Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Product dumping (Score 1) 476

Actually, at the publicly funded scientific research institute I work in, in Dortmund, my entire department has iMacs and Macbook Pros - totally about 50 in all.

I of course prefer Bootcamp-XP , but that is not to say there aren't any Macs in thse places. Most times it just happens, that Macs are not enough value for money in an environment where people either prefer Windows for compatibility reasons and can run Linux for everything else anyway. Silver shiny jewels of a thing are not exactly a priority for a publicly funded institution, nor should they be.

Google

Submission + - Gmail offers AIM Chat ability through Open AIM (google.com)

protobion writes: "Gmail chat now offers the option to sign in to your AOL Instant Messenger (AIM) account to chat with your AIM buddies from Gmail. Your AIM buddies will populate your Contacts list, and are searchable just like your Google Talk contacts.Chatting with your AIM buddies is easy — just click on a name in your chat list, and start typing. Note that an AIM account is required to use this feature. AIM in Gmail is not a Google Talk and AIM federation; it's the ability to sign in to your AIM messaging account from Gmail. Gmail uses Open AIM to provide this feature."
Software

Submission + - The Advancement Of The Keylogger

wmhafiz writes: "keylogger is a program that runs in your computer's background secretly recording all your keystrokes. Once your keystrokes are logged, they are hidden away for later retrieval by the attacker. The attacker then carefully reviews the information in hopes of finding passwords or other information that would prove useful to them. For example, a keylogger can easily obtain confidential emails and reveal them to any interested outside party willing to pay for the information. Keyloggers can be either software or hardware based. Software-based keyloggers are easy to distribute and infect, but at the same time are more easily detectable. Hardware-based keyloggers are more complex and harder to detect. For all that you know, your keyboard could have a keylogger chip attached and anything being typed is recorded into a flash memory sitting inside your keyboard. Keyloggers have become one of the most powerful applications used for gathering information in a world where encrypted traffic is becoming more and more common. As keyloggers become more advanced, the ability to detect them becomes more difficult. They can violate a user's privacy for months, or even years, without being noticed. During that time frame, a keylogger can collect a lot of information about the user it is monitoring. A keylogger can potential obtain not only passwords and log-in names, but credit card numbers, bank account details, contacts, interests, web browsing habits, and much more. All this collected information can be used to steal user's personal documents, money, or even their identity. A keylogger might be as simple as an .exe and a .dll that is placed in a computer and activated upon boot up via an entry in the registry. Or, the more sophisticated keyloggers, such as the Perfect Keylogger or ProBot Activity Monitor have developed a full line of nasty abilities including: Undetectable in the process list and invisible in operation A kernel keylogger driver that captures keystrokes even when the user is logged off A remote deployment wizard The ability to create text snapshots of active applications The ability to capture http post data (including log-ins/passwords) The ability to timestamp record workstation usage HTML and text log file export Automatic e-mail log file delivery All keyloggers are not used for illegal purposes. A variety of other uses have surfaced. Keyloggers have been used to monitor web sites visited as a means of parental control over children. They have been actively used to prevent child pornography and avoid children coming in contact with dangerous elements on the web. Additionally, in December, 2001, a federal court ruled that the FBI did not need a special wiretap order to place a keystroke logging device on a suspect's computer. The judge allowed the FBI to keep details of its key logging device secret (citing national security concerns). The defendant in the case, Nicodemo Scarfo Jr., indicted for gambling and loan-sharking, used encryption to protect a file on his computer. The FBI used the keystroke logging device to capture Scarfo's password and gain access to the needed file. About the Author Wan Mohd Hafiz is the founder of ArticlesInside.com. This article is provided courtesy of http://www.articlesinside.com./ This article may be freely published on any website, as long as the links are live, and this notice is left intact."
Windows

Submission + - Free tool turns Aero on or off in three seconds

An anonymous reader writes: Techlogg.com has this freeware tool on its website called VistaAeroSwitch. It turns Vista's Aero interface on or off in less than three seconds. Even works on Vista systems with only 512MB of memory. Requires Vista Home Premium or better. Even includes useful system specs as well. http://techlogg.com/content/view/110/
Wireless Networking

Submission + - Fon Dumps Microsoft

An anonymous reader writes: FON founder and CEO, Martin Varsavsky sent a memo to his employees encouraging them to dump Microsoft in favor of Ubuntu.
" Dear All: As of today Fon will disengage from Microsoft and adopt Linux in the Ubuntu form as our operating system of choice. " read the blog entry from Steve Ross
The Internet

Submission + - Wikipedia admins run mad with power again?

An anonymous reader writes: It seems "Lou Proctor" wanted to fix a category on an article for convicted child murderer Craig Roger Gregerson and even provided a reference for why he changed it. How does Wikipedia react? By labeling the new user a "sockpuppet" of a banned user based on the flimsiest evidence this side of a kangaroo court. After multiple requests for unblock by the user, it's boiled down to "you are a sockpuppet because a few users think you are, and you can not defend yourself". With admins on Wikipedia becoming more of a hindrance than a help to the project, one must wonder if the entire process needs a serious review.

Slashdot Top Deals

An Ada exception is when a routine gets in trouble and says 'Beam me up, Scotty'.

Working...