Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment An ASP site with a querystring for id? C'mon (Score 1) 267

Hmm I wonder how one could prevent this kind of mischief? Let's see... using Rails, you could:

In your Controller:

Student.find(:first, :conditions => params[:student])

In your View:

<%= h @student.html_summary %>

TFA shows an ASP site with some clear querystring id tied to a WHERE clause? Ack! You lost experience!

Comment Re:Saints Row 2 (Score 1) 398

Oh, Saints Row 2 had some serious co-op potential. Except it didn't. That was the most absurdly terrible port I've ever actually tried to play.

Freezing every 5 seconds at 5fps on my über PC on lowest settings is just unacceptable. By the third time you explode in horribly low graphics in a teleporting car crash and fail some mission - with another player, you just give up. How is someone capable of selling such a terrible, unplayable port and getting away with it is beyond me.

I'd say SR2 is on the top list there.

Security

Aurora Attack — Resistance Is Futile, Pretty Much 268

eldavojohn writes "Do you have branch offices in China? iSec has published a new report (PDF) outlining the severity of the attacks on Google.cn, allegedly by the Chinese government, dubbed 'Aurora' attacks. Up to 100 companies were victims, and some are speculating that resistance to such attacks is futile. The report lays out the shape of the attacks — which were customized per-company based on installed vulnerable software and antivirus protection: '1. The attacker socially engineers a victim, often in an overseas office, to visit a malicious website. 2. This website uses a browser vulnerability to load custom malware on the initial victim's machine. 3. The malware calls out to a control server, likely identified by a dynamic DNS address. 4. The attacker escalates his privilege on the corporate Windows network, using cached or local administrator credentials. 5. The attacker attempts to access an Active Directory server to obtain the password database, which can be cracked onsite or offsite. 6. The attacker uses cracked credentials to obtain VPN access, or creates a fake user in the VPN access server. 7. At this point, the attack varies based upon the victim. The attacker may steal administrator credentials to access production systems, obtain source code from a source repository, access data hosted at the victim, or explore Intranet sites for valuable intellectual property.' The report also has pages of recommendations as well as lessons learned, which any systems administrator — even those inside the US — should read and take note of."
Hardware

Submission + - 8 Brightest Hopes for Keeping Up With Moore's Law (discovermagazine.com)

audiovideodisco writes: For years, engineers have warned that our ever more powerful microchips are drawing closer to their physical limits; even Gordon Moore himself says the chips will soon fail to keep up with his eponymous law. But many researchers are hard at work on various technologies that could keep us on this pleasant exponential ascent awhile longer. This gallery presents some of the most promising, from improved photolithography to optical electronics to quantum computers.
Image

Man Defends His Right To Flip Off the Police Screenshot-sm 44

46-year-old Robert J. Ekas has filed a federal lawsuit to defend his First Amendment right to express himself by flipping off police officers. The trouble started in July 2007 when Ekas opened his sunroof and extended a middle finger to a deputy. The deputy turned on his flashing lights and pulled Ekas over. He was cited for an illegal lane change and improper display of license plates. He was acquitted of the charges. “I did it because I have the right to do it. We all have that right, and we all need to test it. Otherwise we’ll lose it," Ekas said. He claims the police have been harassing him ever since.
Government

The Billion Dollar Kernel 289

jesgar writes "The Linux kernel would cost more than one billion EUR (about 1.4 billion USD) to develop in the European Union. This is the estimate made by researchers from the University of Oviedo (PPT), whereby the value annually added to this product was about 100 million EUR between 2005 and 2007 and 225 million EUR in 2008. The estimated 2008 result is comparable to 4% and 12% of Microsoft's and Google's R&D expenses on whole company products. Cost model 'Intermediate COCOMO81' is used according to parametric estimations by David Wheeler. An average annual base salary for a developer of 31,040 EUR was estimated from the EUROSTAT. Previously, similar works had been done by several authors estimating Red Hat, Debian, and Fedora distributions. The cost estimation is not of itself important, but it is an important means to an end: that commons-based innovation must receive a higher level of official recognition that would set it as an alternative to decision-makers. Ideally, legal and regulatory frameworks must allow companies participating on commons-based R&D to generate intangible assets for their contribution to successful projects. Otherwise, expenses must have an equitable tax treatment as a donation to social welfare."
Education

Each American Consumed 34 Gigabytes Per Day In '08 245

eldavojohn writes "Metrics can get really strange — especially on the scale of national consumption. Information consumption is one such area that has a lot of strange metrics to offer. A new report from the University of California, San Diego entitled 'How Much Information?' reveals that in 2008 your average American consumed 34 gigabytes per day. These values are entirely estimates of the flows of data delivered to consumers as bytes, words and hours of consumer information. From the executive summary: 'In 2008, Americans consumed information for about 1.3 trillion hours, an average of almost 12 hours per day. Consumption totaled 3.6 zettabytes and 10,845 trillion words, corresponding to 100,500 words and 34 gigabytes for an average person on an average day. A zettabyte is 10 to the 21st power bytes, a million million gigabytes. These estimates are from an analysis of more than 20 different sources of information, from very old (newspapers and books) to very new (portable computer games, satellite radio, and Internet video). Information at work is not included.' Has the flow and importance of information really become this prolific in our daily lives?"
Power

Iron Mountain's Experimental Room 48 87

twailgum writes "Twenty-two stories underground in Iron Mountain's Western Pennsylvania facility, 'you'll find Room 48, an experiment in data center energy efficiency. Open for just six months, the room is used by Iron Mountain to discover the best way to use geothermal conditions and engineering designs to establish the perfect environment for electronic documents. Room 48 is also being used to devise a geothermal-based environment that can be tapped to create efficient, low-cost data centers.'"
Television

D-Link's New Boxee Box Runs Linux, Eyes Netflix 138

DeviceGuru writes "OpenBoxeeBox.com is reporting that D-Link's new DM-380 Boxee Box, demonstrated last night in New York at Boxee's Boxee Beta unveiling, runs Linux but does not yet stream Netflix video-on-demand titles. However, according to an unnamed Boxee insider, 'the goal is to have the device support Netflix.' The DM-380 features ports for HDMI, optical digital and analog audio, dual USB, and wired Ethernet, plus it has an SD card slot and built-in WiFi. Photos and screenshots are at OpenBoxeeBox, and additional details are on D-Link's website."
Power

Silicon As the New Lithium 211

hduff writes "While lithium-ion batteries offer better performance than lead-acid or ni-cad batteries, the supply of lithium is limited and the batteries can pose problems. Researchers at the Technion-Israel Institute are building a better battery with easily obtainable sand and air."
PlayStation (Games)

US Air Force Buying Another 2,200 PS3s 144

bleedingpegasus sends word that the US Air Force will be grabbing up 2,200 new PlayStation 3 consoles for research into supercomputing. They already have a cluster made from 336 of the old-style (non-Slim) consoles, which they've used for a variety of purposes, including "processing multiple radar images into higher resolution composite images (known as synthetic aperture radar image formation), high-def video processing, and 'neuromorphic computing.'" According to the Justification Review Document (DOC), "Once the hardware configuration is implemented, software code will be developed in-house for cluster implementation utilizing a Linux-based operating software."

Slashdot Top Deals

One small step for man, one giant stumble for mankind.

Working...