Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Software

Submission + - SearchInform Technologies Inc. announces a new ver

Alena Siameshka writes: "May 28, 2007 — SearchInform Technologies Inc. announces a new version of SearchInform, a corporate system of full text search and search for documents with similar content in large data volumes, featuring an enhanced data indexing algorithm. New functions of SearchInform 4.0.09 Fundamental changes took place in intranet computers indexing algorithm. Now an agent program tracking all changes is installed on each computer and all data gets recorded into a log file. Before scanning all these files for changes used to be extremely time-consuming, now only the log file created by agent-program gets scanned. As a result of this innovation (only modified and new files being indexed) the index updating speed has significantly increased. Another important detail is that now all information gets indexed regardless of whether the folder is in common access or not. All indexed data gets placed into the storage located on the server. This allows the user to conduct search through all information regardless of the computer it was indexed on, so even if the computer containing needed information is switched off, the information will still be found. Even if certain files were deleted from the computer by accident, they will still be available in the storage for a set period of time. The size of the storage and the time intervals throughout which the information will be stored in it are defined by the user. Main features of SearchInform: — Phrase search with due consideration to stemming and thesaurus — New SoftInform Search Technology of search for similar documents — High indexing speed (from 15 to 30 Gb/hour), — Client-server architecture — Scalability — Query caching system — Support of over 60 most popular text formats, Outlook & TheBat electronic messages, mp3 & avi tags, and logs of MSN and ICQ instant messaging programs — Indexing DBMS fields (Lotus, SQL, Oracle) About SearchInform Technologies SearchInform Technologies was founded in 1995 and has been operating in the area of information technologies with special focus on information searching, storing and processing. The range of company's products is quite large and encompasses from mass production of single user-oriented products to ready business solutions to be integrated into corporate systems. Owing to its extensive experience in various projects, the company offers its services on developing custom information systems of any complexity. More information on our website: http://www.searchinform.com/ For all inquiries mailto:alena.siameshka@searchinform.com Alena Siameshka, Head of PR & Marketing Department at SearchInform Technologies"

Submission + - ISPs willingly accepting abuse?

beh writes: Yesterday, at 2:30pm GMT someone started ssh scanning my servers — thanks to fail2ban, there's not much chance of anything happening there, but nevertheless, when I finally saw all the fail2ban messages about it 2 1/2 hours later, I reported the issue to theplanet.com, the provider from which the attack originated.

At first, there was no response apart from 'This is an auto-response'. A further 12 hours later, finally an answer "we will investigate", in the meantime, the attack continues.

By now, it has been 23 hours since the attack started, and over 20 since I reported it to the ISP; no further reaction, the ssh scans continue to come in from 70.87.55,194; and since the attack goes again all IP addresses of both of my servers, I can only assume it will go against the entire subnet of those servers (especially since a third server belonging to the same domain, with another ISP is not the target).

I've just had a quick online chat with their support desk, and all they tell me is "I can't do anything about it; my hands are tied. Mail the abuse desk again, but please note, the investigation and actions from it can take between 24 and 72hours.".

My question now is this — when does an ISP become an accomplice to an attacker, by willingly leaving him to continue to attack other systems, even though the provider knows full well about what's going on?

Where are the rights of those people that are on the receiving end of those attacks — I can hardly 'take my business elsewhere', since I'm not a customer of theplanet.com... For the moment, I'm 'happy' with the attacks to continue, as the attacker seems to be using dictionary based attacks and hasn't hit on any accounts that could be vulnerable; but obviously, I can't say how safe other systems on the same subnets, or on other subnets that are being attacked might be. Leaving this unchallenged for 24-72 hours seems a sure-fire way to exacerbate the problem, as any additional host someone might be able to break into, will only make future attacks worse.

So, what can/should be done?
Privacy

Who's Trading Your E-mail Addresses? 355

Bennett Haselton is back with another piece on e-mail privacy. He starts "On April 14, 2007, I signed up for an AmeriTrade account using an e-mail address consisting of 16 random alphanumeric characters, which I never gave to anyone else. On May 15, I started receiving pump-and-dump stock spams sent to that e-mail address. I was hardly the first person to discover that this happens. Almost all of the top hits in a Google search for "ameritrade spam" are from people with the same story: they used a unique address for each service that they sign up with, so they could tell if any company ever leaked their address to a spammer, and the address they gave to AmeriTrade started getting stock spam. (I don't actually do that with most companies where I create accounts. But after hearing all the AmeriTrade stories, I created an account with them in April just for the purpose of entering a unique e-mail address and seeing if it would get leaked.)" Bennett continues on if you're willing to click the link.
It's funny.  Laugh.

Journal Journal: DH Musings 3

The more I think of the DH, the more I think of how much suspense it takes from the game of baseball. Baseball is a game which can turn on a single swing of any players bat. Each pitch builds a peak of excitement until it is resolved into either a ball, strike, or the sweet crack of the bat as contact is made.
Programming

Submission + - Ubuntu - Easier to Install than Sowing a dress

Dan the man writes: "Linux in the past has always had a bad reputation of being difficult to install. I remember installing Redhat in the late 90's. I had to go on to their ftp site, download some crazy dos utilities, pull out 4 floppy disks, and somehow write the install diskettes without getting errors. Once this difficult process was completed, and the system was rebooted, often times, the floppies that I had used turned out to be erroneous, and I'd have to head to the local radio shack to get more floppy disks. After the daunting task of getting through the ugly ANSI graphics of the install program, it would complain that my network card was not supported, and that I needed to get a driver, and put it on yet another floppy disk. After all of the hardship, I will have to admit that it was neat to watch the distro be installed over the network through FTP. However, upon rebooting, a myriad errors would come up on my screen about my graphics card, network card, sound card etc. You pretty much had to dedicate a full day to the installation of Linux. I remember one Saturday, I spent all day installing Linux, and getting my hardware to work with it. That night, a bunch of my friends picked me up to go out. We were talking about what we did that day, and one girl in the car said that she had sown a dress. Everyone congratulated her, smiled, and praised her for her dedication. They turned and asked me what I had been up to. I quickly responded, "Oh, I finally got that Linux installed on my computer". They all stopped talking and looked at me like I had come from another planet. Those long hours spent installing Linux now have turned to minutes with the latest install from Ubuntu. Below I have a guide to show just how easy it is to install Ubuntu. http://pimpyourlinux.com/linux-feature-review/inst alling-ubuntu-easier-than-sowing-a-dress/"
Data Storage

Submission + - VIZO eSATA Uranus & Saturno HDD Enclosures

Benchmark Reviews writes: "We are in the age of mobile data and removable media. You can see it all around us. Most industry professionals keep a portable computing device in close company, and nearly everyone carries a USB flash drive on them. Cell phones double as MP3 players, and MP3 players double as personal video devices. It seems progressive then that external hard disks are quickly becoming something more of a personal carry item as their size grows smaller. Conversely, some stylish trends have managed to give a new look to the old ideas. So whether you are a mobile power user with compact storage needs, or discerning office user who enjoys a stylish environment, VIZO offers products to satisfy both needs, and Benchmark Reviews helps you to pick the best fit between their eSATA Uranus or the SATA Saturno.

http://benchmarkreviews.com/index.php?option=com_c ontent&task=view&id=16&Itemid=1"
The Internet

Submission + - P2P Networks supplement Botnets

stuckinarut writes: Peer to peer file sharing network popularity is at an all time high, with hundreds of thousands of computers connected to a single P2P network at a given time. These networks are increasingly being used to trick PCs into attacking other machines, experts say. In fact, some reports indicate that peer-to-peer may actually exceed web traffic. Computer scientists have previously shown how P2P networks can be subverted so that several connected PCs gang up to attack a single machine, flooding it with enough traffic to make it crash. This can work even if the target is not part of the P2P network itself. Now, security experts are warning that P2P networks are increasingly being used to do just this. "Until January of this year we had never seen a peer-to-peer network subverted and used for an attack," says Darren Rennick of internet security company Prolexic in an advisory released recently. "We now see them constantly being subverted."
Handhelds

Submission + - Why Your BlackBerry Causes Nearby Speakers to Buzz

AZA43 writes: "Ever wondered why your BlackBerry — or other mobile device — causes nearbly speakers and electronics to buzz like a swarm of disgruntled honey bees? Ever wondered what handset makers and cell phone carriers think about the buzzing and whether or not they're doing anything about it? Or why some phones seem to cause more buzzing than others? I did, and I asked Research In Motion (RIM) for information on the subject. Duncan Bradly, RIM's global intelligence director, let me in on where RIM stands on the issue, what they're doing about it and even offered up a few ways you can muffle the sound — though he cautions against them since they'll void warranties. Check it out."
Announcements

Submission + - LighthousePro: Free Software Dev Management System

Joe Ponczak writes: "Artifact released a new version of Lighthouse Pro recently. In addition to some bug fixes, we have an improved AJAX interface and massive performance improvements.

Lighthouse Pro is a free, online Software Development Management system. It includes, among other modules, Requirements Management, Bug Tracking, Test Management, Project Planning, Task Management, Change Request Management, automatic notifications and role-based security.

Lighthouse Pro is free to use with no limits on users or projects. If you are currently involved in a software development effort, you should give Lighthouse a try.

We also offer an affordable subscription based version called Lighthouse Premium that lets you create custom fields, custom reports and custom methodologies.

You can read more about the different Lighthouse versions here.

You can sign up for your free account here."
Intel

Submission + - IAMT, a Centrino backdoor?

An anonymous reader writes: Intel is heavily promoting what it calls "active management technology" (AMT) in the new chips as a major plus for system administrators and enterprise IT.
Understood to be a sub-operating system residing in the chip's firmware, AMT will allow administrators to both monitor or control individual machines independent of an operating system.

Additionally, AMT also features what Intel calls "IDE redirection" which will allow administrators to remotely enable, disable or format or configure individual drives and reload operating systems and software from remote locations, again independent of operating systems.
Both AMT and IDE control are enabled by a new network interface controller.
"We all know our [operating system] friends don't crash that often, but it does happen," Tucker said.
here's the link to the story

Slashdot Top Deals

From Sharp minds come... pointed heads. -- Bryan Sparrowhawk

Working...