Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Check out the new SourceForge HTML5 internet speed test! No Flash necessary and runs on all devices. ×

Comment Re:non centralized DNS (Score 2) 331

Consider that the target of this attack was Dyn. That's Dyn as in "dynamic". A big chunk of their business involves mapping host names to dynamic IP addresses. Caching someone's dynamic IP address for a 30 days may or may not yield the desired result. The fact that you happen to have "zero issues" probably means only that you attempted to connect to exactly "zero" dynamic DNS clients.

Comment Technical Solutions (Score 1) 331

There are possible technical solutions. In the case of the Mirai botnet attacks, the released source code identifies the affected devices. Device manufacturers can be mapped to MAC addresses. ISP's could filter traffic from known vulnerable hardware devices to known DDoS attack targets.

Is this an easy solution? No. Is this a comprehensive solution? No. Would ISP's want to take on this responsibility? No. But is it technically possible? Yes.

Comment Addresses matter, not hostnames (Score 1) 264

The problem is this:
Name Server: NS1.P16.DYNECT.NET
Name Server: NS2.P16.DYNECT.NET
Name Server: NS3.P16.DYNECT.NET
Name Server: NS4.P16.DYNECT.NET

There's nothing wrong with having all your DNS servers under the same subdomain. What matters is what IP addresses those names resolve to. I've seen primary and secondary DNS servers that aren't even on different IPV4 subnets, never mind geographically distant ones.

Comment Long Metal Rod (Score 1) 348

I recall once reading a strategy for recording all of human knowledge by scribing a single scratch somewhere along the length of a long metal rod. First, represent the data as a long string of binary digits, like we already do in computers. Place a decimal point in front of the first digit. Scribe the scratch at a point in the rod corresponding to that fraction of its length.

Needless to say, this would require a VERY long rod, and a bit of engineering to sort out the the thermal complexities. ;)

Comment Re:unrelated: Pic Tac Toe (Score 1) 161

Wow, thanks for taking the time to reply to that! I've been wondering about that for years. I love the simplicity of your symmetrical strategy.

It puts me in mind of a simple strategy I used to play in the game of Nim. Creating two mirrored sets of piles worked well enough to get you to a place where some simple exceptions would apply. No need for any arithmetic, just simple symmetry and memorization of a few other winning patterns such as a three piles with 1, 2, and 3 respectively.

(This is for the misère version of Nim, where you want your opponent to pick last, but is easily turned around for regular Nim).

This strategy worked particularly well with large numbers if piles, where I could quickly establish a winning pattern against a novice player.

Comment Re:It depends (Score 1) 184

No, a virus will not "immediately re-activate on restoration". For a virus to "activate", some form of execution is required. Restore your data files only, or don't run infected executables from your backup.

Yes, there have been viruses that infect data files, such as PDF documents, Word documents, or graphics files, but even so, these would not "immediately re-activate on restoration".

Slashdot Top Deals

Anyone who imagines that all fruits ripen at the same time as the strawberries, knows nothing about grapes. -- Philippus Paracelsus