Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Intel

Intel To Rebrand Processors In 2008 125

DJ notes that TechARP has up a look at Intel's plans to rebrand their processors, including what must be a leaked internal chart of the old and new landscape of product names. This story doesn't seem to have been picked up anywhere else yet. Quoting: "We just heard from an anonymous source that Intel will be rebranding their processors in 2008... These new brand names will come into effect on the first day of 2008. Intel hopes that these new brands will not only leverage the strong Core 2 brand but also make it less confusing for the consumer. At the moment, the Intel Centrino mobile platform has five different logos with brands like Centrino, Centrino Duo and Centrino Pro. Starting from January 1, 2008, Intel will consolidate the Centrino Duo and Centrino brands under the Intel Centrino brand, and rename the Centrino Pro as Intel Centrino with vPro Technology."
Microsoft

Submission + - Using Microsoft's anti-spam software to fight AIDS (businessweek.com)

mjasay writes: "Every once in awhile, Microsoft does something very right. Microsoft's anti-spam technology and a Windows server farm, along with some innovative thinking from Microsoft researcher David Heckerman, are helping to crack the HIV code. Why is Microsoft in the AIDS research game (especially given that its own desktop software has been a bit of an STD itself)? Because it's in the anti-spam game, and it turns out there are some similarities between the two. This sort of cross-industry pollination should happen more often, to better both software and other industries."
Privacy

Submission + - The hacker who got hacked by hackers

An anonymous reader writes: This is a story about a hacker who got hacked by hackers :) TPB files charges against media companies: Thanks to the email-leakage from MediaDefender-Defenders we now have proof of the things we've been suspecting for a long time; the big record and movie labels are paying professional hackers, saboteurs and ddosers to destroy our trackers. While browsing through the email we identified the companies that are also active in Sweden and we have tonight reported these incidents to the police. The charges are infrastructural sabotage, denial of service attacks, hacking and spamming, all of these on a commercial level. The companies that are being reported are the following: Twentieth Century Fox, Sweden AB; Emi Music Sweden AB; Universal Music Group Sweden AB; Universal Pictures Nordic AB; Paramount Home Entertainment (Sweden) AB; Atari Nordic AB; Activision Nordic Filial Till Activision (Uk) Ltd; Ubisoft Sweden AB; Sony Bmg Music Entertainment (Sweden) AB; Sony Pictures Home Entertainment Nordic AB. Stay tuned for updates.
AMD

Submission + - Pedal to the Metal: Overclocking the Athlon CPU (pcper.com)

Vigile writes: "Even with processors well exceeding the performance needs of most, overclocking is still a practice used by hardware enthusiasts. And even though the art of the overclock has improved dramatically, with all the new options, settings and considerations that go into overclocking a system beyond its rated speeds, the task can be daunting for anyone new to the game. A new educational article over at PC Perspective starts from the beginning with detailed descriptions of the how's and why's behind overclocking. A walk through of picking the right CPU, motherboard, memory and even power supply is included as is a typical BIOS setup and configuration process. This is really a great article for anyone that new, or rusty, to overclocking."
Security

Submission + - XP system previllage Vulnerability unpatched Yet (hyperphp.com)

devkhadka writes: "There is an boundary error in Windows XP, which can be exploited by malicious local users on a system to escalate their privileges.The vulnerability is caused by an unchecked buffer in the Windows schedular component used by Windows clients to schedule certain activity for future. A one or malicious code can exploit the vulnerability to cause a buffer overflow either resulting in a system crash or execution of arbitrary code with SYSTEM privileges. Here is the youtube video showing how to gain system previllage."
Intel

Submission + - Intel To Rebrand Processors In 2008 (techarp.com) 1

DJ writes: We just heard from an anonymous source that Intel will be rebranding their processors in 2008. From the Centrino mobile platform to the Itanium 2 server processors, Intel will revamp and consolidate their product lines under these new brands. These new brand names will come into effect on the first day of 2008. Intel hopes that these new brands will not only leverage the strong Core 2 brand but also make it less confusing for the consumer.

At the moment, the Intel Centrino mobile platform has five different logos with brands like Centrino, Centrino Duo and Centrino Pro. Starting from January 1, 2008, Intel will consolidate the Centrino Duo and Centrino brands under the Intel Centrino brand, and rename the Centrino Pro as Intel Centrino with vPro Technology.

Security

Submission + - F-Secure Antivirus for Servers does not check all (heise-security.co.uk)

devkhadka writes: "A flaw in the 64-bit version of F-Secure Antivirus for Windows Servers 7.00 prevents the software checking crafted archives or compressed executable files,which may allow attackers to smuggle manipulated files containing malicious code past the scanner. The vendor has published a security advisory containing a link to an update that eliminates this bug. So all the users are adviesed to update the software as soon as possible."
Security

Submission + - CA BrightStor Hierarchical Storage Manager execute (heise-security.co.uk)

devkhadka writes: "Computer Associates have released a security advisory in which they report the discovery of vulnerabilities in their BrightStor Hierarchical Storage Manager. Attackers can exploit the holes to inject arbitrary code or crash the service. An update has been released to close the holes. Whilst the CA advisory does not provide any details of the vulnerabilities, it does categorize the risk as critical. The vendor indicates that the CsAgent service does not check the length of some commands adequately. In addition, the software does not correctly check integer values it receives, which can result in buffer overflows. The result of the insufficient validation of strings in SQL statements remains unclear."
Security

Submission + - Uninvited remote maintenance via AIM [Update] (heise-security.co.uk)

devkhadka writes: "Security service provider Core Security has released a security advisory describing vulnerabilities in AOL Instant Messenger (AIM). The instant messaging software uses Microsoft's HMTL library mshtml.dll to display messages, but fails to adequately sanitise incoming messages, allowing attackers to execute arbitrary commands on AIM users' computers."
Security

Submission + - Picture theft through hole in Google's Picasa (heise-security.co.uk)

devkhadka writes: "The finders of the URI holes in Firefox and Windows are now targeting Google. In their blog, Billy Rios and Nate McFeters have described how attackers may steal all pictures organised using Google's picture gallery software Picasa from users' hard disks: It seems that they were able to load pictures from a PC onto a manipulated web server by combining various attack methods, such as cross-application scripting, cross-site scripting, URI tricks and a flash with ActionScript."
Security

Submission + - Deceptive file names under Vista (heise-security.co.uk)

devkhadka writes: "An Attackers can use Unicode character under Vista to conceal filenames and filename extensions. A demonstration by Max Ried makes an executable screen-saver file (.scr) look like a harmless image (.jpg).The display of the false filename is due to the inclusion of Unicode control characters that change the direction of writing. These are required for the Arabic language where writing runs from right to left. Unicode recognizes the control characters (PDF) right-to-left override (RLO, 202E) and left-to-right override (LRO, 202D) to switch the writing direction. more about this:
demonstration here"

Security

Submission + - Numerous holes in CA's ARCserve Backup for Laptops (heise-security.co.uk)

devkhadka writes: Computer Associates reports the discovery of numerous vulnerabilities in its ARCserve enterprise backup solution for laptops and desktops. Attackers can exploit these holes to gain remote control of a management PC and cause it to crash. The vendor says that client installations are not affected. Users can now download an update that remedies the flaws. Whilst CA only speaks of five vulnerabilities in its security advisory, iDefense asserts that around 60 stack and heap overflows can occur during the handling of certain arguments and commands in the LGserver on port 1900 alone more
Security

Submission + - Vulnerabilities in IBM Tivoli Storage Manager (hyperphp.com)

devkhadka writes: IBM has discovered of two security holes in its Tivoli Storage Manager backup software. One can exploit these vulnerabilities to inject arbitrary code or gain access to sensitive information. The vendor has provided updates that remedy the problem. IBM's security advisory does not provide any details, but merely states that a buffer overflow in the Client Acceptor Daemon (CAD) can cause the operating system to crash or allow injected code to be executed. Furthermore, attackers can exploit backups initiated by the server to gain unauthorized access to data on the client computer. more
Security

Submission + - Oneline HTML can crash IE 6 and 16% still using it (hyperphp.com) 4

devkhadka writes: "A Japanese blogger who goes by the name Hamachiya2 has discovered a single line of HTML and CSS that crashes IE 6. The line is:

<style>*{position:relative}</style><table><input></table>

you can click here to try it out. The code is rendered correctlyin Firefox, Safari and Opera (didn’t get a chance to tryany other browsers, butpresumably they work too). But in IE 6 it raises a fatal error in mshtml.dll.but From my surverydone by Devkhadka Tech centre for nerds shows stil there are 16.28 % of the users using IE 6.

See the detail of the survey"

Security

Submission + - User tracking with SSL certificates in Firefox (heise-security.co.uk)

devkhadka writes: Security specialist Alexander Klink has described a way to identify PCs remotely by means of a kind of super cookie. At the moment, it seems that PCs can only be detected by this means if Firefox is configured as the default browser. The "cookie" is based on TLS Client certificates generated by means of "Signed Public Key and Challenge" (SPKAC), which are saved locally when a specially prepared website is visited. ttp://www.heise-security.co.uk/news/96239

Slashdot Top Deals

New York... when civilization falls apart, remember, we were way ahead of you. - David Letterman

Working...