Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:yea. (Score 1) 216

No one believes it, and you're not making us think you have a big dick.

Also - not what I claimed. I claimed condoms break easily, and to be honest it doesn't really have much to do with the size - it's more about adequate lubrication for the full duration.

Oh so now you're not claiming you have a big dick but that you last forever. Your girlfriend must be impressed ;-)

Comment Traffic Lights? (Score 3, Insightful) 483

Wouldn't it make sense to install traffic lights first? Seems like some order on the road rather than chaos would reduce the accident rate much more than ticketing speeders (who will likely just continue to speed). Either way there are commercial products available for this application. Sorry I have no links but in southern California red light cameras are all over the place. Our neighbors in Arizona also have "portable" speed cameras that they trailer to locations where speeding is an issue.

Submission + - Twitter App for Android Unsafe over Wifi

DominatorDan writes: So I was capturing my traffic with Shark for Root and noticed that my Twitter username and password were sent in the clear when the app updates on my Droid over WiFi. I'm going to uninstall the app until SSL or some other type of encryption is enabled. I have not performed a capture over CDMA, but I plan to. Until its fixed, get thee to a free hot-spot and start capturing data.... You'll never know what you might find!
Bug

Root Privileges Through Linux Kernel Bug 131

Lars T. writes "The H has a story about a Linux kernel bug that allows root level access. 'According to a report written by Rafal Wojtczuk (PDF), a conceptual problem in the memory management area of Linux allows local attackers to execute code at root level. The Linux issue is caused by potential overlaps between the memory areas of the stack and shared memory segments.' SUSE maintainer Andrea Arcangeli provided a fix for the problem in September 2004, but for unknown reasons this fix was not included in the Linux kernel. The bug is not related to the X Server bug found by Brad Spengler." As the linked article notes: "SUSE itself has the fix and SUSE Linux Enterprise 9, 10 and 11 as well as openSUSE 11.1 through 11.3 do not exhibit this vulnerability."
Windows

Submission + - 40 Windows Apps Said to Contain Critical Bug (computerworld.com)

CWmike writes: About 40 different Windows applications contain a critical flaw that can be used by attackers to hijack PCs and infect them with malware, says HD Moore, chief security officer at Rapid7 and creator of the open-source Metasploit penetration-testing toolkit. Gregg Keizer reports that the bug was patched by Apple in its iTunes software for Windows four months ago, but remains in more than three dozen other Windows programs, s. Moore did not reveal the names of the vulnerable applications or their makers, however. Each affected program will have to be patched separately. Moore first hinted at the widespread bug in a message on Twitter on Wednesday. 'The cat is out of the bag, this issue affects about 40 different apps, including the Windows shell,' he tweeted, then linked to an advisory published by Acros, a Slovenian security firm.

Comment Re:Alien Versus Predator (Score 1) 379

whoa. hold on there.

you're saying we have crappy GUI webapps, and the reason they are so crappy is because a designer (ie a non-coder) created them and not a programmer.

No, I said "web sites and applications that don't work like they should". The applications in question may be visually stunning but if they don't work reliably then what they look like is a moot point.

If there's one thing I know, its this: Never let a programmer create any form of GUI.

Comes back to my point about using the correct tool for the job. Either way I find an application that reliably performs its intended task but has a horrible UI much more valuable than an application that doesn't perform it's intended task but has a beautiful UI.

In an ideal world, we'd have design separate from the code

Agreed. Not familiar with Flash and it's tools but definitely seen improvement in this realm from Microsoft with WPF/Silverlight/XAML and the Visual Studio/Expression tools. It's far from perfect but definitely a step in the right direction from Winforms :-)

Security

Submission + - Critical Flaw Found in 40 Windows Apps (threatpost.com)

Trailrunner7 writes: Metasploit’s HD Moore was in the midst of researching the recently patched LNK (Windows shortcut) vulnerability when he stumbled upon a serious problem that exposes more than 40 different Windows software programs to remote code execution attacks. Moore issued a brief warning about the issue via Twitter and linked to a critical bulletin from Acros, a Slovenian security research outfit, that references a remote code execution bug patched in Apple’s latest iTunes update.

According to the advisory, all a remote attacker has to do is plant a malicious DLL with a specific name on a network share and get the user to open a media file from this network location in iTunes — which should require minimal social engineering. “I ran across it working on the shortcut bug and about fell out of my chair,” Moore said in an interview. “It made the LNK exploit almost pointless.”

Comment Re:Alien Versus Predator (Score 2, Insightful) 379

Wake me up when Microsoft comes up with a tool that allows non-coder graphic designers or animators to create entire apps in Silverlight with the same ease that you can with Flash.

The assumption that a non-coder can code an application (using any tool/language/whatever) is exactly why the web is littered with crappy web sites and applications that don't work like they should.

People have skills in particular areas and need to recognize that and know when to ask for help. For instance I have a knack for coding but not graphics/design. So when I'm coding up a new web application I go search for a template/designer/whatever I need to fill the gap in my skill set.

Graphics

Submission + - Mac Steam Prompts OSX Graphics Update (thinq.co.uk)

Stoobalou writes: Mac gamers got a massive boost when online gaming hub Steam started supporting the platform a few months ago.

The arrival of the online service, which allowed Mac-toting gamers to play the same games as their PC brethren, in some cases simultaneously, created a great deal of debate between the two camps, with the PC crowd pillorying Mac fans for the relatively poor performance of their expensive hardware.

Now it seems that Apple has got the message and has provided a graphics update for OS X Snow Leopard which will go some way towards closing the gap between the two platforms.

Comment Re:Convenient (Score 1) 259

Have you ever seen a shell server compromised by a non-customer? You are talkling about your shitty little ISP experience, not some theoretical possibility, right?

Yes I have. Must be nice to live in a world where the only possibilities are the ones you believe.

Don't even try that shit. Your most prominent statement was the claim that you have observed that Linux servers were compromised more often than Windows server. You backed it with fallacies, spin and your experience that -- if it was true or relevant in the first place -- is in no way applicable for any comparison.

No my most prominent statement was "in my experience" and then I went on to convey that experience. Sorry my experience is that of the Linux/Windows servers I've had on the internet and the Linux servers being compromised more than my Windows servers. I know my personal real world experience is really upsetting you but I even gave very clear reasons as to why my experience was such. You want to ignore all that and pretend that I said "Windows is more secure than Linux" or "Windows is easier to maintain than Linux"

If you want to discuss your most idiotic (though less prominent) claim that one has to be "vigilant" to run Linux servers in a secure manner (as opposed to merely implementing well-known sane policies and apply updates when they are released), you are welcome to do it after renouncing your claims of having demonstrated it with your shitty experience running shell servers.

If you want to twist my words into something I didn't say then go right ahead. My point was that unless you are vigilant on security under ANY operating system then you will be less secure than someone else who is.

PS: "...to merely implementing well-known sane policies and apply updates when they are released..." is being vigilant about security. A home user that ignores updates is not being "vigilant" about security.

Comment Re:Convenient (Score 1) 259

1. All compromises of a Linux shell servers ARE privilege elevation -- because every intruder starts from having a valid local an account on it.

Are you for real? A non-customer would not have a local account.

2. A privilege elevation on a Windows server would not even be an exploit because Windows server does not run untrusted content -- if you have an account on hosted Windows server that can install things, you are its administrator already, so there is nothing to exploit.

Why are you still arguing Linux vs. Windows? My post has never had anything specific to Windows vs. Linux and you'd know that if you bothered to read before responding.

3. Windows desktops suffer from privilege escalation exploits all the time. So would any system that would provide remotely accessible shell accounts on Windows server.

Sigh...

4. You are still pretending that anything you have observed has something to do with remote exploits, quality of maintenance, and other irrelevant and stupid statements that you made and I have ignored.

Again if you'd read my posts you'd know what my point is. I'll give you a hint, it has nothing to do with anything you wrote there.

Comment Re:Convenient (Score 1) 259

I wonder why did you make such an omission. Perhaps to create an appearance of support for your completely invalid claims?

First I fail to see how my claim is invalid. It's popular belief that software X is more secure than software Y simply because it is less desirable for someone to attack.

So how do you compare exploits seen by a Linux shell provider with exploits you have seen being a Windows shell provider?

Ummm because my point was that machines with higher value (ie: ones customers use/have access to) are of more likely to be attacked...

And you conveniently did not mention that you counted exploits on a poorly run shell server vs. Windows "server" that never runs anything you didn't put on it (and they apparently still were copromised, just less often than your shell servers).

I mentioned my compromised MS-DOS machine more as a joke (I was probably 12, running a BBS gave the wrong person sysop...)

I think the Linux servers were maintained pretty well actually but what do I know? Oh and I clearly mentioned the difference between users having access to my Linux servers and not my Windows Servers.

If it's too hard for you guys to see my point because I mentioned Linux and Windows in the same post and got your panties in a bunch then think about this...

My console is connected to the internet. To an attacker it's a lower value target than say a PC on the same network that I do my online banking on. Just because my console is lower value to an attacker doesn't inherently doesn't make it any more or less secure than my PC.

Comment Re:Convenient (Score 3, Interesting) 259

Reference please? Which Linux servers? Red-hat? Debian? SELinux enabled?

Sounds like you know a lot about the subject..

This was between 1999 and 2003 when a partner and myself were running a small web hosting/shell company Mach Nine Internet Services, http://www.mach-nine.com/ (under construction now?), http://www.lomag.net/information/news.php

Always Redhat... started with 6 (which was the 2.2 kernel...) and think we ended at 7.1.

In any case this small period of time was the only time I've had Linux servers publicly available on the internet and two of three machines were rooted due to a (2.4?) kernel flaw that made it trivial to escalate privileges if you had a shell (which being a shell provider...). Since then I've had several Windows servers publicly servicing the internet but the difference is that they are for my personal use and not high profile (in relation to my old Linux servers) targets.

My statement was not one about the inherent security of one OS over the other. There is more I could have done to prevent the root attacks on the Linux machines and I don't deny that. I'm repeating myself here but my point was:

In general it's not the OS keeping you secure it's how valuable of a target you are and how vigilant you are at security.

Comment Re:Convenient (Score 2, Interesting) 259

It's not a PDF flaw, it's a flaw in Linux kernel. The malicious PDF file was just an example for an attack vector. You know, the same way it works in Windows. No system is immune to these kind of attacks, the only reason Linux and Macs see them less is because most of the users are on Windows (especially the "stupid" or casual ones). Not even the walled gardens like iPhone, where PDF attack was used to root and jailbreak the system just recently.

You got it spot on. Although in my personal experience I've had more Linux servers compromised than Windows ones. Could be the fact that in general my Linux servers are exposing services to the internet where as my Windows servers are not. Or it could be the fact that at times questionable users (ie: customers) have had access to my Linux boxes. Oh and then there was one time my MS-DOS server was compromised (lol).

In general it's not the OS keeping you secure it's how valuable of a target you are and how vigilant you are at security.

IT

Submission + - Microsoft Silverlight 4 vs. Adobe Flash 10.1 (infoworld.com)

snydeq writes: "InfoWorld's James Borck provides an in-depth comparison of Silverlight 4 and Flash 10.1 from a developer's perspective. 'Adobe has improved the developer experience and finally constructed a bridge to its formidable design suite, but Microsoft has come further faster,' Borck writes, noting that Silverlight now challenges the long-held RIA supremacy of Flash, Flex, and AIR with superior development tools and design tool integration. 'For the moment, the decision is between Microsoft's strong developer orientation and Adobe's emphasis on design. For any enterprise project requiring heavy programming or data access, especially in-house applications that would benefit from Windows desktop integration, Silverlight is the top choice. However, if your application will be making basic service calls to feed data and won't require a lot of processing overhead, or if your goal is eye-popping layouts or 3D graphics for customer-facing communications — i.e., whenever the development process is design-intensive — then you'll benefit from Adobe's designer-oriented approach.'"

Slashdot Top Deals

"Marriage is low down, but you spend the rest of your life paying for it." -- Baskins

Working...