Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror

Comment Re:system maintained by a vendor or some other 3rd (Score 1) 99

Since HBSS was identified as the security software that caught the 'virus' I was immediately skeptical. Why? Because HBSS has found and deleted mission-critical software on classified networks before. HBSS was deployed in a hurry because security personnel wanted to lock the network down, and one of the steps that got skipped in a lot of places was coordinating what software is and isn't permitted on the network. Down at the operational level, this translates to an overworked captain or lieutenant passing the memo to whoever in the comms shop has time to do an install (ask yourself: why isn't this person busy?). HBSS gets installed and starts throwing up pop-up windows, and the sergeant, with no training or policy to guide him, helpfully starts making the same kinds of judgments your parents make: "What's SYSTEM32? Sounds dangerous. Deleted!"

Comment Slashdot, Reuters, and above comment: all wrong. (Score 1) 297

Deeply deeply misinformed. The Missile Defense Agency press release is better than the Reuters article and a thousand times better than the Slashdot headline blurb. Some corrections:

1. Two targets were destroyed - one liquid and one solid fueled. This puts the lie to the above comment, and the Slashdot article that implies that they only shot a liquid-fueled target because it was easier. Furthermore, the solid-fueled target was identical to one that the ALTB had destroyed in flight a week earlier.

2. The first target was launched from a "sea platform", not a submarine, and is much more likely to have been a SCUD or SCUD simulator on a barge. The U.S. Navy has never permitted liquid-fueled missiles aboard their submarines because a fuel or oxidizer leak could kill the crew.

Data Storage

Forensics Tool Finds Headerless Encrypted Files 374

gurps_npc writes "Forensics Innovations claims to have for sale a product that detects headerless encrypted files, such as TrueCrypt Dynamic files. It does not decrypt the file, just tells you that it is in fact an encrypted file. It works by detecting hidden patterns that don't exist in a random file. It does not mention steganography, but if their claim is true, it seems that it should be capable of detecting stenographic information as well."

Comment A Few of my Favorites (Score 5, Informative) 634

FreeCiv, a freeware implementation of the Civ and Civ II rules - http://freeciv.wikia.com/wiki/Main_Page

Dwarf Fortress is a fantastically complex game, like a cross between SimCity, NetHack, and Oregon Trail - http://www.dwarffortresswiki.net/index.php/Main_Page

NetHack is a classic dungeon crawler with ASCII graphics - http://www.nethack.org/

Command & Conquer is an old but awesome RTS, now available for free from EA - http://www.commandandconquer.com/intel/default.aspx?id=62#NewsMain

Abandonware is murky but you can find install files for many abandonware titles online as well.

RIAA Targets LAN Filesharing at Universities 608

segphault writes "The RIAA has sent letters to 40 university presidents in 25 separate states informing them that students are engaging in filesharing on their campuses using the local network. Apparently, the RIAA wants to get universities to use filtering software on their networks to detect student filesharing. The RIAA did not disclose the methodology they used to determine that filesharing is occuring on those local networks, but it probably didn't involve asking permission. The article goes on to predict that the RIAA will eventually try to get the government to require use of anti-filesharing filtering technologies at universities."

Slashdot Top Deals

We all like praise, but a hike in our pay is the best kind of ways.

Working...