Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security

Microsoft Says Other OSes Should Imitate UAC 493

COA writes "Many Vista adopters find User Account Control irritating, but Microsoft thinks it's an approach other OSes should emulate. Microsoft Australia's Chief Security Adviser Peter Watson calls UAC a great idea and 'strategically a direction that all operating systems and all technologies should be heading down.' He also believes Microsoft is charting new territory with UAC. 'The most controversial aspect of Watson's comments all center around the idea that Microsoft is a leader with UAC, and that other OSes should follow suit. UAC is a cousin of myriad "superuser" process elevation strategies, of which Mac OS X and all flavors of Linux already enjoy. The fact is that Microsoft is late to the party with their Microsoftized version of sudo. That's really what UAC is, after all: sudo with a fancy display mechanism (to make it hard to spoof) and extra monitoring to pick up on "suspicious" behavior.'"
Software

Why Desktop Email Still Trumps Webmail 340

p3net writes "Shortly before the release of Thunderbird 2.0 RC1, Wired held an interesting interview with Scott MacGregor, the lead developer of Thunderbird. He presents some views as to why desktop email clients still triumph, even in this much-dominated web age. 'Some users want to have their data local for privacy and control. Furthermore, you can integrate data from different applications on the desktop in ways that you can't do with web-based solutions, unless you stick to web solutions from a single provider. For example, you can use your Outlook address book with Thunderbird. We'd like to continue to expand the kinds of data you can share between Thunderbird and other apps (both web and desktop applications).'"
Education

Is The Term Paper Dead? 444

Reader gyges writes in to tell us that the Washington Post has picked up a piece he wrote about cut-and-paste plagiarism: "Plagiarism today is heavily invested with morality surrounding intellectual honesty. That is laudable. But truly distinguishing plagiarism is a matter of intent. Did I mean to copy, was it accidental (a trick of memory), was it polygenesis[?] ... Young people today are simply too far ahead of anything schools might do to curb their recycling efforts. Beyond simply selling used term papers online, Web sites such as StudentofFortune.com allow students to post specific questions and pay for answers." The author argues that in the era we're entering, schools need to rely far less on term papers in assessing students.

Softening the Edges of Technology 122

Tired of the generic grey boxes that fill corporate offices? A New York Times piece looks at the efforts by some hardware resellers to soften the edges of the PC with elements from nature. The piece goes over the efforts of places like Suissa Computers, which offers 'desktop computers in cases of oak, walnut, zebrawood, purpleheart, mahogany, maple and leopardwood'. Likewise, Holzkontor of Neustadt and the company Wood Contour offers keyboard and monitor sets that adds a naturalistic touch to the average soulless desktop setup. They don't just touch on commercial options, talking briefly about homebrew case-mods: "Nicholas Falzone, 20, a third-year architectural student at California Polytechnic State University in San Luis Obispo, Calif., is just putting the finishing touches on the second computer case he's made. 'It's taken me at least a thousand hours,' he said. The case has an aluminum interior frame to support the computer workings. The outer frame is made of koa and maple. Mr. Falzone did the rough cuts with a table saw; after that, almost all the work was done with hand tools. 'Each joint has multiple mortises and tenons,' he said. 'I didn't use any screws or glue.'" Interesting to see the beautification of PC cases in the pages of the old grey lady.
Businesses

How to Stop the Dilbertization of IT? 412

Alien54 writes "In the simplest terms: too many IT workplaces have become Dilbertized -- micromanaged, bureaucratic and stifled creatively. It's become an environment where busy work is praised and morale is low. How is it possible to bring IT's appeal back? 'IT professionals that have worked in the field for a long time often speak about a shift in their work where they have gone from tossing ideas back and forth to make for better technology solutions to fighting fires all day. "There's less emphasis on creativity, and more on maintenance. Tweak this, work on this ... In being reactive not proactive, everything is a crisis. Something has to be done right now, putting out fire after fire, going a long way to making IT a less pleasant environment," said Skaistis. Beyond making for a unpleasant work environment for the techies already in-house, this firefighting serves as a warning to potential recruits: you will not like this job.'"
Security

Remote Exploit Discovered for OpenBSD 338

An anonymous reader writes "OpenBSD is known for its security policies, and for its boast of "only one remote exploit in over 10 years". Well, make that two, because Core Security has found a remotely exploitable buffer overflow in the OpenBSD kernel. Upgrade your firewalls as soon as possible."
Music

EMI — Ditching DRM is Going To Cost You 220

33rpm writes "EMI has told online music stores that selling its catalog without DRM is going to cost them a lot of money. 'EMI is the only major record label to seriously consider abandoning the disaster that is DRM, but earlier reports that focused on the company's reformist attitude apparently missed the mark: EMI is willing to lose the DRM, but they demand a considerable advance payment to make it happen. EMI has backed out of talks for now because no one will pay what they're asking.'"

Upside Down Phone Patent 291

An anonymous reader noted that "A patent has been filed for the "Upside Down Phone", which features the keypad on top and the screen on the bottom. The idea behind the upside down phone is, apparently, to allow faster texting by have a more comfortable position for the thumb to work from. A quick check of this seems to confirm the theory, making this one of those "Why didn't I think of that?" moments."
Perl

XML::Simple for Perl Developers 186

An anonymous reader writes "XML has become pervasive in the computing world and is buried more and more deeply into modern applications and operating systems. It's imperative for the Perl programmer to develop a good understanding of how to use it. In a surprisingly large number of cases, you only need one tool to integrate XML into a Perl application, XML::Simple. This article tells you where to get it, how to use it, and where to go next."
Security

25 Percent of All Computers in a Botnet? 408

Beckham's_Ponytail writes to mention an Ars Technica article, with some disturbing news out of the World Economic Forum in Davos, Switzerland. Vint Cerf, one of the 'fathers of the internet', has stated that the number of botnets online is larger than believed. So large, in fact, that he estimates that at this point one in four computers is infected with botnet software. We've discussed the rise of botnets numerous times here on Slashot, but the image of 150 million infected computers is more than a little bit sobering. With the extremely lucrative activities that can be done with botnets (such as password ripping, spamming, DDoSing), as well as reports of organized crime adopting 'cyber-terrorism' as a new line of income, is it likely that law enforcement will ever be able to curb this particular bane?
Microsoft

Why South Korea Is Shackled To Windows 252

baron writes with a blog post explaining in detail why 99.9% of S. Korea uses Windows. This amazing tale began in 1998 when Korea decided it couldn't wait for SSL to be standardized (which it was in 1999) and commissioned an ActiveX control for secure Web transactions. At first there was a secure Netscape plugin too, but we know how that story ended. Quoting: "This nation is a place where Apple Macintosh users cannot bank online, make any purchases online, or interact with any of the nation's e-government sites online. In fact, Linux users, Mozilla Firefox users, and Opera users are also banned from any of these types of transactions..." Now that Microsoft has made ActiveX more secure in Vista, every Web site in S. Korea is scrambling to get things working again and the government is advising citizens not to install Vista. At the end of all this work, they will still be a monoculture in thrall to Microsoft, with millions of users sitting behind some of the fattest pipes in the world.
Yahoo!

Yahoo Mail Forcing Ads Through Adblock? 291

egNuKe asks: "Like some people here, I use Firefox and Adblock. I've blocked the ads that Yahoo puts in my inbox, however the next time I opened it, I've found other ads, and blocked them too. This happened for several times, until I figured out that Yahoo must have some script that checks if the ad is displayed and displays another one, if it hasn't. This is no big problem, I just needed to add several rules to Adblock to block the several ad sources they use. Here is the problem: when Adblock is running and effectively stopping Yahoo mail ads, Firefox would freeze (all open windows and tabs) for about 15 seconds. Then the page opens and there is no ads. The script must be on client side, since it's the browser that's freezing and not the network. Turning off Adblock solves the freezing problem. Is there a cure for this?" This is a touch-and-go issue as it basically boils down to the user's priority (not seeing ads) versus the services priority (displaying the ads it needs to allow the user to enjoy a free service). It was only a matter of time before someone thought to try and work around ad-blockers, and all this will eventually lead to is open warfare (competing Javascript or browser code in the browser) on your machine. Instead of working around the workaround, why not consider another service that doesn't inundate you with ads?
Security

Department of Defense Now Blocking HTML Email 262

oKAMi-InfoSec writes "The Department of Defense (DoD) has taken the step of blocking HTML-based email. They are also banning the use of Outlook Web Access email clients. The DoD is making this move because HTML messages can easily be infected with spyware and executable lines of code that enable hackers to access DoD networks, according to an article in Federal Computer Week by Bob Brewin . A spokesman for the Joint Task Force for Global Network Operations (JTF-GNO) claims that this is a response to an increased network threat condition. The network threat condition has risen from Information Condition 5 to Information Condition 4 (also called Infocon 4). InfoCon 5 is normal operating conditions and Infocon 4 comes as a result of 'continuing and sophisticated threats' against DoD Networks. The change to Infocon 4 came in mid-November, after the Naval War College suffered devastating attacks that required their entire system be taken offline, but the JTF-GNO spokesman claims there is no connection."

Slashdot Top Deals

HELP!!!! I'm being held prisoner in /usr/games/lib!

Working...