Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Submission + - AntiSec Hacks FBI Laptop, Leaks Over a Million iOS Device UDIDs (paritynews.com)

hypnosec writes: Anonymous affiliated hacking collective Antisec has leaked more than a million records of Apple iOS Unique Identifies (UDIDs) that were present on an FBI laptop. The hackers have posted their message on a Pastebin whereby they have explained their motive behind the hack and how did they get hold of these records. Giving a reference to July 2012 NSA's General Keith Alexander speech at DefCon, whereby he urged hackers to help out the government in securing the Internet. The hacking collective said, “We decided we'd help out Internet security by auditing FBI first.”

Submission + - Porting linux to device 3

aust.petrol writes: Hello — I'm getting an old Symbol PDT 8146, and I was wondering if anyone had any tips on how to reverse engineer Linux for it?

I've tried looking for premade distributions, and nobody has done it. I've been programming for years, some C, no Kernel coding though.

Does anyone have any experience with this? What are the major hurdles? How does one test the builds on the device?

The version of Pocket PC that comes with them is too old for my purposes, but it's basically a little PC with a barcode scanner and wifi, which is exactly what I'm after for my project!

Thanks!

Comment Re:Can they come to Hong Kong? (Score 1) 96

This is just a political show. You can see from the pictures, those picking up plastics are civilians, not any government official. WSJ is like millions other media wanting to please local governments with mild reporting, but this is the best English source I could find. Local news has much better insight on that.

The HK Government responded AFTER a month of media coverages and civilians' volunteering activities. When reporters questioned the number collected, the officials immediate revised the number to "collected some of the plastic pellets that has been spilled", and explained that the revision is due to including sands into the calculation of weight (if that is not intentional deceiving I don't know what is). Nevertheless, reporters' request to check the pellets collected were denied because they have already been "disposed of".

Well none that anybody would concern anymore but I just wish you to know.

Comment Can they come to Hong Kong? (Score 3, Informative) 96

After a cargo accident, millions of tiny white plastic pellets have been washing up on the Hong Kong's shores. No authority, no government cares. Civilians voluntarily organize cleaning up activities every weekend and the situation is still catastrophic. Uncountable fishes have their stomachs stuffed with plastic pellets, but Hong Kong Government still insists that those fishes are harmless and safe to eat. Those fishes are dying of staving because they couldn't take any more real food, and the Government only cares about whether it is safe to eat them.

Sadly, environmental disasters effect everyone in the same planet but they would hardly raise mass concern.

Comment I'm heading for similar path so my advise is (Score 1) 260

First reference: One Professor taught you long time ago. He definitely not remembers you but you may visit him and invite him to lunch for a brief chat. He would be gratefully referring you if you told him your research plan. You may even get valuable opinions from them.

Alternatively, if all professors taught or supervised you were retired or dead, as in my situation, you may ask around if you happened to have any friends that attended higher level of academic with honors, and ask them to help.

It would be nice to find two profs for your reference. Failing that you could find one friend, or your previous boss, who is doing good in your field of research as your second reference. Unless otherwise specified, they may not expect second reference to be very academic.

Regardless of what other respondents said, a PhD is very useful title anywhere in the world: you could devote yourself into research if you happened to discover a good topic of your interest, or you could at least find a teaching job in a college. Most important, it would increase your chance of getting venture capital for your future startup if one of the founders has a PhD.

Comment I would be getting into trouble explosing but (Score 4, Interesting) 345

One of my clients whose company is a Android/iPhone developer was approached by Microsoft, asking them to port their applications to Windows Phone 7. They got like 2 grands for each app ported, even fart apps. This company still own the apps ported, and get all the money they receive from selling these apps, if any. Microsoft aren't buy these app, they just purely reward them for porting.

So if you asked me whether developers should support Windows Phone 8....Sure, with a fee.
Apple

Submission + - Samsung: Apple wouldn't have sold a single iPhone without stealing our tech (bgr.com)

jsse writes: "The two consumer electronics companies, Apple and Samsung, are preparing to do battle in San Jose, California next week, and now-public court documents shed light on the positions each firm is taking. As highlighted by The Wall Street Journal, Samsung’s trial brief pulls no punches in telling the court exactly where it stands regarding Apple’s repeated patent-related accusations. In short, Apple is the thief here, not Samsung. More on BGR."

Comment They researched on the wrong head (Score 0) 85

Small animals survived last five mass extinctions because they have relatively large penis, not the brains. Human dominates over other species simply because we have biggest penis, relatively to our size. Bigger penis is always been an advantage over bigger brain, in any given time of history, or party.

So you should be proud of your species dominance for having a bigger penis, no matter how small in absolute term it is; chances that it's already bigger than an average chimpanzee, in relative term.

Comment It is rape as the girl declared it (Score 1, Insightful) 612

Last year in Hong Kong, which is under common laws system, a young political activist was charged of committing rape. Throughout the trial period, no evidence of violent, unconsenual intercourse, or any trace of the victim being subjected to helpless state was presented, still the activist was successful charged and the court ruled a prima facie case.

The case was finally dropped simply because the girl dismissed the charge for unspecified reason and then disappeared. This young activist has never been so active ever since.

So no matter how you argue on insufficient evidence or legal fallacy, it is rape as long as the girl testified it is. Assange chose to flee from the prosecution because he knows better, he knows every well what would be the result if he chose to face the trial.

Comment That reminds me a grade school exam question (Score 3, Funny) 566

"Which of the following is the cleanest method to get to school?"

(in picture)
(a) Bus
(b) Car
(c) Bicycle
(d) RX-78 Gundam

My niece took this question to me and asked me if she was right choosing (c) Bicycle during examination. I told her she failed this technological challenge miserably. The correct answer should be RX-78 Gundam, which is powered by two thermonuclear reactors. Under no circumstance could any metabiological energy source beat a neutron-free, deuterium-helium-3 fusion reactor.

Her father doesn't allow me to talk to her daughter anymore.

Technophobia parents ruin kids, seriously.

Comment A Brief on Drilling corporate firewall (Score 2) 582

The following serve as an overview. You would like to do your further research.

(1) SSH client (inside) ---SSH Tunnel--> SSH server (outside, with webproxy)

This may be the simplest setup, and the client could be linux or putty on Windows; and the server could be linux or CYGWIN on Windows

(2) OpenVPN client (inside) ---OpenVPN handshake--> OpenVPN server (outside, with internet routing)

You need to setup an OpenVPN server outside. For example, I reflash a CISCO router with OpenWRT at home so that I can connect from anywhere with OpenVPN client and use home's internet. This method could drill through most firewall/proxy, because it can be configured on any port, and any protocol (TCP or UDP).

Above methods requires setting up Internet connection outside. You might want to circumvene University's security policies directly, say by malform URL request. However, I do not recommend you to do so, as it would be considered a direct attack on their firewall.

Comment Do what your vendors do (Score 1) 848

1) Inflate and scramble your codes such that they are totally incomprehensible by anyone but yourself
2) Hide expiry timers in your codes as many places as possible
3) Hand over your codes and promote them as next best thing since slice bread
4) Your gullible boss merrily decide to use your code without paying you a dime
5) Secretly remove any possibility of recovering old codes by removing the codebase backup
6) Ask for huge compensation before expiry, expect to receive stuckup noses
7) The day of expiry is the point you yell PROFIT!!!!

Slashdot Top Deals

An authority is a person who can tell you more about something than you really care to know.

Working...