ever truly safe. Now that the dust has settled and the hype has dissipated, the guys over at the 360 security blog have attempted to provide some advice to security admins on keeping their jobs in the brave new WikiLeaks world."
Link to Original Source
top

WikiLeaks Lessons For Security Managers

nickh01uk nickh01uk writes  |  more than 3 years ago

nickh01uk (749576) writes "Rarely does a story with a strong information security thread garner so much attention in the press. When the leaking of secret state information is combined with pent-up public interest in the subject matter, demand meets supply and column inches result. Putting to one side the virtues or vices of making this particular information public, what lessons can we learn from it as Information Security professionals?"
Link to Original Source
top

7 Wonders of the Security Software World

nickh01uk nickh01uk writes  |  more than 6 years ago

nickh01uk writes "The guys over at Three Sixty Information Security have published the results of their annual analysis on 7 of the most popular security tools in common use by systems administrators. The articles examines the tools on their merits and attempts to pull together common threads running through each. Finally they put forward their answer to the question "What makes this software so uncommonly good?" If only all software was written like this..."
Link to Original Source
top

The Characteristics of Secure Software

nickh01uk nickh01uk writes  |  more than 7 years ago

nickh01uk writes "Particularly topical in light of the widely reported Cisco IOS software vulnerability, Three Sixty Information Security have analysed 7 of their most frequently recommended tools for network and system administrators. Among the regulars like ssh and nmap are some tools less commonly known for their security admin credentials. The article examines each on its merits and uses the results to build a screen for evaluating the robustness of future software. Finally it attempts to answer the question; "What makes this software so uncommonly good?""
Link to Original Source
top

Researchers Discover the Secret To Secure Software

nickh01uk nickh01uk writes  |  more than 7 years ago

nickh01uk writes "The guys at Three Sixty Information Security have published the results of their analysis on 7 of the most popular security tools in common use by systems administrators. The articles examines the tools on their merits and attempts to pull together common threads running through each. Finally they put forward their answer to the question "What makes this software so uncommonly good?"

From TFA, the recommended tools are: nmap, ssh, syslog-ng, postfix, rsync, and sudo."
top

How can you spot secure software at a distance?

nickh01uk nickh01uk writes  |  more than 7 years ago

nickh01uk writes "Independent security researchers have compiled a list of their most frequently recommended security infrastructure components, drawn out the common threads that each shares, and attempt to answer the question "What makes this software so uncommonly good?". They then use this knowledge to put forward a straw-man for evaluating future tools and software for use in secure environments. Not everyone will agree with their choices, but many will appreciate the conclusions."
Link to Original Source

Journals

nickh01uk has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?