Send this message to a friend
Best Way to Back Up 20TB of Data?
Websites Inaccessible on Comcast, Crowdsourcing Confirms
How Can You Prepare for the Theft of Your Android Phone?
U.S. Officials' Technological Ignorance Exposed
The $100,000 Device That Could Have Solved Missing Plane Mystery
Hot Comment: "XP is over 12 years old, that's one hell of a *free* long term..."
From the Vault: Are Quirky Developers Brilliant or Dangerous?
Watch It: Pwnie Express Rides Again
Poll Booth: Recent news events re: Bitcoin ...
Sponsored Resource: The Bot Threat
Best Way to Back Up 20TB of Data?
Sean0michael writes about a friend who lost their entire 20TB electronic collection of music and movies. He never backed up much of that data because he never found a good way to do it. So, he asked Slashdotters, "For a home user, how do you backup 20TB of data?"
Sound Off>>
Websites Inaccessible on Comcast, Crowdsourcing Confirms
With a bit of online detective work done with a little help from some (Internet-distributed) friends, Bennett Haselton reports that the issue of not being able to access some websites with a Comcast Internet connection could potentially be widespread.
Sound Off>>
How Can You Prepare for the Theft of Your Android Phone?
Losing a fully configured Android phone is a big deal as it provides ready access to all kinds of accounts, including the owner's Google account. This could potentially allow the thief to engage in all kinds of malicious behavior, some of which could have major implications beyond the scope of the theft. So, are there any serious solutions out there for Android that secure against theft?
Sound Off>>
U.S. Officials' Technological Ignorance Exposed
Speaking at the SXSW Conference recently, Dr. Peter W. Singer, director of the Center for 21st Century Security and Intelligence, shared many disturbing stories of the lack of awareness, including how an official who was about to negotiate cybersecurity with China did not know what "ISP" stood for.
Sound Off>>
The $100,000 Device That Could Have Solved Missing Plane Mystery
The case of Malaysia Airlines Flight 370 begs the question, "How can an airliner simply disappear, leaving no clues?" There's no good reason that flight data needs to go down with the plane, because the technology to transmit "black box" flight data in real time is already available.
Sound Off>>
Re: Yes and No
"XP is over 12 years old, that's one hell of a *free* long term support package. Is there any other OS available that has a 12 year support lifecycle? Ubuntu's LTS releases have a 5 year support cycle, Apple doesn't have a published official policy for OSX but it's about 4 years on average. RHEL comes the closest I can find at between 10 & 13 years depending on the version, but you have to pay for that so it's not directly comparable.
XP has had a pretty good run of it, all things considered and if Windows 8 wasn't such a PR mess, this 'forced' upgrade would probably a lot less contentious." --by Spad
Read More>>
Are Quirky Developers Brilliant Or Dangerous?
Three years ago, Eric Spiegel at Datamation told the story of a brilliant developer named "Josh," who wore T-shirts with offensive slogans, insulted female co-workers and, when asked about documentation, smirked, "What documentation?" Sure, he was whipsmart and could churn out code that saved the company millions, but, in the end, are developers like Josh worth it?
Read More>>
Pwnie Express Rides Again
"Founder and CEO and everything else" of Pwnie Express, Dave Porcello back in 2012 described his company as "a cute name for this tiny (and easily hidden) group of Pen Test devices." It has more tools now and is working with Kali Linux, a distro built especially for penetration testing. Timothy Lord caught up with Porcello at RSA 2014.
Watch the Video>>
Recent news events re: Bitcoin ...
- Have changed my view of it for the worse
- Have failed to change my negative view of it
- Haven't swayed me from basic neutrality
- Have failed to change my positive view of it
- Have changed my view of it for the better
- The ones under my mattress are safe as ever!
Cast Your Vote>>
The Bot Threat
Some of the most serious threats networks face today are "bots," remotely controlled robotic programs that strike in many different ways and deliver destructive payloads, self-propagating to infect more and more systems and eventually forming a "botnet." Download this whitepaper and learn how bots work and how, by adopting the right strategy, you can use a defense-in-depth strategy to effectively prevent direct attacks against your critical systems.
Learn More>>
Follow Slashdot on Twitter and Facebook.