Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Wireless Networking

Submission + - T-Mobile: Wi-Fi networks to handle phone calls (nytimes.com)

cyberianpan writes: The New York Times has an interesting feature on T-Mobile's plans to release a regular phone that also switches to Wi-Fi. This announcement got lost in the blizzard of iPhone hype last week. These phones hand off your calls from Wi-Fi network to cell network seamlessly and automatically, without a single crackle or pop to punctuate the switch. Oddly if you start a call on Wi-Fi and then say drive & move to cellular the call remains free ! This phone is just $10 extra per month- quite a brave move as it will potentially reduce many bills by way more. This seems to be the genuine revolution in mobile phone industry ?
Operating Systems

Submission + - Wubi: new Ubuntu secret weapon?

An anonymous reader writes: There is a new Ubuntu installer out there that might bring about a small revolution in the Linux world. Think about an installer that allows you to install and uninstall Linux as any other application. An installer that does not require you to burn an ISO, that does not change your partitions, that does not change your bootloader, and still gives you a normal dual-boot setup, with full hardware access. Impossible? Enter Wubi. Wubi sits between a demo and a full installation, bringing you the best of both words. It works like a real installation but it is easy and safe to install and remove like a demo. Wubi was born as an independent (GPL) project, but it will become an official Ubuntu installer in Gutsy. Caveat: it is still in beta.
Google

Submission + - Google Joins Forces w/Linux to Develop Google OS (osweekly.com)

techie writes: "Google is working with Linux on a variety of fronts to continue to develop Google OS. Matt Hartley of OSWeekly.com comments, "How would it go down specifically? Probably something like this: As previously mentioned earlier, Google unfolds their plans with the help of Mozilla, Linspire and Canonical (Ubuntu sponsor). Using these three forces, Google begins working with a PC manufacturer, such as HP, to get an OEM deal out the door. Because Google is willing to take an initial cut in profits to start off with, they are willing to offer the low-end PCs for nothing, so long as the user understands that they will be exposed to Google advertising in exchange. In addition to this, I could even see bundled extras, should the user allow their efforts to be heavily tracked. Because of privacy concerns, however, this extra feature would be turned off by default."
Security

Submission + - Google Fights Back (hackscotland.com)

Cry0 writes: "In a move by Google to crack down on the abuse of its search engine by hackers, its implemented a new system that tracks searches and flags anything that may be considered bot usage or vulnrability scanning.

Hackers have begun to report that doing their normal searches on Google, and using Google's own inbuilt systems and parameters to make extremely specific searches has begin to flag Google's Error message.

We're sorry... ... but your query looks similar to automated requests from a computer virus or spyware application. To protect our users, we can't process your request right now.

We'll restore your access as quickly as possible, so try again soon. In the meantime, if you suspect that your computer or network has been infected, you might want to run a virus checker or spyware remover to make sure that your systems are free of viruses and other spurious software.

We apologize for the inconvenience, and hope we'll see you again on Google.

This error message was triggered after using Google's Inurl: parameter to find links that contain specific properties, even tho the search itself was not being made by a bot, or any spyware, the user is then blocked for a fixed period of time from advancing their search.

The trouble comes when the people being blocked are not members of the hacker community, anyone with a good internet brain on their shoulders that wants to use Google's inbuilt query system to find a specific result will now run the risk of having their results blocked.

Some people see this as a move to far on Google's Part. only time will tell if this situation gets worse or better."

Networking

Submission + - Scriptable SSH client (finally) (digmia.com)

juraj writes: "Who said, that managing hundreds of UNIX machines hidden by various firewalls or those ones with disabled direct root login has to be pain? We have just released DSSH — SSH client on steroids, which allows SSH over SSH tunnels, for direct tunneling, direct root login for machines which have PermitRootLogin no (by doing "su -" automatically), etc. DSSH is scriptable with groovy."
Businesses

Submission + - Dell refuses to sell Ubuntu to business (ubuntuforums.org)

An anonymous reader writes: I had a surreal experience with Dell today. My boss asked me to order a new computer for our small, non-profit business. Wanting to support Dell in their decision to sell computers with Ubuntu installed, I decided to order one. First, I talked to a small business representative, who informed me that I could not order one of the Ubuntu-based computers through the small business department. I had to go through the "home and home office" department. I called the Home office department. I asked the representative if I could buy one of the ubuntu computers for my company. She said (and I quote), "these Dell computers are designed for personal use only, as long as you use it for personal use, you can purchase one." So I lied and said I would.... Next, I tried to buy it on our business credit card. They would have none of that. She told me that I had to buy it through a personal card. Now, as a non-proft, our business does not pay sales tax (10% in Tennessee). Had I bought it with my own card, I would have had to pay tax (~$90), which my company would not have reimbursed me for. So.....no Dell today. I really wanted to support Dell and I am just blown away that they would REFUSE MY MONEY because I was buying it to use for a business. What company goes around telling its customers how they can use their products? What business model does that fall under? More importantly, are they really supporting Ubuntu and Linux? They didn't seem too supportive to me.
AMD

Submission + - Ubuntu on the $99 decTOP (AMD PIC) (jsco.org)

An anonymous reader writes: The old news is that the AMD PIC has been reincarnated as the $99 decTOP. The new news is that I actually bought one, took it apart, put it back together again, and installed Linux on it (Ubuntu and Xubuntu). This page walks you through the installation process. The result is a reasonably usable machine—certainly enough to get your mom on the internet. The decTOP comes with 128MB of RAM and a 10GB HDD, both of which can be upgraded easily.
Security

Submission + - Watching Virus Behavior Far Better Than Signatures

davecb writes: A prototype anti-virus system developed at the University of Michigan uses the "fingerprint" of virus activity to more effectively identify viruses. The system obtains such fingerprints by intentionally infecting a quarantined computer with viruses. Conventional anti-virus software monitors systems for suspicious activity and then tries to determine the source by checking for virus signatures, which makes it difficult to spot new pieces of malware and track different variations.

The University of Michigan team studied the files and processes malware created and modified on an infected computer, and developed software that uses the information gathered to identify malware. The prototype is capable of defining clusters of malware that operate in similar ways, and can create a kind of family tree that illustrates how superficially different programs have similar methods of operation. In tests on the same software, the prototype was able to identify at least 10 percent more of the sample than five leading anti-virus programs. The prototype also always correctly connected different pieces of malware that operate similarly, while the best anti-virus program was only able to identify 68 percent of such links. (Courtesy of ACM Technews)
Operating Systems

Submission + - DetaolB: a fast live distro for qemu/vmplayer

Christian MICHON writes: "Try this command in ruby ;-)

>> puts "bloated".reverse
detaolb

DetaolB is a fast, modular and minimal live CD that fits on a 20MB
media. It is currently designed to run primarily in emulated
(virtualised) environments.

DetaolB aimed to be a "much-less-than-a-floppy" x86 linux live distro.
Now, it's evolving more into "a-la-slax" type of distro.

DetaolB v0.3 was released 14th,June 2007 on sf.net

It's usable enough in a virtualized environment to do a kernel
compilation. The most noticeable part is that it's entirely based
on uclibc, not glibc. Most packages included are detailed on its
homepage http://detaolb.sf.net/

Currently in a phase of adding features and partial debug, this distro needs
the feedback of slashdot linux users.

Download it, evaluate it using qemu, virtualbox or even vmplayer/vmware.
Remember to attach a virtual disk image preformatted in ext2 fs, containing
whatever tar files you want to compile.

Feedback, suggestions, etc... are to be sent to the detaolb mailing list:
detaolb-devel@lists.sourceforge.net

Christian MICHON"
Hardware Hacking

Submission + - Flaws in Arm and XScale (maybe PowerPC too) (securityfocus.com)

V4Vendetta writes: "Barnaby Jack developed a method for exploiting certain NULL pointer dereferences on the ARM and XScale architectures (and likely PowerPC).

In general, NULL pointer dereference flaws are considered non-exploitable. On the XScale and ARM architectures the memory address 0 is mapped, and also holds the exception vector table. The exception vector table is a set of branch instructions that correspond to different exceptions, such as software and hardware interrupts. When a case arises that writes to the 0 address with user-defined source data, it is possible to gain execution control by rewriting the exception table.

This method affects a lot of devices since most mobile phones and PDA are ARM based (iPhone?), and high-end routers often use the XScale architecture. The PowerPC architecture (used by Nintendo Wii, XBox360 and Playstation 3) also stores the vector table at a low address, and is likely vulnerable to this same attack.

This attack is more reliable than a remote stack overflow, due to the fact that no offsets are required. You will always be writing to address 0. The only data needed by an attacker is a copy of the vector table, which can be acquired by downloading and reversing the targets firmware.

Let me quote Barnaby: "As embedded exploitation is still in its infancy, I don't foresee a worm in the very near future — but yes, if a worm was targeting embedded devices, this would be a reliable attack vector.""

Privacy

Submission + - Keylogger Hardware Embedded in New Dell Laptop (virus.org.ua)

kendbluze writes: "Here's an EE who was doing a simple repair to a nearly-new Dell 600m laptop when he noticed something a bit curious. Turns out he found a hardware keylogger sitting between the keyboard and ethernet controllers! See what Homeland Security didn't have to say about it."
Google

Submission + - Google Demands ID to get off Street View (wired.com)

mytrip writes: "EFF privacy advocate and unhappy Street View model Kevin Bankston made good on his vow to try out Google's take-down policy after THREAT LEVEL found a picture of his unwitting mug stalking the sidewalks near EFF's offices. What he learned: Google is happy to remove you from Street View ... provided you give them a wealth of additional information, including a photo of your driver's license.

To request removal of your image from Street View, you must demonstrate that you are the person shown in the panorama you would like removed. We will not take action if you are reporting on behalf of someone else (such as a friend, relative or stranger), except that you may report on behalf of your minor child. To show that you are the person in the image you would like removed, you must provide us with the information specified below. To expedite our ability to process your request, please use the following format on your verification form:

1. Provide your legal name.

2. Provide your e-mail address.

3. Provide the street view address of the Street View image you would like removed.

4. Include the sworn statement: "I declare, under penalty of perjury, that the information in this notification is accurate."

5. Attach a clear, readable copy of a valid photo ID (e.g. driver's license, national ID card, etc). If you are requesting removal of an image of a location, attach a copy of a document demonstrating your association with that location ( e.g. business card or letterhead).

6. Please e-mail your completed verification form, along with the necessary attachment, to maps-legal@google.com within 5 days. If you are unable to upload a copy of your photo ID electronically in an e-mail, you may also fax us a copy of your form and photo ID to (650) 887-0389.

We will temporarily remove the Street View image pending receipt of your ID verification. If we have not received a copy of your photo ID within 5 days, then we will restore the panorama back to Street View. Please note that we will investigate your complaint and take action as needed. We will not contact you unless we need more information to review your request. If you see that the panorama was not removed from Street View, it is likely that it did not meet our conditions for permanent removal.

Regards,

The Google Team

http://blog.wired.com/27bstroke6/2007/06/want_off_ street.html"

Space

Submission + - Video reveals sprites are brighter than Venus (newscientist.com)

CarrieSmith writes: "High-quality video recordings reveal how these brief but very bright flashes tear through the upper atmosphere at 30,000 km/h. The flashes are massive — up to 50km high — and occur around the world above big thunderstorms. A researcher at the University of Alaska has captured amazing video of sprites in New Mexico using a 10,000 frames per second camera, which shows that they are made of really bright sparks that drop down through the atmsophere, followed by other brighter sparks that actually rise up dozens of kilometres and get brighter and brighter as they do — a sort of massive explosive firework. Check out the cool video embeded in: http://environment.newscientist.com/article/dn1204 4-video-reveals-sprites-are-brighter-than-venus.ht ml"

Slashdot Top Deals

This file will self-destruct in five minutes.

Working...