Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment There is only one way. (Score 1) 182

Best way, hire a good 3rd party auditor sign an NDA with them. You get another set of eyes on the setup. Plus they will use a number of tools to scan your product and the servers you host it on that you may not have easy access to. For example, IBM's AppScan is designed to scan web applications and test for SQL injections, XSS vulnerabilities, etc.

At some point you may want to look at purchasing a copy of AppScan, however that would all depend on how often your code/environment will be changing. WatchFire was recently (last couple of years) purchased by IBM, which is how they acquired AppScan. I've tried most of the tools out there, AppScan is light years ahead of any others and it's priced that way too.

Good luck!

Government

Secret Service Runs At "Six Sixes" Availability 248

PCM2 writes "ABC News is reporting that the US Secret Service is in dire need of server upgrades. 'Currently, 42 mission-oriented applications run on a 1980s IBM mainframe with a 68 percent performance reliability rating,' says one leaked memo. That finding was the result of an NSA study commissioned by the Secret Service to evaluate the severity of their computer problems. Curiously, upgrades to the Service's computers are being championed by Senator Joe Lieberman of Connecticut, who says he's had 'concern for a while' about the issue."
Java

After Learning Java Syntax, What Next? 293

Niris writes "I'm currently taking a course called Advanced Java Programming, which is using the text book Absolute Java, 4th edition, by Walter Savitch. As I work at night as a security guard in the middle of nowhere, I've had enough time to read through the entire course part of the book, finish all eleven chapter quizzes, and do all of the assignments within a month, so all that's left is a group assignment that won't be ready until late April. I'm trying to figure out what else to read that's Java related aside from the usual 'This is how to create a tree. This is recursion. This is how to implement an interface and make an anonymous object,' and wanted to see what Slashdotters have to suggest. So far I'm looking at reading Beginning Algorithms, by Simon Harris and James Ross."
The Almighty Buck

The Outing of Pranknet 543

An anonymous reader writes "The Smoking Gun recently published a story on their investigation and outing of Pranknet, an online cabal that aims to take pranks to the next level. Their legacy includes thousands of dollars of damage, and many harassed souls. Many of the pranks have clear criminal implications. Reading their report may send chills down your collective spines." From the linked article: "Coalescing in an online chat room, members of the group, known as Pranknet, use the telephone to carry out cruel and outrageous hoaxes, which they broadcast live around-the-clock on the Internet. Masquerading as hotel employees, emergency service workers, and representatives of fire alarm companies, 'Dex' and his cohorts have successfully prodded unwitting victims to destroy hotel rooms and lobbies, set off sprinkler systems, activate fire alarms, and damage assorted fast food restaurants. But while Pranknet's hoaxes have caused millions of dollars in damages, it is the group's efforts to degrade and frighten targets that makes it even more odious ..."
Google

Google Apps Leave Beta 116

Today Google announced that they're removing the "beta" label from Gmail, Google Calendar, Google Docs and Google Talk. They said, "We've come to appreciate that the beta tag just doesn't fit for large enterprises that aren't keen to run their business on software that sounds like it's still in the trial phase." Quoting the NYTimes: "'Obviously we haven't had a consistent set of policies or definitions around beta,' said Matt Glotzbach, a director of product management at Google. Mr. Glotzbach said that different teams at Google had different criteria for what beta meant, and that Google felt a need to standardize those. ... Practically speaking, the change will mean precious little to Gmail's millions of users. But it could help Google's efforts to get the paid version of its package of applications, which includes Gmail, Calendar, Docs and other products, adopted inside big companies."
Image

Stoned Wallabies Make Crop Circles 104

It's the tripnaut! writes "The BBC reports that Australian wallabies are eating opium poppies and creating crop circles as they hop around 'as high as a kite', a government official has said. 'The one interesting bit that I found recently in one of my briefs on the poppy industry was that we have a problem with wallabies entering poppy fields, getting as high as a kite and going around in circles,' says Lara Giddings, the attorney general for the island state of Tasmania. 'Then they crash,' she added."

Slashdot Top Deals

Old programmers never die, they just branch to a new address.

Working...