Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security

Submission + - Zone-H.org domain got hijacked

Willem de Groot writes: "The domain of Zone-H, a major archive of website defacements, got hijacked today at 12:15:26 UTC. The crackers changed DNS servers and are directing traffic to an US server instead of the Estonian Zone-H servers. It is as yet unclear how the crackers could achieve control of the domain. The old http://www.zone-h.org/ site (at 213.219.122.11) doesn't mention anything about the hijack yet."
XBox (Games)

Submission + - No, You Can't Stream Any IPTV Content over Xbox

An anonymous reader writes: During Microsoft's CES keynote, Bill Gates and his cohorts announced the new Microsoft TV IPTV Edition and demonstrated some of its more compelling features. At the end of that segment, the Microsoft presenters let us know that their IPTV demonstration was performed on an Xbox 360. The audience cheered. They cheered because they assumed you could use an Xbox 360 to deliver any old IPTV content to the television. You can't. It only works if you subscribe to an ISP that provides services using Microsoft TV IPTV Edition. Even then, you can only watch that provider's content, not any old TV show streamed over the Internet.
The Internet

Submission + - The Death of Domain Parking

Anonymous Coward writes: "Is Richard Rosenblatt, the former MySpace CEO, about to revolutionize the domain industry? Quote: "I thought, it can't be that easy. So I talked to some domainers, and they said, 'We own 300,000 domains, we make $20 million a year, we have just four employees and some servers in the Caymans.'" Rosenblatt wants to use millions of currently unused domains to create a new vertical Web 2.0 empire.

http://www.dailydomainer.com/news/200733-200733-de ath-of-domain-parking.html"
Google

Submission + - Indians use Google Earth, GPS to protect Amazon

Damien1972 writes: "Deep in the most remote jungles of South America, Amazon Indians are using Google Earth, GPS, and other technologies to protect their fast-dwindling home. Tribes in Suriname, Brazil, and Colombia are combining their traditional knowledge of the rainforest with Western technology to conserve forests and maintain ties to their history and cultural traditions. Indians use Google Earth to remotely monitor their lands by checking for signs of miners and GPS to map their lands. "Google Earth is used primarily for vigilance," Vasco van Roosmalen, program director of a nonprofit involved in the project."
Microsoft

Submission + - Copyleft vs Zune

Tag writes: "Microsoft's competitor to the iPod is proving to be quite the controversy. One point that has been brought up is Zune's ability to wirelessly transfer songs, allowing the recipient to play the song 3 times before it is locked out by Microsoft's DRM (Digital Rights Management) that is added to the file for wireless transfer. This seems like a "wicked smaht" solution to the ongoing bickering by the RIAA & the 'Napsterites'. My problem with this, is if I record my own album and put it onto my Zune, and my music is under a license resembling the Copyleft, providing for the free transfer of music, without allowing the license to change, will Microsoft's DRM violate my rights? Technically it would take my license, and put Microsoft's DRM "3 Play" on it. The best analogy to this is a program under the GNU license, or equivalent being given to someone as shareware (x days before it no longer works). Comments?"
Privacy

Submission + - Hacking my Passport

choongiri writes: "I recently renewed my UK passport, and the new one contains an RFID chip. I have read lots of discussion here and elsewhere about the potential security implications of RFID in passports, and that got me wondering — what would it take to hack my passport? I know very little about how RFID works, so how would I go about reading the data that is held on my passport, and testing it to see if it can really be read with the cover closed, from across the room, and so on? Have any slashdotters tried reading their own passport RFID chips? Finally, is it really true that I could microwave my passport for a couple of seconds to deactivate the chip, and what would the implications of this be for me crossing borders. I live in Canada, so crossing into the US is an issue."
Security

Submission + - How to Buy a 65" Plasma TV for $.99

An anonymous reader writes: Think your website is secure? Think again. Many hosting companies still provide their clients with older, insecure shopping carts. Hacking these carts is trivial, even though Visa and Verisign call them "secure." This article discusses common vulnerabilities in many shopping carts. Check your site before the Christmas rush begins.
Software

Submission + - IOmega Backup software fails to recover files

An anonymous reader writes: If you back up your files using IOmega, you might think your data is safely secured. But if you happen to choose to compress the backup files (i.e. the default) option, your data will be saved into a format which can't be uncompressed without a configuration file that's stored on your primary HD (i.e. the one that just crashed). You can read about this on IOmega's customer support forum:

http://www.iomegasupportforums.com/phpbb2/viewtopi c.php?t=2453&highlight=recover

I've included the first exchange because I think they will probably remove this thread if it gets too much notice. First, the desperate customer:

"I have my entire hard drive backed up to an external hard drive using Iomega Automatic Backup Pro. Just a few days ago my hard drive crashed, had to get a new hard drive. When I go to recover my files it cant find the configuration files. I did some research and very very oddly....the files required to retrieve my backup were on the hard drive that was backed up and now crashed. Defeating the entire purpose of a backup software. What can I do now to recover my files since the configuration files were destride on the origional drive? Please help!"

Now, the not-so-helpful (nor literate) tech-support:

"If you backed up your files using IAB pro with the compress option. If you moved any of the files on the drive or off the drive then there isn't a way to recover the files. Next time you do a backup make sure you are not compressing the files.

Did you move any of the files on the drive where you backed up the files to?"
Networking

Submission + - OpenSSH Server Ported to Windows CE

An anonymous reader writes: WindowsForDevices is reporting that the OpenSSH server has been ported to Windows CE, enabling secure remote access to a Windows CE-based device using the SSH (secure shell) protocol. It's currently released at version 0.0.1, under a BSD-style license, and is available in source and binary form on Microsoft's Codeplex, SourceForge-like code sharing website.
Announcements

Submission + - Google sponsors LinuxBIOS project

coresystems writes: Stefan Reinauer from coresystems GmbH announced in his posting to the Google Code Blog that Google is sponsoring LinuxBIOS development.

The sponsoring includes the creation of an automated distributed firmware testing environment for LinuxBIOS.

Thanks to the One Laptop Per Child project (OLPC), LinuxBIOS developers expect the project to break the barrier of 10 million users out there in 2007, said Stefan Reinauer.

Babylon 5 Direct-To-DVD Project In Production 194

ajs writes "As previously announced, 'Babylon 5: The Lost Tales' is a direct-to-DVD project based on the popular series from the mid-1990s. Lost Tales first DVD, titled 'Voices of the Dark' has now begun production. As usual, J. Michael Straczynski and Doug Netter will be running the show with Straczynski directing. The characters, President John Sheridan (Boxleitner), Captain Elizabeth Lochley (Scoggins) and the technomage Galen (Woodward) are returning. The Lost Tales is an anthology series of sorts with two movies (previously three) per DVD starting in 2007. Straczynski has commented on Usenet that a more CG-intensive installment is coming in the next batch, featuring the character of Michael Garibaldi (Doyle)."

Slashdot Top Deals

FORTRAN is not a flower but a weed -- it is hardy, occasionally blooms, and grows in every computer. -- A.J. Perlis

Working...