Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Security

Submission + - Catching thieves with Flickr (heise-security.co.uk)

devkhadka writes: "Social networks can not only be used to make new contacts, but also to track down thieves as events last week at Flickr.com showed. Four laptops and two iMacs, one of which had a web cam, were stolen from Canadian office services provider WorkSpace. The Flickrbooth plug-in for Apple's Photo Booth was installed on the iMac with the web cam. The program automatically sends photos taken with the web cam to the selected Flickr account. An employee at WorkSpace was naturally surprised when he looked into his Flickr account and saw that a new image had been uploaded — one of a tattooed man posing in front of the stolen iMac. The man apparently knew that the iMac was taking pictures of him, but not that it was sending them to Flickr. The image quickly became viral in forums and blogs all over the world. Shortly after, the suspected thief turned himself over to the police according to a report in the Vancouver Sun. He claims that he bought the computer from a friend of a friend but wished to return it. WorkSpace now hopes to get additional information about who the actual thieves are."
Sci-Fi

Submission + - Best Career path for nerds and University courses. (hyperphp.com) 1

devkhadka writes: "Are you a Nerd ? so its a good time to u.The colleges around the world are starting to appeal to the nerds in all of us.Here are the best Career path for the nerds starting form ROM hacking n video Game design to Atrificial intelligence and Network security to Ethical hacking.This list of 25 courses and programs offered at colleges around the world identifies some of the nerdiest coursework, starting with the most obvious, and winding up with the most obscure..."
Debian

Submission + - Debian refuses to push timezone update for NZ DST (debian.org)

Jasper Bryant-Greene writes: Although a tzdata release which includes New Zealand's recent DST changes (2007f) has been out for some time, Debian are refusing to push the update from testing into the current stable distribution, codenamed Etch, on the basis that "it's not a security bug". This means that unless New Zealand sysadmins install the package manually, pull the package from testing, or alter the timezone to "GMT-13" manually, all systems running Debian Etch in New Zealand currently have the incorrect time, as DST went into effect this morning. As the last comment in the bug report says, "even Microsoft are not this silly".
Upgrades

Submission + - Fedora Unity Releases Updated Fedora Linux 7 Re-S (fedoraunity.org) 1

devkhadka writes: "The Fedora Unity Project is proud to announce the release of new ISO Re-Spins (DVD and CD Sets) of Fedora 7. These Re-Spin ISOs are based on Fedora 7 and all updates released as of September 12th, 2007. The ISO images are available for i386 and x86_64 architectures via jigdo starting Friday, September 28th, 2007. We have included CD Image sets for those in the Fedora community that do not have DVD drives or burners available. Fedora Unity has taken up the Re-Spin task to provide the community with the chance to install Fedora with recent updates already included. These updates might otherwise comprise more than 700MiB of downloads for a default install. This is a community project, for and by the community. You can contribute to the community by joining our test process."
Intel

Intel To Rebrand Processors In 2008 125

DJ notes that TechARP has up a look at Intel's plans to rebrand their processors, including what must be a leaked internal chart of the old and new landscape of product names. This story doesn't seem to have been picked up anywhere else yet. Quoting: "We just heard from an anonymous source that Intel will be rebranding their processors in 2008... These new brand names will come into effect on the first day of 2008. Intel hopes that these new brands will not only leverage the strong Core 2 brand but also make it less confusing for the consumer. At the moment, the Intel Centrino mobile platform has five different logos with brands like Centrino, Centrino Duo and Centrino Pro. Starting from January 1, 2008, Intel will consolidate the Centrino Duo and Centrino brands under the Intel Centrino brand, and rename the Centrino Pro as Intel Centrino with vPro Technology."
Microsoft

Submission + - Using Microsoft's anti-spam software to fight AIDS (businessweek.com)

mjasay writes: "Every once in awhile, Microsoft does something very right. Microsoft's anti-spam technology and a Windows server farm, along with some innovative thinking from Microsoft researcher David Heckerman, are helping to crack the HIV code. Why is Microsoft in the AIDS research game (especially given that its own desktop software has been a bit of an STD itself)? Because it's in the anti-spam game, and it turns out there are some similarities between the two. This sort of cross-industry pollination should happen more often, to better both software and other industries."
Privacy

Submission + - The hacker who got hacked by hackers

An anonymous reader writes: This is a story about a hacker who got hacked by hackers :) TPB files charges against media companies: Thanks to the email-leakage from MediaDefender-Defenders we now have proof of the things we've been suspecting for a long time; the big record and movie labels are paying professional hackers, saboteurs and ddosers to destroy our trackers. While browsing through the email we identified the companies that are also active in Sweden and we have tonight reported these incidents to the police. The charges are infrastructural sabotage, denial of service attacks, hacking and spamming, all of these on a commercial level. The companies that are being reported are the following: Twentieth Century Fox, Sweden AB; Emi Music Sweden AB; Universal Music Group Sweden AB; Universal Pictures Nordic AB; Paramount Home Entertainment (Sweden) AB; Atari Nordic AB; Activision Nordic Filial Till Activision (Uk) Ltd; Ubisoft Sweden AB; Sony Bmg Music Entertainment (Sweden) AB; Sony Pictures Home Entertainment Nordic AB. Stay tuned for updates.
AMD

Submission + - Pedal to the Metal: Overclocking the Athlon CPU (pcper.com)

Vigile writes: "Even with processors well exceeding the performance needs of most, overclocking is still a practice used by hardware enthusiasts. And even though the art of the overclock has improved dramatically, with all the new options, settings and considerations that go into overclocking a system beyond its rated speeds, the task can be daunting for anyone new to the game. A new educational article over at PC Perspective starts from the beginning with detailed descriptions of the how's and why's behind overclocking. A walk through of picking the right CPU, motherboard, memory and even power supply is included as is a typical BIOS setup and configuration process. This is really a great article for anyone that new, or rusty, to overclocking."
Security

Submission + - XP system previllage Vulnerability unpatched Yet (hyperphp.com)

devkhadka writes: "There is an boundary error in Windows XP, which can be exploited by malicious local users on a system to escalate their privileges.The vulnerability is caused by an unchecked buffer in the Windows schedular component used by Windows clients to schedule certain activity for future. A one or malicious code can exploit the vulnerability to cause a buffer overflow either resulting in a system crash or execution of arbitrary code with SYSTEM privileges. Here is the youtube video showing how to gain system previllage."
Intel

Submission + - Intel To Rebrand Processors In 2008 (techarp.com) 1

DJ writes: We just heard from an anonymous source that Intel will be rebranding their processors in 2008. From the Centrino mobile platform to the Itanium 2 server processors, Intel will revamp and consolidate their product lines under these new brands. These new brand names will come into effect on the first day of 2008. Intel hopes that these new brands will not only leverage the strong Core 2 brand but also make it less confusing for the consumer.

At the moment, the Intel Centrino mobile platform has five different logos with brands like Centrino, Centrino Duo and Centrino Pro. Starting from January 1, 2008, Intel will consolidate the Centrino Duo and Centrino brands under the Intel Centrino brand, and rename the Centrino Pro as Intel Centrino with vPro Technology.

Security

Submission + - F-Secure Antivirus for Servers does not check all (heise-security.co.uk)

devkhadka writes: "A flaw in the 64-bit version of F-Secure Antivirus for Windows Servers 7.00 prevents the software checking crafted archives or compressed executable files,which may allow attackers to smuggle manipulated files containing malicious code past the scanner. The vendor has published a security advisory containing a link to an update that eliminates this bug. So all the users are adviesed to update the software as soon as possible."
Security

Submission + - CA BrightStor Hierarchical Storage Manager execute (heise-security.co.uk)

devkhadka writes: "Computer Associates have released a security advisory in which they report the discovery of vulnerabilities in their BrightStor Hierarchical Storage Manager. Attackers can exploit the holes to inject arbitrary code or crash the service. An update has been released to close the holes. Whilst the CA advisory does not provide any details of the vulnerabilities, it does categorize the risk as critical. The vendor indicates that the CsAgent service does not check the length of some commands adequately. In addition, the software does not correctly check integer values it receives, which can result in buffer overflows. The result of the insufficient validation of strings in SQL statements remains unclear."
Security

Submission + - Uninvited remote maintenance via AIM [Update] (heise-security.co.uk)

devkhadka writes: "Security service provider Core Security has released a security advisory describing vulnerabilities in AOL Instant Messenger (AIM). The instant messaging software uses Microsoft's HMTL library mshtml.dll to display messages, but fails to adequately sanitise incoming messages, allowing attackers to execute arbitrary commands on AIM users' computers."
Security

Submission + - Picture theft through hole in Google's Picasa (heise-security.co.uk)

devkhadka writes: "The finders of the URI holes in Firefox and Windows are now targeting Google. In their blog, Billy Rios and Nate McFeters have described how attackers may steal all pictures organised using Google's picture gallery software Picasa from users' hard disks: It seems that they were able to load pictures from a PC onto a manipulated web server by combining various attack methods, such as cross-application scripting, cross-site scripting, URI tricks and a flash with ActionScript."
Security

Submission + - Deceptive file names under Vista (heise-security.co.uk)

devkhadka writes: "An Attackers can use Unicode character under Vista to conceal filenames and filename extensions. A demonstration by Max Ried makes an executable screen-saver file (.scr) look like a harmless image (.jpg).The display of the false filename is due to the inclusion of Unicode control characters that change the direction of writing. These are required for the Arabic language where writing runs from right to left. Unicode recognizes the control characters (PDF) right-to-left override (RLO, 202E) and left-to-right override (LRO, 202D) to switch the writing direction. more about this:
demonstration here"

Slashdot Top Deals

Software production is assumed to be a line function, but it is run like a staff function. -- Paul Licker

Working...