Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security

A Cyber-Attack On an American City 461

Bruce Perens writes "Just after midnight on Thursday, April 9, unidentified attackers climbed down four manholes in the Northern California city of Morgan Hill and cut eight fiber cables in what appears to have been an organized attack on the electronic infrastructure of an American city. Its implications, though startling, have gone almost un-reported. So I decided to change that."
Linux Business

"Good Enough" Computers Are the Future 515

An anonymous reader writes "Over on the PC World blog, Keir Thomas engages in some speculative thinking. Pretending to be writing from the year 2025, he describes a world of 'Good Enough computing,' wherein ultra-cheap PCs and notebooks (created to help end-users weather the 'Great Recession' of the early 21st century) are coupled to open source operating systems. This is possible because even the cheapest chips have all the power most people need nowadays. In what is effectively the present situation with netbooks writ large, he sees a future where Microsoft is priced out of the entire desktop operating system market and can't compete. It's a fun read that raises some interesting points."
Security

Intel Cache Poisoning Is Dangerously Easy On Linux 393

Julie188 writes "A researcher recently released proof-of-concept code for an exploit that allows a hacker to overrun an Intel CPU cache and plant a rootkit. A second, independent researcher has examined the exploit and noted that it is so simple and so stealthy that it is likely out in the wild now, unbeknownst to its victims. The attack works best on a Linux system with an Intel DQ35 motherboard with 2GB of memory. It turns out that Linux allows the root user to access MTR registers incredibly easily. With Windows this exploit can be used, but requires much more work and skill and so while the Linux exploit code is readily available now, no Windows exploit code has, so far, been released or seen. This attack is hardware specific, but unfortunately, it is specific to Intel's popular DQ35 motherboards."
Transportation

MIT Team Creates Shock That Recharges Your Car 281

An anonymous reader writes "If you had a GenShock, you may not mind those potholes in the road any longer because this new prototype shock actually harvests energy from bumps in the road to save on fuel. A team of students at MIT have invented a shock absorber that harnesses energy from small bumps in the road, generating electricity while it smooths the ride more effectively than conventional shocks. Senior Shakeel Avadhany and his teammates say they can produce up to a 10 percent improvement in overall vehicle fuel efficiency by using the regenerative shock absorbers. They also already have a lot of interest in their design, specifically the company that builds Humvees for the army are already planning to install them in its next version of the Humvee."

Comment What about crypto modes? Never heard of CBC, CTR? (Score 3, Insightful) 155

I just scanned these articles, but just from the fact I don't see a single occasion to talk about crypto modes, such as ECB,CBC,OFB,CFB,CTR etc., I'm unhappy.

20+ years old knowledge, probably badly designed software, some special attack against very bad design, and then a panic-like hype against encryption.

So please, tell the newspaper writers to learn somewhat about security and only after that start to write hype-like articles..
Sad.

Slashdot Top Deals

"More software projects have gone awry for lack of calendar time than for all other causes combined." -- Fred Brooks, Jr., _The Mythical Man Month_

Working...