Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Re:SSH Tunnels... (Score 1) 208

yes indeed. I've been tunneling all my outbound traffic over a localhost SSH SOCKS proxy for years precisely because I don't want anybody else on the LAN (wireless or otherwise) to be able to sniff that traffic. my ISP sniffing, well, I'm stuck with that for non-HTTPS traffic - but I can prevent the rest. To wit: http://cleverhacks.tumblr.com/post/443759182/ssh-its-whats-for-dinner-or-socks-proxy-port and if you can't get out on anything but tcp/443, see also: http://cleverhacks.tumblr.com/post/816507010/ssh-over-ssl-tunneling

Comment Re:In other words, 61% think... (Score 4, Insightful) 398

THIS. the very concept of an "Internet killswitch" is nonsense on the face of it. Think about it: what, exactly, will the President shut off? MAE-EAST? Google datacenters? Sprint core routers? Facebook webservers? All of Comcast's residential netblocks? Undersea fiber between San Francisco and Australia? The most fundamental aspect of the Internet is its decentralization, designed specifically to PREVENT any single entity from shutting down the network. The entire discussion consists of uninformed blathering from morons and those who hope to make a truckload of money selling them nonsense solutions.

Comment Re:Uh, no, you can't have my network (Score 1) 505

This is a logical step to secure critical infrastructure in the event of an attack. Not some paranoid bill that will allow big brother to sneak in unaware and monitor/control every aspect of the internet.

sure - there's no point in passing redundant legislation when warrantless wiretaps are already a well-established precedent.

Image

CJKV Information Processing 2nd ed. 52

stoolpigeon writes "At the end of last year, I made a move from an IT shop focused on supporting the US side of our business to a department that provides support to our operations outside the US. This was the first time I've worked in an international context and found myself, on a regular basis, running into long-time assumptions that were no longer true. My first project was implementing a third-party, web-based HR system for medium-sized offices. I found myself constantly missing important issues because I had such a narrow approach to the problem space. Sure, I've built applications and databases that supported Unicode, but I've never actually implemented anything with them but the same types of systems I'd built in the past with ASCII. But a large portion of the world's population is in Asia, and ASCII is certainly not going to cut it there. Fortunately, a new edition of Ken Lunde's classic CJKV Information Processing has become available, and it has really opened my eyes." Keep reading for the rest of JR's review.
Games

Submission + - Eight Videogame Places You're Not Supposed to Go (crispygamer.com) 1

Ssquared22 writes: The eight far-off realms in this article exist for different reasons. They could be developer test areas, or forgotten pieces of landscape that somehow made their way into the final code. Whatever their reason for being, they all have one thing in common: They weren't meant to be explored by the likes of you and me. But through persistence, hacks or some combination of the two, you can take in these rare delights for yourself. Pack your bags.
Security

Submission + - New attack exploits virtually all intranets, VPNs (threatpost.com) 1

redsoxh8r writes: Security researcher Robert Hansen, known as Rsnake, has developed a new class of attacks that abuses a weakness in many corporate intranets and most browsers to compromise remote machines with persistent JavaScript backdoors. Threatpost reports: "The attacks rely on the long-term caching policies of some browsers and take advantage of the collisions that can occur when two different networks use the same non-routable IP address space, which happens fairly often because the amount of address space is quite small. The bottom line is that even a moderately skilled attacker has the ability to compromise remote machines without the use of any vulnerability or weakness in the client software. "If you're even vaguely clever, developing this might take you two hours. It's not that difficult," said Robert Hansen, the researcher who wrote about the attacks in a white paper published this week, called "RFC1918 Caching Security Issues."
Software

Submission + - Canada rejects business method patents (michaelgeist.ca)

Lorien_the_first_one writes: "Canadian Patent Appeal Board Rules Against Business Method Patents

The Canadian Patent Appeal Board determined that "[Yet] the panel delivered very strong language rejecting the mere possibility of business method patents under Canadian law. The panel noted that 'since patenting business methods would involve a radical departure from the traditional patent regime, and since the patentability of such methods is a highly contentious matter, clear and unequivocal legislation is required for business methods to be patentable.'"

"In applying that analysis to the Amazon.com one-click patent, the panel concluded that 'concepts or rules for the more efficient conduct of online ordering, are methods of doing business. Even if these concepts or rules are novel, ingenious and useful, they are still unpatentable because they are business methods.'" Looks like the US courts could face some peer pressure. :)"

Comment counter-attack against whom? (Score 1) 242

so the Law of Armed Conflict applies - great. Who are you retaliating against? The IP that attacked you? o rly? I submit that the US Armed Forces cannot even reliably identify the ultimate source of a network attack, much less the identity, motivation or affiliation of an attacker (all of which are necessary in order to provide justification for a measured physical response).

It's going to take another couple of generations before we end up with people commanding the armed forces who grew up on the Internet and have at least some basic clue that you can't just prepend "cyber-" to all your standard tactics and rules of engagement and think you're prepared.

Social Networks

Twitter Considered Harmful To Swine-Flu Panic 383

judgecorp writes "Twitter is being criticized for spreading panic about swine flu. This is not just knee-jerk Luddism 2.0: it's argued that Twitter's structure encourages ill-informed repetition, with little room for context, while older Web media use their power for good — for instance Google's Flu Trends page (which we discussed last winter), and the introduction of a Google swine flu map." On a related note, reader NewtonsLaw suggests that it might be a good idea, epidemiologically speaking, to catch the flu now vs. later.

Comment Re:wow (Score 1) 319

"shut down the tubes" meaning what, exactly? a router? all routers? core or edge or both? BGP sessions? exchange points? private or public?

what I'm driving at here is that the fundamental nature of the Internet, its very definition, is a number of independent networks agreeing to exchange traffic in a decentralized manner. Even shutting down a single large provider (e.g. MCI/UUNet/Verizon/AS701) is an nonsensical statement - what specifically are you shutting down? There are thousands of routers, peering connections, internal interconnects, hand-offs to smaller providers who in turn interconnect and hand off to still smaller providers ... the architecture very much resembles a fractal for the larger providers.

Now multiply that complexity by a dozen and you've covered probably 90% of the carriers in the US ... but wait, some of these aren't US based carriers! We have quite a few carriers with circuits or presence in the US where the organization is legally located elsewhere. What do you do then?

Telling AT&T to shut down (assuming you can even define that; let's say you mean disconnect from every other provider they peer with, and shutting down their tens of thousands of client connections) would cause damage, but would do little more than isolate AT&T from the rest of the world.

This legislation is an incredibly bad idea for a number of reasons, but the risk it poses to the availability of the Internet as a whole is not one of them.

Slashdot Top Deals

"In matters of principle, stand like a rock; in matters of taste, swim with the current." -- Thomas Jefferson

Working...