Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Submission + - Lenovo Accused of Pushing Self-signed MITM Proxy (zdnet.com) 2

jones_supa writes: More OEM crapware coming at you. Chinese hardware manufacturer Lenovo has come under fire for allegedly shipping consumer Windows laptops with software that hijacks secure website connections, as well as inserting ads into search results. The software is called "Superfish" and it installs its own self-signed root certificate authority. Superfish comes with Lenovo consumer products only, and is a technology that helps users "find and discover products visually". The technology instantly analyzes images on the web and presents identical and similar product offers. Google's Chris Palmer has been analyzing the issue on a Yoga 2 laptop. He has confirmed with one other affected user that the certificates used share the same key, which leaves any impacted Lenovo user vulnerable to an attack from anyone able to extract the certificate's private key, with the user left without any warning or notice of such an attack. Superfish can be uninstalled, but it reportedly leaves the root certificate authority behind. On a new laptop, the software can be disabled simply by not accepting the Terms of User and Privacy Policy on initial setup.

Comment Re:Early fragmentation (Score 1) 492

while there were various decent, proprietary, dialects that let you actually write code that did stuff, *standard* Pascal was as much use as a chocolate teapot

And that's still a problem today. There's no standard for OO Pascal, and the ANSI Pascal standards have been moribund since 1990.

That's why I abandoned Pascal (and Modula-2): I didn't want to get locked in to a single vendor.

Comment Line printers (Score 3, Interesting) 790

Others have already mentioned the dot-matrix printer, but there was a big one before that: the high speed line printer. They were too expensive for individuals, but they certainly were a familiar sound to 1970s programming students like me.

There were two main types: the drum printer and the chain printer. The drum printer was cheaper and therefore much more common. The drum, which contained all the characters in a given font, rotated once for each row printed. An entire row was printed simultaneously; a separate solenoid-driven hammer in each column fired at the right instant to print the desired character in that column. You could easily tell from across the room whether your program had failed to compile or if execution ended with a core (!) dump. The burst pages between jobs had their own highly characteristic sound.

A related sound is that of ripping fanfold line printer paper to separate jobs. Who uses any kind of fanfold paper these days? Or even paper...?

Oh, and let's not forget the sound of the Hollerith (IBM punch card) reader...

Crime

Finnish KRP Questions Suspected Lizard Squad Member 62

An anonymous reader writes Coming on the heels of the UK arrest of Vinnie Omari, Yle reports that Finnish police have interviewed "Ryan", the Finland-based hacker reportedly responsible for hacking the PlayStation and Xbox networks on Christmas day, but have not arrested him — contrary to reports in the international media (such as Washington Post). Lizard Squad had tweeted that the Finland-based hacker had been detained. Chief Inspector Tero Muurman of Keskusrikospoliisi (Finnish National Bureau of Investigation) confirmed Yle that reports of "Ryan" having been detained were wide of the mark. He had been interviewed at the start of the week, but then released. Finnish police are continuing their probe and co-operating closely with the FBI.
Portables (Apple)

Thunderbolt Rootkit Vector 163

New submitter Holi sends this news from PC World: Attackers can infect MacBook computers with highly persistent boot rootkits by connecting malicious devices to them over the Thunderbolt interface. The attack, dubbed Thunderstrike, installs malicious code in a MacBook's boot ROM (read-only memory), which is stored in a chip on the motherboard. It was devised by a security researcher named Trammell Hudson based on a two-year old vulnerability and will be demonstrated next week at the 31st Chaos Communication Congress in Hamburg.

Comment Are they still down? (Score 4, Insightful) 360

Is NK still off the net? About a half hour ago I had no trouble reaching the sites www.kcna.kp - 175.45.177.74 / 175.45.176.71 naenara.com.kp - 175.45.176.67 / 175.45.177.77 According to https://www.northkoreatech.org..., both sites are physically hosted inside North Korea. I see that both are in the 175.45.176.0/22 block that whois says is assigned to North Korea, and traceroute shows an extra latency (satellite hop?) for that network past China. Is that their only net block? A /22 is 1024 addresses, which I keep hearing is the total number for the entire country.

Slashdot Top Deals

Why did the Roman Empire collapse? What is the Latin for office automation?

Working...