Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Debian Locks Out Developers 331

daria42 wrote in with an update to an earlier story about a Debian server that was compromised. He explains: "The Debian GNU/Linux project has discovered a compromised developer account was used to gain access to a server compromised this week. A local kernel vulnerability was then used to gain root access. Due to this, a number of developers with weak passwords have been locked out of their system accounts." To be fair, they'll most likely be let in once everything's back to normal. Of course, they'll probably need to set safer passwords too.

Net Neutrality a Threat to Online OSes? 203

tomtechie writes "OSWeekly.com talks about net neutrality and how it would impact the world of operating systems, both online and offline. The author states, 'I know of a couple of people who support the legislation despite the fact that it could possibly enable ISPs to restrict access for those who are not willing to pay a premium fee for broader access. They have a strong belief that it is needed in order to make sure that ISPs have the tools and funds to expand their already overtaxed networks. Keeping in line with their belief system, this allows ISPs to make sure that developing connectivity can in fact, keep up with the explosive demand for broadband in more places. In other words, it allows for fatter pipes.'"

Windows Rootkit Wars Escalate 342

An anonymous reader writes "The rootkit wars have started to escalate with a rootkit named Rustock which is able to remain hidden from all the popular anti-rootkit tools. It uses some new techniques including not only putting itself in a ADS (NTFS alternate data stream) which isn't seen by normal file system enumeration tools, but even blocks ADS aware tools from seeing the stream. Works in Vista, too! Analysis in both Symantec and F-Secure blogs."

The Next Round in the Virtualization Wars 355

GvG writes "After making Virtual Server available for free some time ago, Microsoft announced today it is offering Virtual PC as a free (as in beer) download. They also announced a change to the Vista license related to virtualization: Customers who deploy Windows Vista Enterprise have the ability to install up to four (4) copies of the operating system in a virtual machine for a single user on a single device. Even better, nothing in the license requires that Microsoft Virtualization technologies be used - if you want to use a competing product as your Virtualization solution, you still get the four extra licenses for use with VMs."

Ruby For Rails 173

Simon P. Chappell writes "This may not be the book that you think it is, if you don't read the title carefully, but it is the book you need, if you are developing applications for Ruby On Rails (often known as just Rails, or RoR, to its friends). When learning any new development platform, there are many idioms and approaches, best practices if you will, that can benefit your development efforts. This book sets out to bring you that understanding of the best way to write the Ruby side of your Rails application." Read the rest of Simon's review.

Hack in the Box Meets Windows Vista 159

Strange_Brew writes "It appears Microsoft is really going all out to get Windows Vista secured before its release date in 2007. There's an article on PC World which talks about Microsoft's plan to give Asia's largest hackers conference an inside look at the new security features in Windows Vista this coming September." From the article: "The Hack In The Box conference will host two speakers from Microsoft. The first, Dave Tamasi, a lead security program manager at Microsoft, will give a presentation on security engineering in Vista. The talk will include a discussion about features suggested by hackers and other security conscious members of the computing community, in addition to security improvements made on Vista. The second speaker, Douglas MacIver, a penetration engineer at Microsoft, will review Vista's BitLocker Drive Encryption and the company's analysis of threats and attempts to penetrate the security feature."

FBI Foils Attack by Monitoring Chat Rooms 437

An anonymous reader writes "A planned terrorist attack on New York City was reportedly foiled by FBI agents who monitored chat rooms frequented by extremists. Lebanese authorities captured an Al Qaeda member who confessed to the plot, and stated that Abu Musab al-Zarqawi had pledged financial and other support for the operation. Although the planning for the operation was not far along, according to U.S. officials, they had already been monitoring the plot for a year." From the article: "A government official with knowledge of the investigation said the alleged plot did focus on New York's transport system, but did not target the Holland Tunnel. New York senator Charles Schumer said: 'This is one instance where intelligence was on top of its game and discovered the plot when it was just in the talking phase.' The Holland Tunnel is protected not just by bedrock, but also by concrete and cast-iron steel. One counter-terrorism source told the Daily News it was doubtful a plot to blow it up would be feasible, saying huge amounts of explosives and a detailed knowledge of blast effect would be necessary."

Slashdot Top Deals

What is wanted is not the will to believe, but the will to find out, which is the exact opposite. -- Bertrand Russell, "Skeptical Essays", 1928

Working...