- Feature Articles
- CodeSOD
- Error'd
- Forums
-
Other Articles
- Random Article
- Other Series
- Alex's Soapbox
- Announcements
- Best of…
- Best of Email
- Best of the Sidebar
- Bring Your Own Code
- Coded Smorgasbord
- Mandatory Fun Day
- Off Topic
- Representative Line
- News Roundup
- Editor's Soapbox
- Software on the Rocks
- Souvenir Potpourri
- Sponsor Post
- Tales from the Interview
- The Daily WTF: Live
- Virtudyne
Admin
This is really bad.
Yanks eh? Whats next.
Admin
this is what gets college kids beat up
Admin
A programmer who hasn't heard of Sarbanes Oxley? Holy crap. We have written 50 thousand lines of code and documented 50 million more because of that freakin law.
(of course, we do get paid by the hour, so I guess I should be happy right?)
Admin
We got a copy of the production database (full of patient info protected by HIPAA) We had to sign all kinds of documents and such. The boss asked "How can we guarantee the security of this data?" My answer was "On windows, since you don't have the source code and it downloads new system code every night, the only way to guarantee the security of your data is to unplug all the cables from the back of the computer". And that's what we do! Any one who thinks anything is safe on a computer they don't have the source code to is a nut case.
Admin
Is te forum software eating aitches too? I 'ave it on good autority ...
Admin
thrown new IronyNotHandledException("The Irony interface is not supported by this device.");
Admin
Please don't ever again use 200 OK as a response for File Not Found, not even in a joke. Good old 404 is what you want.
Admin
That reminds me - I ought to figure out sometime how to get Trac to give a 404 instead of a 500 Server Error if you go to a non-existent page.
Admin
My body is my body. Why the state insists on interfering with it, I don't understand, since it is rather contrary the spirit (but unfortunately not the letter) of the International Declaration of Human Rights.
Admin
Last!
Admin
" ... source code, ostensibly for "disaster recovery."
They should have required source code escrow in the client agreement.Problem averted.
Admin
SOX == The Sarbanes-Oxley Act, a federal law which establishes policies that govern the accumulation and disclosure of corporate financial information. A large part of the law deals with IT procedures.
Admin
Wow. I persume, if you had the source code for the operating system you would go over it line by line and are 100 % confident of your (or your employee's) ability ability to find and fix each and every security hole?
No?
Well, then surely you would pay someone guarantee that the code is secure -- that would at least transfer legal liablity from yoruself to the third party.
No?
Perhaps you mean that you plan to trust random strangers to examine the operating system code with uncertain credentials (are you really going to pick up the phone and call MIT to verify that the "Senior Professor of Computer Science" works at MIT?) and uncertain motiviations and assume that if "enough" (how many?) of these secuirty experts agree that the code is secure then it actually is reasonable to treat it as secure? From a legal standpoint, this provides absolutly no protection in the advent of a breech, and might make matters worse (you could have done #1 or #2, but you chose not to). Never mind the fact that these so called experts are pratically annonmiuos
Don't get me wrong -- open source software is, in almost all cases, more secure than closed source software. However, there is an enormous gap between "more secure" and "completly secure". The only platform that fits into the later category is the platform that no longer functions ("Write Only Memory"). Even a hard drive removed from its computer and stored in a bank vault is potentially vulnerable.
Blindly asserting that closed source operating systems are too insecure to be connected to a network while holding confidential information is absurd on its face. For example, a closed source operating system residing directly behind a dedicated open source firewall is at least as secure as if the only system involved was a closed source system. This can be accomplished by configuring the firewall to deny all connection requests originating from the protected server (preventing it from dialing home and preventing any trojan style programs integrated into the operating system from "reporting home") or only allow connections to specific hosts on specific ports (which has a very similar effect). Actually, this configuration should be more secure than the alternative, open source OS installed directly on the network -- you can (have someone, if you lack the skills) the operating system on the firewall customized to eliminate everything except what is necessary to route network traffic between the protected computer and the rest of the network, minimizing the amount of code that needs to be examined. Note that this firewall won't be running Linux, at least not in any recognizable form. The first thing that should be eliminated in your firewall operating system is any option for interactive login (root or otherwise) followed all file system support (firewall options will be hardcoded on the boot EPROM). All you really need is a fragment of a TCP/IP stack -- one that can decode packet headers and knows that packets destined for "123.54.394.32" (hard-coded) on network interfaces "A" should be retransmitted (unchanged) on network inteface "B" and packets received on network interface "B" (possibly with destination x / port y -- both also hardcoded) should be re-transmitted on network interface "A".
In this scenario, I contend that the closed source system + firewall would be far more secure than any possible "general purpose" open source operating system connected to the internet and yet, if my life dependend upon the secuirty of the data stored in this particular computer, I'd still "unplug all the cables from the system" whenever the data wasn't actually needed.
Admin
Nobody's eating W. That was the Clinton administration.
Admin
Not any more. Neither is the Commander-in-Chief.
Admin
It's not perception; it's straight talk. "That was done with the latest version of our IDE. If we try to do it with these eight-year-old tools, it will take us 10 days to do what they did in 10 minutes. We've asked for updates to our tools for the past five years and been turned down. When you force us to use eight-year-old technology, you are going to get eight-year-old product. That's just the way it is. If you want cutting edge software, provide my team with cutting edge tools."