Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Good (Score 3, Insightful) 136

I for one am glad they aren't policing internet interactions in gaming, the last thing I want is game companies being forced to attempt to censor every bad word to kowtow to the ESRB for an M rating. As for all the companies that already attempt to do it, good luck with your stupid useless endeavor.

Fu(K!ng n0o85!!1

Comment Re:Not necessarily (Score 2, Interesting) 167

I still buy CD's as well, but it's mainly due to a lack of quality online downloads. When you buy a game at a store or on Steam you get exactly the same game, but buying a lossy mp3 isn't the same as ripping a CD to FLAC. If there were some decent online retailers of lossless audio I would probably buy from there.

Comment Re:Dumbasses (Score 1) 285

I still very much doubt it, for the simple reason that if this was indeed a publicly known vulnerability that required no javascript and could be executed by opening an image file every hacker and their grandma would be using it right now. Those sorts of exploits are very valuable to malware authors.

Comment Re:You mean... (Score 5, Insightful) 420

It would be a hell of alot easier of software developers didn't require administrative privileges when they really don't need them. I tried to run in a "user" usergroup when I replaces win2k pro with win xp pro but nothing ran correctly. I tried using the "run as" menu and a program called sudo-win which would elevate my privs temporarily then reduce them again. Nothing would install correctly, nothing would run correctly. Even programs that don't use any administrator functions or zones wouldn't work correctly. Realistically, running in a non-admin account is a pain in the ass.

Comment Re:follow the money. (Score 2, Informative) 220

It is common practice for domains to be registered using stolen credit card numbers and phony registration information, as well as using bots within the net to act as proxies between you and the actual server, such as with fast flux. That combined with the fact that the servers are generally hosted in countries that don't have a lot of money, man power, or motivation to track these types of operations down makes stopping them a very difficult process.

Comment Re:Evolution (Score 1) 220

I guess it would depend on how you define mutation in terms of a computer worm. If you mean it changes it's executable there is already alot of malware that uses polymorphic code and a few that use metamorphic code. If you mean changing the means of transmission, I'm sure a rudimentary form of mutation could occur using some sort of built in fuzzing and vulnerability analysis engine.

Slashdot Top Deals

"The identical is equal to itself, since it is different." -- Franco Spisani

Working...