126675
submission
sproketboy writes:
The inquirer has a piece about some Broadcom driver code that was apparently copied into BSD using their license in violation of the GPL. The thread is here. Flame on.
123671
story
Jud writes
"Microsoft's fix for the .ANI vulnerability was part of Patch Tuesday yesterday. However, all is not well with the update. Reportedly, installing the patch will break applications such as Realtek HD Audio Control Panel and CD-Tag, which mentions they are affected by the problem on their main page. A hotfix is currently available from Microsoft, however their current position is this is an isolated problem and the fix is not planned to be pushed out through Microsoft Update. "
123241
story
An anonymous reader writes
"At the Black Hat Conference in Amsterdam, security experts from India demonstrated a special boot loader that gets around Vista's code-signing mechanisms. Indian security experts Nitin and Vipin Kumar of NV labs have developed a program called the VBootkit that launches from a CD and boots Vista, making on-the-fly changes in memory and in files being read. In a demonstration, the 'boot kit' managed to run with kernel privileges and issue system rights to a CMD shell when running on Vista, even without a Microsoft signature. The demo was run on Vista RC2. The researchers say the only reason they didn't do it on Vista final was cost. Schneier blogged the exploit."
122819
story
daviddennis writes
"According to the Seattle Post-Intelligencer, a lawsuit alleges that Microsoft engaged in deceptive practices by letting PC makers promote hardware as 'Windows Vista Capable' even though they knew it could not run most of Vista's widely-promoted features. Microsoft responds by saying that the differences have been promoted with one of the most extensive marketing pushes in company history. 'In sum, Microsoft engaged in bait and switch -- assuring consumers they were purchasing Vista Capable machines when, in fact, they could obtain only a stripped-down operating system lacking the functionality and features that Microsoft advertised as Vista ... As a result, the suit said, people were buying machines that couldn't run the real Vista.'"
122601
story
zdude255 writes
"Wired is running an article exploring several studies of giving the human brain 'new input devices.' From seeing with your sense of touch to entirely new senses such as sensing direction intuitively, the human brain seems to be capable of interpreting and using new data on the fly. This offers many applications from pilots being able to sense the plane's orientation to the potential recovery of patients with blindness or ear damage. (which helps balance).'It turns out that the tricky bit isn't the sensing. The world is full of gadgets that detect things humans cannot. The hard part is processing the input. Neuroscientists don't know enough about how the brain interprets data. The science of plugging things directly into the brain -- artificial retinas or cochlear implants -- remains primitive. So here's the solution: Figure out how to change the sensory data you want -- the electromagnetic fields, the ultrasound, the infrared -- into something that the human brain is already wired to accept, like touch or sight.'"
120347
submission
mail.app writes:
Microsoft Performs Illegal Operation, Shuts Down
Microsoft Corp. issued a surprise press release this morning announcing that the company had "performed an illegal operation and would be shut down." Company executives refused to provide further information regarding the cause of the unexpected shutdown, only issuing a cryptic error number of $00038FF577 and advising all interested parties to "contact their system administrator."
118971
story
MoreDruid writes
"Secunia reports a vulnerability in Windows Animated Cursor Handling. According to the linked article, the rating is "extremely critical". Microsoft has put up their own advisory on the subject, confirming this is a vulnerability that affects Windows 2000, XP, 2003 and Vista. The exploit has already been used in the wild. From the Secunia page: The vulnerability is caused due to an unspecified error in the handling of animated cursors and can e.g. be exploited by tricking a user into visiting a malicious website using Internet Explorer or opening a malicious e-mail message. Successful exploitation allows execution of arbitrary code."