Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Relax (Score 5, Interesting) 1354

First of all, don't talk like you do in your summary. Using overly precise words will freak normal people out (Geeks tend to find it pretentious, as well.) Find a local geek hangout spot, hang back and observe. Smile when something is amusing, laugh when it's funny. Say nothing until you feel comfortable. Do this until you are having a conversation. Repeat conversations until you are invited to activities with people. Repeat until you have friends. But most of all, throw your research away, stop asking Slashdot like you're preparing a technical writeup...and Relax! People are fun.
Announcements

Submission + - After a Firebombing, Animal Researchers Fight Back

yay for science writes: A UCLA researcher whose car was firebombed by animal rights extremists has formed a group called UCLA Pro-Test, which will hold its first rally on April 22nd in support of humane, regulated animal testing. He works on monkeys, but for damn good causes — understanding schizophrenia and drug addiction. http://blogs.discovermagazine.com/80beats/2009/04/16/after-a-firebombing-pro-test-rallies-in-support-of-animal-research/
Security

Submission + - New privilege escalation exploits for Mac OS X (h-online.com)

xororand writes: Several exploits for Apple's Mac OS X are in circulation which have not yet been patched. In a short test carried out by the heise Security editorial team, one of the exploits allowed a Mac OS X 10.5.6 user with normal privileges to obtain root privileges. The problem is triggered when mounting malformed HFS disk images. The exploit consists of a shell script and some source code written in C. The C code generates the disk image which, when mounted, provokes the flaw that allows execution of code at root level.
The exploits are available here: http://www.digit-labs.org/ (recent additions)

Slashdot Top Deals

Today is a good day for information-gathering. Read someone else's mail file.

Working...