Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Submission + - Adobe Flash Player 10.1 Released. Win, Mac, Linux (tekgoblin.com)

LordDfg writes: After a long wait, Adobe has finally released the Flash Player 10.1, which offers GPU Acceleration. If you have a Graphic Card [Nvidia 8400+/ATI HD Series] which supports DXVA2[Directx Video Accleration] it will accelerate flash content using it (Less load on the CPU). If you have a low end system and playing youtube HD videos is nearly impossible this simple update will make your life easier. No need for Core2Duo processor to enjoy High Defination Content on the InternetInternetInternet. Btw it also accelerates flash games. In short, anything that uses Flash will offload all the processing to the GPU.

Submission + - Adobe Forgoes Securefix For Flash 10 Goes To 10.1

An anonymous reader writes: The recent critical zero-day security flaw in Flash 10 has fast-tracked the release of Flash 10.1 today.

Flash 10.1 boasts the much anticipated H.264 hardware acceleration. Except for Linux and Mac OS:

Flash Player 10.1, H.264 hardware acceleration is not supported under Linux and Mac OS. Linux currently lacks a developed standard API that supports H.264 hardware video decoding, and Mac OS X does not expose access to the required APIs.

For me, your humble anonymous reporter, who is using Fedora Linux with a ATI IGP 340M, is very pleased that the developers of the OSS drivers have provided hardware acceleration for my GPU: "glxinfo : direct rendering: Yes", "OpenGL renderer string: Mesa DRI R100 (RS200 4337) 20090101 NO-TCL DRI2" but even if Adobe did provide Hardware acceleration H.264 on Linux, they would'nt provide it for me because they disable it for GPU's with SGI in the Client vendor string.

Adobe 10.1, with all its goodness, now gives me around 95% CPU usage as aposed to about 75% with the previous release. Good times. I anticipate my windows friends will have a much better experience.

Submission + - Adobe Goes To Flash 10.1 Forgoes Securefix For 10

An anonymous reader writes: The recent critical zero-day security flaw in Flash 10 may have fast-tracked the release of Flash 10.1 today.

Adobe 10.1 boasts the much anticipated H.264 hardware acceleration. Except for Linux and Mac OS:

Flash Player 10.1, H.264 hardware acceleration is not supported under Linux and Mac OS. Linux currently lacks a developed standard API that supports H.264 hardware video decoding, and Mac OS X does not expose access to the required APIs.

For me, your humble anonymous reporter, who is using Fedora Linux with a ATI IGP 340M, is very pleased that the developers of the OSS drivers have provided hardware acceleration for my GPU: "glxinfo : direct rendering: Yes", "OpenGL renderer string: Mesa DRI R100 (RS200 4337) 20090101 NO-TCL DRI2" but even if Adobe did provide Hardware acceleration H.264 on linux, they would'nt provide it for me because they disable it for GPU's with SGI in the Client vendor string.

Adobe 10.1, with all its goodness, now gives me around 95% CPU usage as opposed to about 75% with the previous release. Good times. I anticipate my windows friends will have a much better experience.

Submission + - Facebook Helps Promote Responsible Net Use

dward90 writes: In the wake of controversy about its privacy policies, Facebook is teaming up with the National PTA to teach children, parents and teachers about responsible Internet use. The partnership was announced Thursday at the PTA's national convention in Memphis.

The collaboration will create a comprehensive program that will reside on both web sites, and will include such subjects as cyber-bullying, Net safety, and "online citizenship." The National PTA said it will actively reach out to its 24,000 local PTAs to reach every public school in the country. Facebook is committing an in-kind contribution valued at $1 million for promotion on its site.

"Irony" isn't exactly the right word. Perhaps "hilarious".
Security

Submission + - Google Gives Microsoft 5 Days to Fix XP Zero-Day (computerworld.com)

CWmike writes: Google engineer Tavis Ormandy published attack code on Thursday that exploits a zero-day vulnerability in Windows XP. Security experts objected to the way he disclosed the bug — just five days after it was reported to Microsoft — and said the move is more evidence of the ongoing, and increasingly public, war between the two giants. Microsoft said it is investigating the vulnerability and would have more information on its next steps later on Thursday. Researchers at French security vendor Vulpen Security confirmed that Ormandy's proof-of-concept works as advertised on Windows XP Service Pack 2 (SP2) and SP3 machines running Internet Explorer 7 or IE8. Ormandy said he decided to go public because of its severity, and, 'If I had reported the ... issue without a working exploit, I would have been ignored.' He also slammed the concept of 'responsible disclosure,' a term that Microsoft and others apply to bug reports submitted privately, giving developers time to patch before the information is publicly released. Microsoft took Ormandy to task for giving it less than a week to deal with his report. And Microsoft was not the only one. Robert Hansen, CEO of SecTheory, chastised Google for claiming that the company abides by responsible disclosure when its security researchers do not. 'Their researchers are going off half-cocked,' said Hansen, who deplored Ormandy's quick publication. 'It just doesn't add up.'

Submission + - Internet Backbone Fiber Cut (softwareproblem.org) 8

An anonymous reader writes: My name is Jonathan Swift, but I don't remember my password.

Two completely unrelated groups of name servers, seven servers in total, suddenly stopped reponding to pings at the same time.

The 8-1-1 "Call Before You Dig" number is provided for the specific purpose of preventing this from happening, and not only does not offer a way to report that it atuallly just happened but is also closed tor the day.

The 9-1-1 Emergency Reponse operator got all pissed off when I tried to tell him that half of North America would find inself unable to speak to the other half should a national emergency happen right around now. They guy thought I was delusional when I struggled desperately to get him to find me a backbone Network Operations Center, then hung up on me.

But I knew my friends as Slashdot would be happy to give me some love. Please report your physical location, ping each of the following nameservers, the report whether or not each specific one responds:

I'm near the intersection of Blossom and Snell in South San Jose California..

I cannot ping any of these. I had just brought up a site for which the second group is servers. When I reloaded the page, all five of its servers failed to respond.

First
  • 209.151.88.206 — ns.ez-web-hosting.com
  • 209.151.88.216 — ns1.ez-web-hosting.com

Second

  • NS0.DNSMADEEASY.COM
  • NS1.DNSMADEEASY.COM
  • NS2.DNSMADEEASY.COM
  • NS3.DNSMADEEASY.COM
  • NS4.DNSMADEEASY.COM

When I can hunt down that gifted emergency response professional, I'm going to give him a clue as to what emergency response really is. Don't Get Me Started. Just Don't.

Botnet

Submission + - Australian ISPs to throttle, quarantine zombie PCs (itnews.com.au)

littlekorea writes: ISPs in Australia have agreed to a voluntary code under which subscribers that don't secure their PC's and become infected with malware will have their connection speeds throttled and choice of websites walled off to prevent harm spreading across the network. The code of practice improves on a draft in which ISPs would be expected to cut off zombie-infected PCs altogether .

Submission + - Prosecuting DDOS attacls 1

dptalia writes: We all have heard of major DDOS attacks taking down countries, companies, and organizations. But how many of them are ever prosecuted? And how many prosecutions are even successful?

I've done some research and it appears the answer is very few (Well duh!). And those that are successfully prosecuted tend to have teenagers as the instigators. Does this mean DDOS is a fairly safe crime to conduct? Are the repercussions nonexistent?

Does anyone have some knowledge an insight into this that I don't have? How would you go about prosecuting a DDOS attacker? As this becomes tool in the political toolbox of countries and organizations this becomes more important. So I need your help. What's your experience with getting the responsible parties to justice?

Comment Re:Wannabee fools. (Score 3, Interesting) 90

Actually, some of the features sound pretty useful to me. The claimed improvement (we will have to see, but it seems plausible) is that they do a better job integrating real office documents.

From a security standpoint, I have often wanted to be able to generate something like a one time password when logging in through a public computer.
Image

Disgruntled Ex-Employee Remotely Disables 100 Cars Screenshot-sm 384

hansamurai writes "Over one hundred cars equipped with a Webtech Plus blackbox were remotely disabled when a former employee of dealership Texas Auto Center got hold of his employer's database of users. Webtech Plus is repossession software that allows the dealership to disable a car's ignition or trigger the horn to honk when a payment is due. Owners had to remove the battery to stop the incessant honking. After the dealership began fielding an unusually high number of calls from upset car owners, they changed the passwords to the Webtech Plus software and then traced the IP address used to access the client to its former employee."

Comment Bu$ine$$ Opportunity (Score 1) 91

Dear Sir or Madaam:

My name is John Waledac. I am the designer and owner of a profitable spam company. Recently, my company has fallen upon hard times as several of our servers have broken down. We have the funds to replace these servers, but it will take several weeks to transfer the funds from our bank in Nigeria. This delay could cost our company thousands of dollars. This is where you come in. I am seeking investors to loan up to $100,000 for the purchase of new servers. When the funds from Nigeria arrive you will be reembursed with 20% interest. This whole process should be fully accomplished within 25-30 working days, further information will be given to you as soon as I receive your positive response via e-mail or telephone. If you are interest urgently reach me through the above stated email,telephone numbers to enable me give you the full details of this transaction and how it is going to work out. If you decide to invest I need you to send me

1. Your Name and Address
2. Your Telephone Number
3. The Amount You Wish to Invest
4. Your bank account number

Sincerely,

John Waledac

Tel:011234-8035647626.

NB: Kindly send further correspondence to jwaledac@fastermail.com

Comment I am Muyiwa Ige, son of the late chief Bola Ige (Score 2, Funny) 91

FROM: MUYIWA IGE

ATTN.: sir,
I got your contact through email business directory and decided to send my proposal to you. I am MUYIWA IGE the first son of the late chief BOLA IGE,the attorney general of th e fedeal rebulic of Nigeria who was killed by hired assasin on the 23rd of december 2001 by an unidentified gun men believed to be link to our government of which it is a daily case going on in my country;s dailies now.

Two months ago he was attempted to be murdered but unfortunately God speared his life for us.It was then he had to reveal some vital informations as regards his life to me before he was finally killed in december. All accounts belonging to my father both local and abroad had been frozen and his investments seized by the government believing in thier false allegation that he made away of $2 billion dollars of (NEPA)national electricity power authority of which i know is just a ploy to eliminate him by the people in power that he is fustrating thier evil intentions through the human right pubic hearing for violation of right and cruelsome killings during the military regime to carry out thier traits to suffer the mases for thier selfish interest instead of the interest of the nation.We are now in a dileman as ou live are in danger till after the investigations.

Two weeks to the christmas holiday in 2001 being on the 4th of december,my dad spoke to me at lenght about life and it realities .He told me he deposited a trunk box containing us$25.5m with a security in EAUROPE(UK) all in the aim of retrieving it himself before he was finally killed before the christmas. According to him the content of the box was registered as government classified papers with his influence and was moved out of my country through diplomatic courrier.He wanted to safeguard the funds for foriegn investment after his retirement before he was killed.

In the light of this as the next of kin i am now contacting you a foreigner to assist ME in retrieving the boxes and depositing of the fund into your foreign account hence the need to contact you. I and my mother had agreed to give you 30% of the fund for your assistance and 10% for any expenses you might incur in the course of this transaction, we want to believe that you will not sit on the money when paid into your account. I want you to understand that there is no risk involve as we have worked out modalities for the smooth actualization of this goal. The boxes presently is in a security vault of this company in their offshore office in SPAIN.i will require the following for effecting the documents of claim and identification.:

1] Your driving license to assure us of your person

2] Your private telephone and fax numbers.

I will send the following:
3] The receipt of the ware bill used in sending the boxes
4] The deposit certificate

All these will be send through YOUR FAX NUMBER then you will proceed for claim after due schedule with them.you

I wish to state here that we are left with nothing as we survive by the grace of God. I hope you understand our predicament so as to save me and my family from hopeless future (S.O.S.)

All contacts for now should be through my personal email address for security reasons.

Waiting your urgent response.

Best regards,

MUYIWA IGE.

MY PERSONAL EMAIL
ADDRESS(muyiige@mail.com)ALTERNATIVE RESPONSE

Comment Re:Interesting (Score 1) 582

So yes, religion isn't really a necessity anymore. We can easily replace it with technology. But it did have its place in the history of humanity, and it was quite important in forming our ability to cooperate in larger groups.

How can technology replace it so easily? Has human nature changed that much? I don't buy it. Technology may have advanced dramatically since "primitive" times, but people are still as selfish and prone to corruption as ever.

In the last few centuries, we have seen the printing press, great scientific advancement (calculus, physics, chemistry etc...), the computer, the internet, space travel etc. Technology has enabled massive increases in terms of food production, but the problem of poverty remains. Human trafficking is still a problem (and yes it still happens in developed countries). In the last few centuries we have also seen the atom bomb, several wars much larger than any recorded war from more "primitive" times, the holocaust etc.

Have we become so technologically advanced that we have outgrown our need for God? I think the opposite is true. In our technologically advanced age we need God more than ever.

I am not arguing the technology is a bad thing, it can certainly help us enforce basic laws. However, it is no replacement for God, morality or religion.

Comment Re:It's time to play... Name That Person! (Score 1) 65

In the original netflix competition the data they did not release birthdays, zip codes or gender. Every movie and user was given a unique (presumably random) id. Essentially the data you had to work with was a bunch of tuples:

(movie id, user id, rating (1-5), date)

Netflix claims they even added some random noise (changing the dates/ratings a little bit) to preserve anonymity. Turns out even this isn't enough to guarantee anonymity...you can cross reference this data with IMDB to look for similar date/ratings patterns and re-identify a lot of the people.

See the paper: How to break the Anonymity of the Netflix Prize dataset

Comment Re:Munge the privacy info (Score 1) 65

See the paper "How to Break the Privacy of the Netflix Prize Dataset"

I disagree that Netflix did it right. We live in a day and age where there are many sources of auxiliary information publicly available (IMDB, voter registration, etc...). Any attempt to preserve anonymity must take this into account. All to often companies leave out specific pieces of information (name, DOB, Zip Code etc...) and hope that what remains is anonymous. No one could ever identify me based on just a couple of movie ratings, right?

Slashdot Top Deals

"Protozoa are small, and bacteria are small, but viruses are smaller than the both put together."

Working...