Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

Two Unpatched Flaws Show Up In Apple iOS 171

Trailrunner7 writes "The technique that the Jailbreakme.com Web site is using to bypass the iPhone's security mechanisms and enable users to run unapproved apps on their phones involves exploiting two separate vulnerabilities. One of the vulnerabilities is a memory-corruption flaw that affects the way that Apple's mobile devices, including the iPad and iPod Touch, display PDFs. The second weakness is a problem in the Apple iOS kernel that gives an attacker higher privileges once his code is on a targeted device, enabling him to break out of the iOS sandbox. The combination of the two vulnerabilities — both of which are unpatched at the moment — gives an attacker the ability to run remote code on the device and evade the security protections on the iPhone, iPad or iPod Touch. The technique became public earlier this week when the Jailbreakme.com site began hosting a set of specially crafted PDF files designed to help users jailbreak their Apple devices and load apps other than the ones approved by Apple and offered in its official App Store."
Cellphones

Browser-Based Jailbreak For iPhone 4 Released 154

WrongSizeGlass writes "Apple Insider is reporting on a browser-based 'jailbreak' for iPhone 4. Hackers on Sunday released the first 'jailbreak' for the iPhone 4, a browser-based exploit that allows users to run unauthorized code. Unlike previous jailbreaks, which required users to run software on their Mac or PC and tether their iPhone to their computer, the latest hack is done entirely within the Safari browser. Users simply visit the URL to begin the process, which modifies the iOS mobile operating system found on the iPhone, iPod touch and iPad. Some users have reported that the modification results in broken MMS and FaceTime functionality. This jailbreak does not work on iPads running iOS 3.2.1. "
Games

Submission + - Blizzard Claims Ownership of All Starcraft II Maps 5

ccherlin writes: The EULA of Starcraft II contains an extremely disturbing clause:

3. Map Editor. The Game includes a program that allows you to create custom levels, maps, scenarios
or other materials for use in connection with the Game (the “Map Editor”). The following terms are specific to the Map Editor:
a. Map Content. You understand that the content required to create or modify STARCRAFT® II
Modified Maps (as defined below) is included in the STARCRAFT® II game client, and that all
such content is owned by Blizzard and governed by this Agreement. YOU ACKNOWLEDGE AND
AGREE THAT ALL MAPS, LEVELS AND OTHER CONTENT CREATED OR MODIFIED USING THE MAP
EDITOR (COLLECTIVELY, “MODIFIED MAPS”) ARE AND SHALL REMAIN THE SOLE AND EXCLUSIVE
PROPERTY OF BLIZZARD. WITHOUT LIMITING THE FOREGOING, YOU HERE BY ASSIGN TO
BLIZZARD ALL OF YOUR RIGHTS, TITLE AND INTEREST IN AND TO ALL MODIFIED MAPS, AND
AGREE THAT YOU WILL EXECUTE FUTURE ASSIGNMENTS PROMPTLY UPON RECEIVING SUCH
A REQUEST FROM BLIZZARD.

Prior Blizzard games like Warcraft III had EULA provisions that prohibited selling maps created with their editor, but the copyright remained with the map maker. Now? Anyone who creates a new, popular mod like DotA with the Starcraft II editor will have no rights to their own creation.
Cellphones

Droid X Gets Rooted 97

An anonymous reader writes "The Droid X forums have posted a procedure to root the new Motorola Droid X, putting to rest Andoid fans' fears that they would never gain access to the device's secrets due to a reported eFuse that would brick the phone if certain boot files were tampered with. Rooting the phone is the first step in gaining complete control over the device."
Media

IEEE Working Group Considers Kinder, Gentler DRM 236

slave5tom writes "An IEEE working group is trying to put the genie back in the bottle. Its scheme will allow unlimited copying of encrypted content, which will require a playkey to activate. Trying to add a cost by making the playkey 'rivalrous' (what you take I lose) and rescuing the big content players from the brink of oblivion does seem futile, but it is entertaining to watch them fight the inevitable."
Cellphones

O2 Scraps Unlimited Data Usage For Smartphones 272

Jagjr writes with news that O2, a major UK wireless provider, appears to be following in AT&T's footsteps by scrapping its unlimited data plan for smartphone customers. New customers, or ones who upgrade, will be capped at either 500MB or 1GB per month. Reader Barence adds this excerpt from PC Pro: In a blog post defending the new policy, O2's CEO claimed 0.1% of the network's users were consuming almost a third of the traffic, while the average O2 user consumes only 200MB of data. By PC Pro's calculations, that means those 26,000 heavy users are consuming an average of 65GB per month over a 3G connection. O2 had 26 million customer accounts at the start of 2010, so it has 26,000 heavy data users. 26 million x 200MB = 5,200,000,000 MB total data usage across the network per month. 5,200,000,000MB ÷ 3 = 1,733,333,333MB per month used by the 26,000 heavy data users. That means the average heavy data user consumes a staggering 66,666MB (so around 65GB) per month."
Games

Violent Video Games Only Affect Some People 236

An anonymous reader writes "The media would have you believe that violent video games will be the downfall of our civilization and the cause of moral decline in young people. A recent study suggests that most people aren't so easily influenced by the violence; instead, just a few bad apples are likely to react poorly, with everyone else showing little or no effect from playing these games." The American Psychological Association has posted the academic paper (PDF) as well, in addition to a few related studies. One examines how games can be a force for good (PDF), and another looks at the motivations behind children playing such games (PDF).
Movies

Why Are Video Game Movies So Awful? 385

An article at CNN discusses why big screen interpretations of video games, even successful ones, often fail to succeed at the box office. Quoting: "The problem with successfully adapting video games into hit Hollywood spin-offs may lie in the way in which stories for both mediums are designed and implemented. Game makers chasing the dream of playing George Lucas or Steven Spielberg will always strive to coax human emotion and convincing drama from increasingly photorealistic virtual elements. The Hollywood machine, in its endless chase for big bucks, can't help but exploit the latest hit interactive outing, often failing to realize it's often a specific gameplay mechanic, psychological meme or technical feature that makes the title so compelling. Both sides may very well continue to look down in disdain on the work that the opposite is doing, which can doom any collaborative efforts. But where the two roads truly diverge is in the way stories are fundamentally told. Films offer a single, linear tale that's open to individual interpretation, whereas games are meant to be experienced differently and in a multitude of ways by every player." On a related note, reader OrangeMonkey11 points out that an 8-minute short has showed up online that appears part of a pitch for a potential Mortal Kombat reboot movie. Hit the link below to take a look.
Power

Plug vs. Plug — Which Nation's Socket Is Best? 1174

CNETNate writes "Is the American mains socket really so much worse than the Italian design? And does the Italian socket fail at rivaling the sockets in British homes? This feature explores, in a not-at-all-parodic-and-anecdotal fashion, the designs, strengths and weaknesses of Earth's mains adapters. There is only one conclusion, and you're likely not to agree if you live in France. Or Italy. Or in fact most places." (For more plug pics and details, check out Wikipedia's list of the ones in current use.)
The Internet

Lawmakers Caught Again By File-Sharing Software 203

An anonymous reader writes "A document, apparently a 'confidential House ethics committee report,' was recently leaked through file-sharing software to the Washington Post. According to the article, 'The committee's review of investigations became available on file-sharing networks because of a junior staff member's use of the software while working from home.' Of course, P2P software is entirely at fault for this incident. If you begin seeing more interest in DRM from Congress, you now know why." Reader GranTuring points out that the RIAA took the opportunity to make a ridiculous statement of their own. They said, "the disclosure was evidence of a need for controls on peer-to-peer software to block the improper or illegal exchange of music."
Government

Internet Probably Couldn't Handle a Flu Pandemic 341

Several readers including mikael and gclef noted a report from the General Accountability Office suggesting that it should be Homeland Security's job to make sure the nation's business can flow during a pandemic. In particular, if H1N1 sends workers and schoolchildren home in large numbers, GAO thinks it might be a good idea for ISPs to prioritize traffic (favoring commerce over games, say), to reduce network speeds, and possibly to shut down high-traffic Web sites. DHS retorts that not only isn't it their job to control the Internet in this way, but the GAO is naive to believe it's even possible: "An expectation of unlimited Internet access during a pandemic is not realistic." "[DHS] does not even have a plan to start work on the issue, the General Accountability Office said. But the Homeland Security Department accused the GAO of having unrealistic expectations of how the Internet could be managed if millions began to telework from home at the same time as bored or sick schoolchildren were playing online, sucking up valuable bandwidth. Experts have for years pointed to the potential problem of Internet access during a severe pandemic, which would be a unique kind of emergency. It would be global, affecting many areas at once, and would last for weeks or months... Many companies and government offices hope to keep operations going as much as possible with teleworking using the Internet. Among the many problems posed by this idea, however, is the issue of bandwidth..."
The Internet

1Mb Broadband Access Becomes Legal Right In Finland 875

An anonymous reader writes "Starting next July, every person in Finland will have the right to a one-megabit broadband connection, according to the Ministry of Transport and Communications. Finland is the world's first country to create laws guaranteeing broadband access. The Finnish people are also legally guaranteed a 100Mb broadband connection by the end of 2015."
Bug

Major Snow Leopard Bug Said To Delete User Data 353

inglishmayjer was one of several readers to send in the news of a major bug in Apple's new OS, 10.6 Snow Leopard, that can wipe out all user data for the administrator account. It is said to be triggered — not every time — by logging in to the Guest account and then back in to the admin account. Some users are reporting that all settings have been reset and most data is gone. The article links to a number of Apple forum threads up to a month old bemoaning the problem. MacFixIt suggests disabling login on the Guest account and, if you need that functionality, creating a non-administrative account named something like Visitor. (The Guest account is special in that its settings are wiped clean after logout.) CNet reports that Apple has acknowledged the bug and is working on a fix.

Slashdot Top Deals

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...