Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Google

Submission + - Eight ways to search the dark web beyond Google (askreamaor.com)

Rea Maor writes: "Google this, Google that, Google something else. But there's a lot more to the web than Google, and in fact Google only shows you a tiny bit of what's going on. You've heard of the "deep web" or "dark web" — the part not normally indexed by Google, and maybe even not by Yahoo, MSN, or Ask. Well, here's a little list presenting a few "rabbit holes" into that vast, uncharted territory!



Dogpile — In the first place, you can check the Big Four (Google, MSN, Yahoo, Ask) search engines all at once with Dogpile. Since other search engines use the indexes from one of these four, chances are if you cannot find it here and you are sure it exists, it is "dark" to the web.



Clusty — Clusty is a more comprehensive search, finding those deep, dark crevasses that other search engines pass over. I'd nominate Clusty for "the dark-web Google" Of course, the more inclusive you make a search engine, the more spam sites it will pick up, so you might have to wade through a lot of garbage.



USA Library of Congress — Good for finding research materials for scholarly interests.



Nelson Search — If you're looking for a journalistic piece, you can't beat the self-proclaimed search engine for journalists. If there was a news story on it, it's here.



Intute — Well, if the bots don't do a good enough job of weeding out the spam sites, how about giving the humans a go? Intute is the only search engine which uses only web pages quality-checked by human researchers — guaranteeing that you'll never get a spam hit!



AltaVista — What better way to search the dark web than use a dark search engine? AltaVista died in popularity when Google came out, but it's still kicking, and it returns hits similar to Clusty.



Wayback Machine — Maybe the page you're looking for no longer exists? that's OK, the Wayback Machine should have an index of it. The only snag here is, you have to give it an exact URL. Once you have that URL, you can find the entire history for the domain — sometimes through several owners!



Bloglines — A search engine just for finding blogs. Anything that's a blog is here, and these days the web is mostly blogs anyway!



Note that the whole thing behind the dark web is that it is mostly made of sites that are one of (a) spam sites rejected for quality (b) personal home pages, bulletin board archives, and other stuff not generally of interest to the public (c) academia, which lives in its own world (d) government, which lives in its own world (e) criminal and underground sites that aren't in too great a hurry to be found!"

Bug

Submission + - computer failures disrupt East Coast air traffic

jcgam69 writes: A cascading computer failure in the nation's air-traffic control system caused severe flight delays and some cancellations along the East Coast yesterday. A computer system in Atlanta that processes pilots' flight plans and sends them to air-traffic controllers failed early yesterday, Federal Aviation Administration spokeswoman Diane Spitaliere said. In response, the agency rerouted the system's functions to another computer in Salt Lake City, which overloaded under the increased volume of data, magnifying the problem.
The Internet

Submission + - AT&T : the new Death star 3.0

palewook writes: "First, Frontline detailed AT&T's co-operation with the NSA's domestic data logging program in Spying On The Home Front. Now, AT&T has decided to work on implementing a deep data packet inspection program of their own. After all, the NSA already logs AT&T network data to keep you safe, why not deploy technology to keep you safe from pirated content on AT&T's network. AT&T claims they will not violate user privacy or FCC directives. James W. Cicconi, an AT&T senior vice president, started working last week with the MPAA and the RIAA to develop anti-piracy technology. The old AT&T death star logo joke appears relevant again."
Software

Submission + - Any creative uses for an extra hard drive?

GM_Kombucha writes: "I just moved my music collection off of two internal hard drives, a 20 gig and a 60 gig, onto my much larger external drive. And now I have two utterly empty internals just itching for some action, but I can't for the life of me figure out how to get their motor spinning, if you know what I mean. My first thought was to dual-boot a Linux distro or two (with my current XP setup) but I've had some rather negative experiences on that end, what with my Wacom tablet and my ZyXEL card and my Radeon 9000. So I think I want to go a different route this time, but really, I don't know where to turn. Anyone have any creative, nerdy, semi-pointless uses for these babies? I can't run OS X... but I'm up for just about anything. Thanks!"
Security

Submission + - Whistle Blowing on SOX Violations

An anonymous reader writes: Hello slashdotters,
I work in an IT division in a major US based investment firm. It has recently come to my attention that my organization is regularly and intentionally lying to/decieving our internal auditors, as well as those from the SEC, in regards to several articles of the sarbanes oxley act, most blatantly the ones concerning electronic mail/messages.

The real problem is that everyone (right up to the CIO) is aware of it, yet they all seem content with the lies. Without getting into specifics, the auditors have little understanding of technology and blindly accept what they are told, even though it is far from the truth.

While [I hope] it hasn't lead to anything as terrible as Enron [yet?], it still doesn't sit right with me, but I am not sure what would be the best course of action.

I realize my employment would most likely be terminated for alerting the SEC, but what rights [if any] does a virtual whistle blower have these days? Would this brand me for life hindering future employment?
Security

Submission + - Overseas Hackers Steal 22,396 SSN's

ShelteredCoder writes: Got an email today to check out a story about the University of Missouri. A hacker broke into one of the systems and stole a bunch of SSN's. From the story:

A recent attack on the University of Missouri system computer database allowed overseas intruders to retrieve 22,396 names and Social Security numbers of individuals associated with the university...
The Internet

Submission + - Did Comcast raise their upload cap?

froboy writes: I just ran a speed test at speedtest.net and my Boston to NYC connection was ~15000 kb/s up and ~2000 kb/s down. In the past I have never been able to exceed 360 kb/s down. I had similar upload speeds to Florida as well. All of this happened after power cycling my router when performance was painfully slow. Has anyone else had the same experience? Did Comcast finally realize that people actually want decent upload speeds or are they just giving preference to the speedtest?
Spam

Submission + - Http:BL Returns Control of Websites to Web Admins

An anonymous reader writes: Project Honey Pot has been tracking spammers and harvesters for nearly two years. For all of that time, the front page of the site has promised that they would help "stop spammers before they even get your address." Today they made good on that promise with the launch of http:BL . Much like DNSBLs that protect mail servers (e.g., Spamhaus or SURBL), the new service allows website owners to query against the data gathered by Project Honey Pot's vast network of traps. Website administrators can then make decisions as to what visitors are allowed onto their site, blocking known email harvesters, comment spammers, or other malicious robots. They've published an API for the new service as well as opened an Apache module (mod_httpbl) that leverages the service for public beta testing.
NASA

Submission + - Did NASA Accidentally "Nuke" Jupiter?

An anonymous reader writes: Title: Did NASA Accidentally "Nuke" Jupiter? Source: Enterprise URL Source: http://www.enterprisemission.com//NukingJupiter.ht ml Published: Apr 11, 2007 NASA's decision to finally terminate Galileo in September 2003 via a fiery plunge into Jupiter, was designed to prevent any possible biological contamination of Europa from a future random collision with the spacecraft, once its fuel was exhausted. An engineer named Jacco van der Worp claimed that, plunging into Jupiter's deep and increasingly dense atmosphere, the on-board Galileo electrical power supply — a set of 144 plutonium-238 fuel pellets — would ultimately "implode"; that the plutonium Galileo carried would ultimately collapse in upon itself under the enormous pressures of Jupiter's overwhelming atmosphere and go critical. Noone listened. One month later ... October 19, 2003 — an amateur astronomer in Belgium, Olivier Meeckers, secured a remarkable image, a dark black "splotch" showing up on the southern edge of Jupiter's well-known "North Equatorial Belt," trailing a fainter "tail" southwest (image center). Richard Hoagland http://www.libertypost.org/cgi-bin/readart.cgi?Art Num=183496 has now calculated that, given the slow fall through a highly pressurised atmosphere, it is possible that the splotch is the result of about 50lb of plutonium going critical 700 miles below. Way to go, NASA!
Netscape

Submission + - Netscape's Last Windows-only Version Released

Juha-Matti Laurio writes: "After more than a half year Netscape Communications has released its version 8.1.3 of Netscape Browser. This update includes nine security patches. According to Heise Security Netscape states that it has now updated its browser to the level of Firefox 1.5.0.8 — the current version is 1.5.0.11, however. The upcoming Netscape 9 is planned to be a multi-platform browser."
Businesses

Journal Journal: What makes an FTPD

I was told to review FTP daemons by my employer and I would like the rest of the community to weigh in on what makes a good ftp server. Not the hardware but the software daemon. Is there a reputation to go on to differentiate between the heavyweights and the backwaters of ftp daemons? what are your favorites?, How did you choose?
Security

Submission + - Fun with Online VoIP Hacking

ddonzal writes: "Ok... We all have heard of Vonage and the other VoIP providers that will give you unlimited phone services over your broadband connection using your regular old phone. But there are other services that are similar but have a few extra fun options. Let's take a look. Disclaimer: This paper and the topics covered in the paper are just for educational purposes and should not be tried on a network without permission from owner of the network/service you plan on testing. I hold no responsibility for any actions or damage that might accrue if you try anything explained in this paper. http://www.ethicalhacker.net/content/view/127/24/"
Security

WEP Broken Even Worse 393

collin.m writes in with news of results out of Darmstadt. Erik Tews and others there have demonstrated how to recover a 104-bit WEP key in under a minute, requiring the capture of fewer than 10% the number of packets the previous best method called for. The paper is here (PDF). Quoting: "We were able to extend Klein's attack and optimize it for usage against WEP. Using our version, it is possible to recover a 104 bit WEP key with probability 50% using just 40,000 captured packets... for 85,000 data packets [the success probability is] about 95%... 40,000 packets can be captured in less than one minute under good condition. The actual computation takes about 3 seconds and 3 MB main memory on a Pentium-M 1.7 GHz..."

Slashdot Top Deals

What good is a ticket to the good life, if you can't find the entrance?

Working...