Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Microsoft

Microsoft Says Vista Has the Fewest Flaws 548

ancientribe writes "Microsoft issued a year-one security report on its Windows Vista operating system today, and it turns out Vista logged less than half the vulnerabilities than Windows XP did in its first year. According to the new Microsoft report, Vista also had fewer vulnerabilities in its first year than other OSes — including Red Hat rhel4ws, Ubuntu 6.06 LTS, and Apple Mac OS X 10.4 — did in their first years."
Portables

New Dell Laptops Give Users a Literal Shock 383

An anonymous reader writes "According to CNET.co.uk, certain new Dell laptops with a brushed-aluminum finish are giving users more than they bargained for. 'We know this because several CNET staff were hit with an electrical charge while using Dell's new XPS M1530 — and we're not the only ones. Dell's forums are littered with user complaints about the shocking experiences they've had with some systems. The problem only seems to occur in Dell laptops that have a brushed-aluminum finish. These include the XPS M1330 and XPS M1530. It's caused by the two-pronged connection between the mains lead and the power adapter, which isn't earthed properly because of its lack of a third pin. The laptop therefore exhibits an electrical potential (voltage) between its exposed metal parts (the brushed aluminum wrist pad) and earth ground. Since there is no earth, the human body basically acts as a wire that can conduct electric current, hence the tingling, jolting sensation.'"
Security

MD5 Proven Ineffective for App Signatures 117

prostoalex writes "Marc Stevens, Arjen K. Lenstra, and Benne de Weger have released their paper 'Vulnerability of software integrity and code signing applications to chosen-prefix collisions for MD5'. It describes a reproducible attack on MD5 algorithms to fake software signatures. Researchers start off with two simplistic Windows applications — HelloWorld.exe and GoodbyeWorld.exe, and apply a known prefix attack that makes md5() signatures for both of the applications identical. Researchers point out: 'For abusing a chosen-prefix collision on a software integrity protection or a code signing scheme, the attacker should be able to manipulate the files before they are being hashed and/or signed. This may mean that the attacker needs insider access to the party operating the trusted software integrity protection or code signing process.'"
Security

Losing Personal Info On A Laptop Could Get You Charged 199

E5Rebel writes "The UK's data protection watchdog has called for legislation that would punish corporate or government officials with access to the public's personal data ... who lose it. Unencrypted laptops with this personal information which are lost or stolen will see their owners facing criminal charges. 'HM Revenue and Customs is among the organisations that have recently suffered high profile data security breaches as a result of laptops being lost or stolen. The HMRC laptop containing taxpayer data was encrypted - but other organisations have often failed to encrypt their machines.'"
Software

Best Way to Build a Searchable Document Index? 216

Blinocac writes "I am organizing the IT documentation for the agency I work for, and we would like to make a searchable document index that would render results based on meta tags placed in the documents, which include everything from Word files, HTML, Excel, Access, and PDF's." What methods or tools have others seen that work? Anything to avoid?
Security

Time Running Out for Public Key Encryption 300

holy_calamity writes "Two research teams have independently made quantum computers that run the prime-number-factorising Shor's algorithm — a significant step towards breaking public key cryptography. Most of the article is sadly behind a pay-wall, but a blog post at the New Scientist site nicely explains how the algorithm works. From the blurb: 'The advent of quantum computers that can run a routine called Shor's algorithm could have profound consequences. It means the most dangerous threat posed by quantum computing - the ability to break the codes that protect our banking, business and e-commerce data - is now a step nearer reality. Adding to the worry is the fact that this feat has been performed by not one but two research groups, independently of each other. One team is led by Andrew White at the University of Queensland in Brisbane, Australia, and the other by Chao-Yang Lu of the University of Science and Technology of China, in Hefei.'"

Web OS, ajaxWindows Launched 211

BigRedFed writes "Michael Robertson, of mp3.com fame, Linspire.com fame (or infamy depending on your view point) and more recently, ajax13.com has released another interesting piece of web software. ajaxWindows they are calling it and it's an almost full fledged web based OS that you can use to transport around your documents and mp3 collection to any device with an internet connection and a full web-browser."
Windows

Software Missing From Vista's "Official Apps" 288

PetManimal writes "Microsoft has just released a list of 800 applications it says are 'officially supported' on Windows Vista. What's special about this list, however, are the programs that are not included: 'Popular Windows software that is conspicuously missing from Microsoft's list includes Adobe Systems Inc.'s entire line of graphics and multimedia software, Symantec Corp.'s security products, as well as the Mozilla Foundation's open-source Firefox Web browser, Skype Ltd.'s free voice-over-IP software and the OpenOffice.org alternative to Microsoft Office.' Another area in which Vista has found to be lacking is gaming, as discussed earlier on Slashdot."
Security

Submission + - Apple Patches Flaw That Lets Sites Photograph You

Gruber Duckie writes: Apple's security update 2006-008, posted yesterday, is a little more interesting than it sounds. According to information (and a demo!) posted at Macslash the "information leak" mentioned in Apple's advisory actually makes it possible for a web site to send whatever your (isight) web cam sees up to the server. I'm glad they fixed this quickly.

How Would You Usurp the Web Browser? 149

cyclomedia wonders: "I've been thinking about this for a while now, and a recent article posturing about Web 3.0 brought forward some other suggestions which basically boiled down to 'what should be next.' Everyone here knows that HTML, Javascript and HTTPRequest are not the tools for building feature-rich interactive networked applications, but that doesn't stop Google, Microsoft and others from trying their best to use them to build office suites and the like. As one project puts it: 'we need to replace the Document Browser with an Application Browser.' So, let's get the ball rolling with my question: What type of platform would you like to see delivering the 'true' Web 2.0 in the not too distant future?"

Opening Zune Sales Flaccid 451

An anonymous reader writes "As 'Black Friday' approaches and consumers line up for the Playstation 3 it looks like Zune has become an afterthought. Despite months of hype, opening Zune sales are only so-so. While Zune did reach the top 10 on Amazon's Top 25 list for electronic product sales on its first day, it quickly fell below the top 15 and continues to drop. Six separate iPod models now outsell it as well as SanDisk's e250 player. In-store sales are not much better."

Why Apple Can't Get Movie Content 132

An anonymous reader writes "This article analyzes Apple's negotiations with record companies and movie studios. It explains why Apple's preferences are aligned with those of consumers. Using a software model, it concludes that the iTunes Movie Store currently doesn't have the software/hardware lock-in that forced the music industry to agree to Apple's terms for the Music Store."

The Future of NetBSD 407

ErisCalmsme writes "In this email Charles Hannum (one of the founders of NetBSD) tells us that 'The NetBSD Project has stagnated to the point of irrelevance. It has gotten to the point that being associated with the project is often more of a liability than an asset. I will attempt to explain how this happened, what the current state of affairs is, and what needs to be done to attempt to fix the situation.' What will happen to NetBSD?"

What is the Ultimate Linux Development Environment? 643

nachmore asks: "I've been programming on Linux for a while now, always content to use vi for my editing and any debugger tools out there (gdb for C/C++, and so forth). As part of my SoC project I was working on Thunderbird (my first huge project on Linux) and I found that , although shell-based tools can do the job, they lack in easy project management, ease of debugging and other development features. I've only ever programmed with a GUI on Windows — and I have to admit that I find Dev Studio to be one of the few programs that Microsoft seems to have gotten (nearly) right. I've played around with Eclipse but find it's C/C++ support still lacking. So what GUIs would you recommend for Linux? I would like something with debugging (single step, step through, step-to-end, etc) support, CVS access and of course, support for large projects (e.g. Mozilla) and especially good support for C/C++. Is there anything really good out there, or is vi the way to go?"

How Much Virtual Memory is Enough? 544

whitroth asks: "Ten years ago, Received Wisdom said that virtual memory should be, on the average, two to two-and-a-half times real memory. In these days, where 2G RAM is not unusual, and many times is not that uncommon, is this unreasonable? What's the sense of the community as to what is a reasonable size for swap these days?"

Slashdot Top Deals

Nothing makes a person more productive than the last minute.

Working...