Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Enlightenment

Submission + - Dell gives desktop Linux its "full attention&#

An anonymous reader writes: Only days after Dell launched a new user feedback forum called Dell Idea Storm where customers can suggest new ideas for the PC manufacturer, the request for a Linux desktop tops the list with thousands of votes. Emails exchanged with Bob Pearson, Dell's vice president of corporate group communications, indicate that Dell is taking the request seriously. Dell is known for taking risks and with its new found devotion to customer service, Dell just might grant the Linux community's wish.
Red Hat Software

Submission + - Linux.com | ESR gives up on Fedora

JReagan1990 writes: ESR has left Fedora for Ubuntu: "I have watched Ubuntu rise to these challenges as Fedora fell away from them. Canonical's recent deal with Linspire, which will give Linux users legal access to WMF and other key proprietary codecs, is precisely the sort of thing Red-Hat/Fedora could and should have taken the lead in. Not having done so bespeaks a failure of vision which I now believe will condemn Fedora to a shrinking niche in the future. This afternoon, I installed Edgy Eft on my main development machine — from one CD, not five. In less than three hours' work I was able to recreate the key features of my day-to-day toolkit. The after-installation mass upgrade to current packages, always a frightening prospect under Fedora, went off without a hitch." http://enterprise.linux.com/article.pl?sid=07/02/2 1/1340237
Security

Submission + - When IT security gets physical

ancientribe writes: A social engineering firm is forced to actually steal the laptop of a technology-savvy suspected employee-gone-bad to investigate his actions for a large corporate client, and things get physical — literally, as they wrestle over the machine, according to this column in Dark Reading. Steve Stasiukonis, vice president and founder of Secure Network Technologies, recounts the sting operation that led to a scuffle, as well as getting the goods on the culprit.

http://www.darkreading.com/document.asp?doc_id=117 531&WT.svl=tease3_2
Security

Submission + - Remote Code Execution Hole Found in Snort

Palljon1123 writes: A stack-based buffer overflow in the Snort IDS (intrusion detection system) could leave government and enterprise installations vulnerable to remote unauthenticated code execution attacks. The flaw, found by researchers at IBM's ISS X-Force, affects the Snort DCE/RPC preprocessor and could be used to execute code with the same privileges (usually root or SYSTEM) as the Snort binary. No user action is required.
Software

Submission + - MPAA Steals Code, Violates Linkware License

GRW writes: "TorrentFreak reports that the MPAA is using blogging software, called Forest Blog by web developer Patrick Robin, in violation of the "linkware" license. They have removed all links and references to the Forest Blog website, and have not purchased a commercial license. Is this a case of "Do as I say and not as I do"?"
Security

Submission + - Charlotte's Web Site - New Hacking Contest

ddonzal writes: "Ed Skoudis, SANS Instructor and host of The Ethical Hacker Network's Skillz Hacking Challenge has done it again. This time the theme is Charlotte's Web, and it's amazing. With subtle mentions of higher mathematics, this contest will have you knee deep in web hacking, crypto and steganography. Signed copies of Ed's book, Counter Hack Reloaded, and prestige in the security community are at stake. Good luck as these challenges have been known to zap corporate productivity! http://www.ethicalhacker.net/content/view/114/2/"
Networking

Submission + - Videoconferencing server for Linux ?

Hymer writes: Well it is really a simple question: Does anyone here know a vidoconferencing server for Linux ? It may be a non-standard solution but the clients have to exist for at least Linux, Windows and Mac OS X. The communication channel should preferably encrypted. I need video and some kind of common workplace or desktop sharing, audio is optional. I've searched the Net and found nothing... geeks do not need to look at other geeks to understand eachother but CEO's obviously does... ;-)
Software

Submission + - BSD Stackable Filesystem Series I

jasonrfink00 writes: "Nice beginning article of a promising BSD series: The nullfs filesystem is a passthrough filesystem. When nullfs is mounted it — literally copies the filesystem transaction. If a file is deleted, nullfs simply transmits the information down to the lower filesystem. Conversely, if a file is created, it does the same and tacks on all of the data needed for the filesystem underneath. Why is that a good thing? Where did nullfs come from and why?. What else, if anything, is it good for? The series focuses on where nullfs comes from, how it can be leveraged, a code walk and a skeloten implementation (nearly a blind copy). link."
Apple

Apple TV to be a Centrally Controlled P2P Network? 165

Rolgar writes "PBS' Bob Cringely theorizes that since the Apple TV will be an always-on device with a 40GB hard drive, Apple may move to content distribution via a P2P network. The ISPs will incur higher bandwidth locally, possibly lose some subscribers to cable TV, but have fewer costs through the Tier II Internet backbone providers. Bob also expects that Google will be involved with their fiber network and advertising expertise, and my hope is that they'll bundle in YouTube content as well. The article suspects that they won't get around to announcing the full details of this plan until they hit a half million units or more, and that this Apple and Google pairing will become the equivalent of a cable TV provider with almost none of the infrastructure costs. Eventually, he hopes, we'll see a real HD revolution from Apple and Google for this service." If Apple rolled something like this out to the service, would you bite on it? What would it take you to move to this over Tivo or MythTV?
Security

Submission + - Network Computing Editor Wins RSA Hacking Contest

richkarpi writes: Network Computing's security editor won the recent RSA Interactive Testing Challenge, er hacking, contest. Read his blow-by-blow description of the events:

>>I squeaked out a win in the tie-breaking challenge the first day with only a few seconds to spare as my opponent was right behind
>>in the hunt to combine three injectable fields into one long javascript function.

Read all the details: For Hackers, By A Hacker
Space

Submission + - Paraglider survives after soaring to 32,000 feet

mknewman writes: ***You need to add an Aeronautics Topic under Science, Space is not appropriate and there are loads of interesting articles about non-space related flying topics*** — http://www.msnbc.msn.com/id/17185299/ Paraglider survives after soaring to 32,000 feet Woman awakens encased in ice after going higher than Mount Everest A German paraglider was encased in ice and blacked out after being sucked into a tornado-like thunderstorm in Australia and carried to a height greater than Mount Everest. She survived. The 2005 World Cup winner was lifted 32,612 feet (9,940 meters) above sea level by the storm near Manilla in New South Wales state while preparing for the tenth FAI World Paragliding Championships next week. A 42-year-old Chinese paraglider, He Zhongpin, was killed by the same weather system, apparently from a lack of oxygen and extreme cold, the organizers said. His body was found on Thursday 47 miles from his launch site. Wisnerska, whose flight was tracked by her personal GPS and computer, landed 40 miles from her launch site.
Spam

Submission + - Spam Fighting: A Guide for the PHB

Kelson writes: "Esther Schindler of CIO Magazine asked spam fighters and mail administrators a question: What's the one thing about spam fighting that you most want you boss to understand? The resulting article is Getting Clueful: Five Things You Should Know About Fighting Spam. Top of the list is the prime directive: Lose No Mail — followed up with the arms-race nature of the problem (split into two points), basics of email technology, and understanding that spam isn't just an annoyance, it's a business. The findings should come as little surprise to most readers here, but if you need to explain to your manager why you can't just set up a filter and walk away, this is a good place to look."
Mozilla

Over 27% of Firefox Patches Come from Volunteers 107

dolphinling writes "Everyone is aware that the Mozilla Corporation makes some money, and employs some people now. Google has full-time employees working on Firefox too, as do a number of other places. Yet despite that, in the six months up to Firefox 2 some 27% of the patches to Firefox were submitted by key volunteers, and those patches represent 24% of changes made to the source code. What's more, those numbers only counted contributers with 50 patches or more, so the actual numbers are probably quite a bit higher. It's good to see that even as Mozilla does so well in the business world, it can still keep its ties to the community so strong." They were running these number to find out who they need to start offering support to. So: contribute to Firefox, and you know you'll get a hand up. Nice work, folks.

Slashdot Top Deals

With your bare hands?!?

Working...