Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:Wow indeed (Score 1) 90

Is the GPL legally binding in Australia?

Well, for their sake, it better be. Because if it were not binding, default copyright regulation would apply and these companies would not have the right to reuse and redistribute this code from the first place. Arguing GPL does not apply (as SCO claimed in the past) is shooting in its own foot.

Comment Re:Stop trying to resolve them! (Score 0) 536

Out of curiosity, like what?

Simple: thanks to the Bible, the number Pi is exactly equal to 3, which is simple to remember and has a lot of advantages, like being rational. Whereas the scientific answer for pi makes it extremely complex and annoying. With religion, Man would have built rockets to the Moon a lot earlier than in the late 20th century.

Botnet

Submission + - Researchers Debut Anti-Botnet Coding Techniques (threatpost.com)

Trailrunner7 writes: One of the main problems created by botnets is that many users whose PC have been infected by a bot have no idea it's happened. In most cases, there are few outward signs that are noticeable to the average user and so the victims go about their normal online business with no clue that their sensitive data is being packaged up and exfiltrated every day. Botnet traffic typically looks like normal port 80 Web traffic and so it's extremely difficult for victims to identify it and backtrack it to a bot infection. One pair of researchers this week will unveil a new technique they've developed to help Web sites protect users whose machines already have been compromised by bots.

"Security infrastructure has matured and there's been a lot of focus on that, but application security hasn't been focused on as much," said Peter Greko, a security researcher who, along with Fabian Rothschild, will talk about their new techniques at the OWASP AppSec DC conference this week. "A lot of security problems can be addressed in the application. If you go after the C&C, you only take out the bots connected to that server. That's not an overall problem that can be solved."

The methods that Greko and Rothschild developed are based on their analysis of the infamous Zeus Trojan and the way that it exfiltrates data and communicates with its C&C servers. The key concept behind their work is that they assume that all PCs are compromised, so their goal is to make whatever data the bot is trying to extract useless. In looking at the Zeus bot, the pair found that the bot uses HTTP POST request logging to gather data from Web sessions on compromised machines. It then sends the data to its remote C&C server via large POST requests, as well. The server on the back end logs the data in a large database, so Greko and Rothschild looked for ways to either prevent the data from reaching the C&C server or to make the data useless once it's harvested.

Security

Submission + - Adobe Warns Of Reader, Flash Player Flaws (crn.com)

cgriffin21 writes: Adobe is revving its engines after being made aware of yet another PDF security vulnerability in Adobe Reader, which could potentially enable malicious hackers to execute remote code or launch denial of service attacks on unsuspecting users. Adobe issued an advisory Friday warning users that a proof-of-concept file had been publicly posted to the Full Disclosure mailing list, demonstrating in detail how the Adobe Reader flaw could lead to a full scale denial of service attack.

Comment Re:What's the point? (Score 2, Informative) 168

Well, MKV has been around for a while, and having an Xvid file within MKV was very common before being used to encapsulate h264. I really don't care what the public think when the discussion becomes technical. Being accurate never hurts, and if you want to look dumb when trying to have a tech conversation about digital video that's your problem...

Submission + - GNU/Linux is fastest growing OS at Big Companies. (linuxfoundation.org) 1

twitter writes: A survey of 1,900 people at companies with more than 500 employees shows that GNU/Linux is growing faster than other OS at the expense of Windows and Unix. Steven J. Vaughan-Nichols has some insightful commentary on it.

These businesses are moving to Linux far faster than they are to Windows or Unix. ... conventional wisdom is that Unix users are the most likely to switch to Linux. ... it turns out that, by a few percentage points, Windows users at 36.6% are more likely to be heading to Linux than Unix, 31.4% ... 36.4% of businesses reported some Linux desktop use in their company. ... while total cost of ownership (TCO) remains a strong number two, the first reason these days for people to switch to Linux is its perceived technical superiority and features. ... 58.6%, said the recession hadn't played a role.

One thing that SJVN missed is that, "and 66% of users surveyed say that their Linux deployments are brand new (“greenfield”) deployments. This greenfield market share grab is a good indicator of a platform’s future performance." Hurry up, already, I want my GNU!

Comment Something I don't understand (Score 3) 126

[...]enabling passengers to connect to the vehicle's network without affecting the battery life of their connected devices.

Can someone explain this? or is it just marketing bs? As far as I know, the battery life of the devices that are connected to some access point or router is not affected by the nature of the router. The fact it uses low power components is important for the car's battery (or fuel consumption), not for the attached device! Or am I missing something?

Slashdot Top Deals

"What man has done, man can aspire to do." -- Jerry Pournelle, about space flight

Working...