Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment meh (Score 1) 486

I've just finished evaluating approximatley 500kloc code using Coverity Prevent and Klocwork Insight (Static analysis tools). Together they found around 250 issues with the code. Null pointer dereferences, array boundary violations and a bunch of other nasty stuff.
How many of these do you think involved memcpy? - Nil, Zip, Nada.

Comment Re:Arghhhh Cap'n (Score 1) 410

If you want to make a difference in the US, support EFF (www.eff.com)

I live in Sweden and support EFF because looking at track records show that Electronic Frontier Foundation has done a heck of a lot more for freedom of speech in my home country than the Pirate Party. Swedish judges rely heavily on examples from the US (just look at the TPB trial).

Comment Re:interesting excerpt from bang source code (Score 1) 310

I couldn't agree with you more. Did I mention that not all projects even have unit-tests? *sigh*

Problem is that we're just using intra-procedural static code checks on code modules used by many projects. That implies that any tainted data or call outside your module should be checked.

We're currently evaluating programs to try to find more elaborate problems using flow-sensitive static analysis etc. Got any tips?

Comment uh... (Score 2) 734

Got this when I tried to surf the apply for a ETA:

You are about to access a Department of Homeland Security computer system. This computer system and data therein are property of the U.S. Government and provided for official U.S. Government information and use. There is no expectation of privacy when you use this computer system. The use of a password or any other security measure does not establish an expectation of privacy. By using this system, you consent to the terms set forth in this notice. You may not process classified national security information on this computer system. Access to this system is restricted to authorized users only. Unauthorized access, use, or modification of this system or of data contained herein, or in transit to/from this system, may constitute a violation of section 1030 of title 18 of the U.S. Code and other criminal laws. Anyone who accesses a Federal computer system without authorization or exceeds access authority, or obtains, alters, damages, destroys, or discloses information, or prevents authorized use of information on the computer system, may be subject to penalties, fines or imprisonment. This computer system and any related equipment is subject to monitoring for administrative oversight, law enforcement, criminal investigative purposes, inquiries into alleged wrongdoing or misuse, and to ensure proper performance of applicable security features and procedures. DHS may conduct monitoring activities without further notice.

Does this mean that they are implying that I'm hacking a DHS server just by following a link to it?

Comment Re:Wouldn't it be nice (Score 1) 223

if the people writing exploits for these security holes wrote a worm that once it had got onto a computer patched the exploit and then detached? You could call it Good Samaritan Computing or something ;)

It is still an intrusion in legal sense. Whoever wrote such a worm would face charges if caught.

Wii

Smash Bros. Delayed Until March 9th 91

After several delays already, Next Generation is reporting that the much-anticipated Wii title Super Smash Bros. Brawl has been pushed back yet again to early March. "The launch date for Super Smash Bros. Brawl has shifted a few weeks to March 9. The development is taking slightly longer than expected. As we're sure you have seen the game contains an unprecedented number of characters, options and experiences. Be sure to keep an eye on the Dojo site for the latest information."

Slashdot Top Deals

2.4 statute miles of surgical tubing at Yale U. = 1 I.V.League

Working...