Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
X

Moblin Will Run X Server As Logged-In User, Not Root 205

nerdyH writes "An architect of the Moblin Project has announced that Moblin 2.0 for netbooks and nettops is the first Linux distribution to run the X server as the logged-in user, rather than SUID'd to root. The fix to this decades-old security liability comes thanks to 'NRX' (No-root X) technology reportedly developed by Intel, Red Hat, and others in the X community, and the Moblin-sponsored 'Secure X' project. Besides making Linux netbooks a lot more snoop-proof, it seems like this could lead to an X-hosting renaissance of sorts, since you wouldn't be risking the whole system just to open up a specific user's account to remote X servers."

Comment Finally!!! (Score 1) 281

IBM deserves an Oscar and a Nobel Prize for this!!! This problem has persistently plagued me for ages! I'm glad someone finally came up with a solution to this. My only recourse up to this point has been to avoid SSN fields on any web form. If my boss wants something that requires a unique personal identifier I tell him it can't be done--not unless he wants to hire a team of interns to parse whatever voodoo people put into that SSN field!

Thank you so much for this new knowledge IBM! Now if we can do something about phone number fields I'll be in web developer heaven!

Robotics

Robot Soldiers Are Already Being Deployed 258

destinyland writes "As a Rutgers philosopher discusses robot war scenarios, one science magazine counts the ways robots are already being used in warfare, including YouTube videos of six military robots in action. There are up to 12,000 'robotic units' on the ground in Iraq, some dismantling landmines and roadside bombs, but 'a new generation of bots are designed to be fighting machines.' One bot can operate an M-16 rifle, a machine gun, and a rocket launcher — and 250 people have already been killed by unmanned drones in Pakistan. He also tells the story of a berserk robot explosives gun that killed nine people in South Africa due to a 'software glitch.'"
Biotech

Texas Makes Zombie Fire Ants 398

eldavojohn writes "What do you do when a foreign species has been introduced to your land from another continent? Bring over the natural predator from the other continent. Scientists in Texas have introduced four kinds of phorid flies from South America to fight fire ants. These USDA approved flies dive bomb ants and lay an egg inside the ant. The maggot hatches and eats away juicy tender delicious ant brain until the ant is nothing more than a zombie that wanders around for two weeks before the head falls off and the ant dies. A couple of these flies will cause the ants to modify their behavior and this will be a very slow acting solution to curb the $1 billion in damage these ants do to Texas cattle ranches and — oddly enough — electrical equipment like circuit breakers. You may remember zombifying parasites hitting insects like cockroaches."
Medicine

Reliable Male Contraceptive In the Works 519

Hugh Pickens writes "The BBC reports that recent tests in China indicate a monthly injection of testosterone, which works by temporarily blocking sperm production, could be as effective at preventing pregnancies as the female pill or condoms. In trials in China only one man in 100 fathered a child while on the injections, and six months after stopping the injections the mens' sperm counts returned to normal. The lead researcher said that if further tests proved successful, the treatment could become widely available in five years' time. Previous attempts to develop an effective and convenient male contraceptive have encountered problems over reliability and side effects, such as mood swings and a lowered sex drive. However, despite the injection having no serious side effects, almost a third of the 1,045 men in the two-and-a-half year study did not complete the trials; no reason was given for this."
Security

Subverting PIN Encryption For Bank Cards 182

An anonymous reader sends in a story at Wired about the increasingly popular methods criminals are using to bypass PIN encryption and rack up millions of dollars in fraudulent withdrawals. Quoting: "According to the payment-card industry ... standards for credit card transaction security, [PINs] are supposed to be encrypted in transit, which should theoretically protect them if someone intercepts the data. The problem, however, is that a PIN must pass through multiple HSMs across multiple bank networks en route to the customer's bank. These HSMs are configured and managed differently, some by contractors not directly related to the bank. At every switching point, the PIN must be decrypted, then re-encrypted with the proper key for the next leg in its journey, which is itself encrypted under a master key that is generally stored in the module or in the module's application programming interface, or API. 'Essentially, the thief tricks the HSM into providing the encryption key,' says Sartin. 'This is possible due to poor configuration of the HSM or vulnerabilities created from having bloated functions on the device.'"

Vista Post-SP2 Is the Safest OS On the Planet 1010

pkluss noted Kevin Turner, COO of Microsoft making the proclamation that "Vista today, post-Service Pack 2, which is now in the marketplace, is the safest, most reliable OS we've ever built. It's also the most secure OS on the planet, including Linux and open source and Apple Leopard. It's the safest and most secure OS on the planet today."
Government

Data.gov To Launch In May 111

An anonymous reader writes "In late May, Data.gov will launch, in what US CIO Vivek Kundra calls an attempt to ensure that all government data 'that is not restricted for national security reasons can be made public' through data feeds. This appears to be a tremendous expansion on (and an official form of) third-party products like the Sunlight Labs API. Of course, it is still a far cry from 'open sourcing' the actual decision-making processes of government. Wired has launched a wiki for calling attention to datasets that should be shared as part of the Data.gov plan, and an article on O'Reilly discusses the importance of making this information easily accessible."
Intel

Intel Threatens To Revoke AMD's x86 License 476

theraindog writes "AMD's former manufacturing division opened for business last week as GlobalFoundries, but the spin-off may run afoul of AMD's 2001 cross-licensing agreement with Intel. Indeed, Intel has formally accused AMD of violating the agreement, and threatened to terminate the company's licenses in 60 days if a resolution is not found. Intel contends that GlobalFoundries is not a subsidiary of AMD, and thus is not covered by the licensing agreement. AMD has fired back, insisting that it has done nothing wrong, and that Intel's threat constitutes a violation of the deal. At stake is not only AMD's ability to build processors that use Intel's x86 technology, but also Intel's ability to use AMD's x86-64 tech in its CPUs."
Social Networks

Twitter Leads Social Networks In Downtime 175

illectro writes "A study on site availability by monitoring service Pingdom shows that in 2008 Twitter greeted users with the 'Fail Whale' for more than 84 hours, almost twice as much as any other site. At the other end of the scale imeem and Xanga managed less than 4 hours of downtime for 99.95% uptime. Myspace, Facebook and Classmates.com were the only other sites studied which managed to stay up more than 99.9% of the time."
Businesses

How Do I Put Unused Servers To Work? 302

olyar writes "I worked for an internet start-up last year and during the 'we have plenty of money' phase, a lot of server hardware was purchased. Eight months later, there is very little money, but we're still plugging along — using only a fraction of the hardware. We just cleared out a co-lo and I now have a stack of 17, 1U servers in my garage. Each of those has 2 servers, each of which is a 2-processor, dual-core box with 8 GB of RAM. Add that up and I have 136 processors and 272 GB of RAM with nothing to do. The IT guy in me thinks that's a waste of FLOPS. The wanna-be businessman in me thinks its probably a waste of money as well. So I've been brainstorming ways to put all of that power to good use. Any ideas?"
The Military

Nuclear Subs 'Collide In Ocean' 622

Jantastic noted a BBC report saying "A Royal Navy nuclear submarine was involved in a collision with a French nuclear sub in the middle of the Atlantic. It is understood HMS Vanguard and Le Triomphant were badly damaged in the crash earlier this month. Despite being equipped with sonar, it seems neither vessel spotted the other, the BBC's Caroline Wyatt said."
Image

South Carolina Seeking To Outlaw Profanity Screenshot-sm 849

MBGMorden writes "It looks like in an act that defies common sense, a bill has been introduced in the South Carolina State Senate that seeks to outlaw the use of profanity. According to the bill it would become a felony (punishable by a fine up to $5000 or up to 5 years in prison) to 'publish orally or in writing, exhibit, or otherwise make available material containing words, language, or actions of a profane, vulgar, lewd, lascivious, or indecent nature.' I'm not sure if 'in writing' could be applied to the internet, but in any event this is scary stuff."

Slashdot Top Deals

Syntactic sugar causes cancer of the semicolon. -- Epigrams in Programming, ACM SIGPLAN Sept. 1982

Working...