Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:uhhhhh (Score 1) 6

I had a clean netbook directly connected to the modem with no other machines connected physically. Wireless was off. The gateway was 192.168.0.1, my netbook's ip was 192.168.0.2. There were two other addresses 192.168.0.101, and 192.31.80.30. I do not know where they come from. It was not from any of the family's machines, because they were not connected (wireless was off). My netbook is clean, and it had never been connected to their network until I visited. We are monitoring the IPCop box remotely, and there are still attempts by 192.168.0.101 to connect to an address (the attempts are recorded by IPCop's intrusion detection module and blocked.)

Submission + - Your Personal Emails At Work May Be Private (lexology.com)

ICLKennyG writes: Many are aware that what you do at work on your work computer is subject to being discovered and owned by your employer. The Supreme Court of New Jersey has reversed course and found a reasonable expectation of privacy in using personal, password-protected web-based email to communicate with a lawyer. It is unclear if this is a state specific anomaly or the beginning of a shift where computers are considered so ubiquitous that privacy is expected in personal communications.

Submission + - Possible New Homonid Species Remains Discovered

mindbrane writes: The BBC is reporting on fossil finds "...uncovered in cave deposits near Malapa in the Cradle of Humankind World Heritage Site near Johannesburg." The fossils of a mature female and juvenile male have "...small teeth, projecting nose, very advanced pelvis, and long legs..." suggesting more modern forms. "And yet its very long arms and small brain case might echo the much older Australopithecine group to which Professor Berger and colleagues have assigned it."

Aside from the debate as to classification the find is note worth in that it's discovery came about "...thanks to the "virtual globe" software Google Earth, which allowed the group to map and visualise the most promising fossil grounds in the World Heritage Site." Further the find in a cave bears the hallmarks of chance that often plays so large a part in fossilisation. "Their bones were laid down with the remains of other dead animals, including a sabre-toothed cat, antelope, mice and rabbits. The fact that none of the bodies appear to have been scavenged indicates that all died suddenly and were entombed rapidly.

"We think that there must have been some sort of calamity taking place at the time that caused all of these fossils to come down together into the cave where they got trapped and ultimately buried,""
Windows

Submission + - Windows 7 service pack leaked to torrent sites (techworld.com) 1

superapecommando writes: An early build of Windows 7's first service pack has been leaked, leading to thousands of downloads on a whole host of various torrent websites.
As with every Windows operating system (OS) release, improvements and fixes often arrive in the form of a service pack, and only last month the Windows team discussed the upcoming Windows 7 SP1 release in a blog post. The team detailed that the first service pack would feature a number of minor updates for the popular OS. However, it is worth noting that the Windows team did not mention a final release date for the completed service pack.

Submission + - Lab-on-a-Chip Can Carry out Complex Analyses Quick (sciencedaily.com)

Trintech writes: Two years ago we read about a team of BYU engineers and chemists that created an inexpensive silicon microchip to reliably detects viruses, even at low concentrations. Now it seems a new Lab-On-A-Chip system, developed by Fraunhofer research scientists, can carry out complex analyses on the spot and will soon be ready for the market. The core element of this new chip is a disposable cartridge made of plastic which can be fitted with various types of sensors. To perform an assay, the doctor only has to place the relevant substances (reagents, etc) into the cartridge and the test then takes place automatically. It is the researcher's hope that, by using this chip, medical patients will be able to get their lab results in a matter of minutes instead of days.

Submission + - Ask Slashdot: Are Qwest's Modems Compromised? 6

Ironlenny writes: A friend and I spent the day working on a families network with Qwest Business connection. This family had be notified a week prior by Qwest that they were part of a botnet and as such were no longer allowed access to the network. After talking with customer service, the connection was reinstated, but they continued to receive email notifications. There was also an attempt by a third party to gain account information over the phone during this period (he was calling from an unidentified number). My friend ran several malware removal tools (Spybot Search & Destroy, Ad-Aware, AVG from a rescue disk, and others I don't remember), all scans were clean. He also ran Trend Micro's RUBotted on all the machines from the day they had their connection suspended up to today, and nothing was found. There is no unusual internal network activity. As far as we can tell, none of the machines are infected with anything.

Qwest was still saying that the family is running a bot net. When asked for, Qwest did provided a log of the suspicious activity. There are only three IP addresses in the logs. They all resolve to the same domain in the same German city. It appears that the domain is registered with T-Mobile. What is interesting is when we were checking the modem settings, we found two IP addresses that were unaccounted for (the family was using the modem as a wireless router). I used nmap to probe the suspect addresses. One address was 192.168.0.101 (unusual because it was far larger than the other address on the network), and the other was 192.31.80.30. 192.31.80.30 was listening on port 53 which (in my limited research) appears to be associated with a the ADM Worm. 192.168.0.101 had four ports open: 2869 (UPnP?), 3389 (MS Terminal Service), 4224 (xtell messaging service), and 8292. Port 8292 seemed to be querying several different protocols: SMB, LDAP, DNS, and X11. There was more in nmap's dump for the port, but those were the protocols I could identify off hand. Those two addresses were present and resolvable when only my Ubuntu netbook (which is clean and had never been connected to their network before) was physically connected to the modem and the WiFi radio was off.

While I was running the port scans, my friend was talking with Qwest Tech Support. During the course of the conversation, it was mention by Tech Support that they had received numerous complaints about connection issues related to botnets similar to our problem (this from what I overheard and what my friend told me.) I should also mention that we tried three different modems, all different models, and the same two address came up. On one of the modems, we actually had more than the two abnormal addresses, but I didn't run any scans on those. Our final solution was to use the modem in transparent bridge mode, with an IPCop box connecting directly to Qwest's servers.

I have three questions: Is it possible that Qwest's modems have been compromised and are being used to propagate botnets? Were we through enough in our investigation, or did we miss a step which could have led us in another direction? If the modem is compromised, will operating it in transparent bridge mode render the vulnerability moot?
Space

Spectrum of Light Captured From Distant World 32

An anonymous reader writes with this excerpt from Cosmos: "Astronomers have made the first direct capture of a spectrum of light from a planet outside the Solar System and are deciphering its composition. The light was snared from a giant planet that orbits a bright young star called HR 8799 about 130 light-years from Earth, said the European Southern Observatory (ESO). ... The find is important, because hidden within a light spectrum are clues about the relative amounts of different elements in the planet's atmosphere. 'The features observed in the spectrum are not compatible with current theoretical models,' said co-author Wolfgang Brandner. 'We need to take into account a more detailed description of the atmospheric dust clouds, or accept that the atmosphere has a different chemical composition from that previously assumed.' The result represents a milestone in the search for life elsewhere in the universe, said the ESO. Until now, astronomers have been able to get only an indirect light sample from an exoplanet, as worlds beyond our Solar System are called. They do this by measuring the spectrum of a star twice — while an orbiting exoplanet passes near to the front of it, and again while the planet is directly behind it. The planet's spectrum is thus calculated by subtracting one light sample from another."
First Person Shooters (Games)

Duke Nukem Forever Not Dead? (Yes, This Again) 195

kaychoro writes "There may be hope for Duke Nukem Forever (again). 'Jon St. John, better known as the voice of Duke Nukem, said some interesting words during a panel discussion at the Music and Games Festival (MAGFest) that took place January 1 – 4 in Alexandria, Virginia, according to Pixel Enemy. Answering a question from the crowd regarding DNF, St. John said: "... let me go ahead and tell you right now that I'm not allowed to talk about Duke Nukem Forever. No, no, don't be disappointed, read between the lines — why am I not allowed to talk about it?"'"

The Definitive Evisceration of The Phantom Menace *NSFW* 629

cowmix writes "When TPM came out ten years ago, its utter crappiness shocked me to the core and wounded a entire generation of geeks. My inner child had been abused and betrayed. I moped around, talking to no one, for almost two weeks. I couldn't bring myself to see #2 or #3, whatever they were called. Now, a decade later, comes Star Wars: The Phantom Menace Review, the ultimate, seven-part, seventy minute analysis of this mother of all train wrecks. Not only does it nail how the film blows, but tells us why. Time, apparently, does not heal all wounds." Or, if you prefer all 7 parts embedded in one page, you can check out slashfilm's aggregation.
Math

Insurgent Attacks Follow Mathematical Pattern 181

Hugh Pickens writes "Nature reports that data collected on the timing of attacks and number of casualties from more than 54,000 events across nine insurgent wars, including those fought in Iraq between 2003 and 2008 and in Sierra Leone between 1994 and 2003, suggest that insurgencies have a common underlying pattern that may allow the timing of attacks and the number of casualties to be predicted. By plotting the distribution of the frequency and size of events, the team found that insurgent wars follow an approximate power law, in which the frequency of attacks decreases with increasing attack size to the power of 2.5. This means that for any insurgent war, an attack with 10 casualties is 316 times more likely to occur than one with 100 casualties (316 is 10 to the power of 2.5). 'We found that the way in which humans do insurgent wars — that is, the number of casualties and the timing of events — is universal,' says team leader Neil Johnson, a physicist at the University of Miami in Florida. 'This changes the way we think insurgency works.' To explain what was driving this common pattern, the researchers created a mathematical model which assumes that insurgent groups form and fragment when they sense danger, and strike in well-timed bursts to maximize their media exposure. Johnson is now working to predict how the insurgency in Afghanistan might respond to the influx of foreign troops recently announced by US President Barack Obama. 'We do observe a complicated pattern that has to do with the way humans do violence in some collective way,' adds Johnson."

Slashdot Top Deals

Never ask two questions in a business letter. The reply will discuss the one you are least interested, and say nothing about the other.

Working...