Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Submission + - New yahoo.com compromise? 3

dcsmith writes: In the past few days I have received SPAM from four separate yahoo.com e-mail accounts belonging to friends or acquaintances. Some are regular, frequent Yahoo! users while others only have a yahoo.com e-mail address to access Yahoo Groups.

Has there been another as-yet-undisclosed breach at Yahoo?

Comment Google vs. ST:TNG computer (Score 1) 129

Apparently the ST:TNG computer couldn't even handle Boolean queries, much less queries with semantic awareness...

TROI: Computer, search for the term Darmok in all linguistic databases for this sector.
COMPUTER: Searching. Darmok is the name of a seventh dynasty emperor on Kanda Four. A mytho-historical hunter on Shantil Three. A colony on Malindi Seven. A frozen dessert on Tazna Five. A
TROI: Stop search. Computer, how many entries are there for Darmok?
COMPUTER: Forty seven.
.
.
.
DATA: Computer, search for the term Tanagra. All databases.
COMPUTER: Searching. Tanagra. The ruling family on Gallos Two. A ceremonial drink on Lerishi Four. An island-continent on Shantil Three
TROI: Stop. Shantil Three. Computer, cross-reference the last entry with the previous search index.
COMPUTER: Darmok is the name of a mytho-historical hunter on Shantil Three.
TROI: I think we've got something.

Internet Explorer

New IE Vulnerability Used In Targeted Attacks; IE9, IE10 Users Safe 169

An anonymous reader writes "Criminals are using a new Internet Explorer security hole to attack Windows computers in targeted attacks, though the vulnerability could end up being more widely exploited. While IE9 and IE10 are not affected, versions IE6, IE7, and IE8 are. It's great to see that the latest versions of IE are immune, but this new vulnerability is still bad news for Windows XP users and earlier since they cannot upgrade to more recent versions of Microsoft's browser. 'We are actively investigating reports of a small, targeted issue affecting Internet Explorer 6-8,' Dustin Childs of Microsoft Trustworthy Computing told TNW. 'We will take appropriate action to help keep customers protected once our analysis is complete. People using Internet Explorer 9-10 are not impacted.'"

Comment Re:Why not both? (Score 1) 354

I usually don't use the area code when dialing a number within the same area code, so I'm fairly sure there's no requirement to use the area code. Of course, that's only for the handful of numbers I actually hand-dial rather than just picking from my list of contacts.

It depends on whether the area code you are in is an overlay area with another area code. If all local calls from the phone you are using are within one area code, you can probably get away with 7-digit dialing. If you're in Northern Virginia, for example, 703, 571 and 540 can all be local calls (actually, 301, 240 and 202 in MD and DC may be local calls as well) so 10-digit dialing is required.

Comment Re:Was it justified (Score 1) 372

"No, scapegoat did not start with the Greeks. Scapegoat comes from the book of Leviticus where a goat was designated to be cast out into the desert as part of atonement for sins. The Greeks actually used a cripple, a beggar or a criminal for the practice you are thinking of, not a goat."

That is wishful thinking. The written Leviticus is younger than the Greek high culture, as Leviticus wasn't finalized until Josephus (AD 37– c.100, according to Wikipedia).

Jackass. Not only do you not know anything, you can't even quote the Wikipedia article on Leviticus correctly;

" ...scholars are practically unanimous that the book had a long period of growth, that it includes some material of considerable antiquity, and that it reached its present form in the Persian period (538–332 BC)

IOS

Submission + - iOS6 allows "Meeting Hijacking" via Exchange Server (technet.com)

dcsmith writes: Meeting hijacking is the intentional or unintentional changing of the ownership of a meeting (in this case, in MS Exchange). The new owner can modify or delete the meeting in ways that an attendee or invitee should not be able to.

Apparently the latest update to iOS6 increases the likelihood that an iPad/iPod user can hijack a meeting to which they have been invited.

With the recent release of iOS6, we have noticed a marked increase in support calls due to meetings having the owner of the meeting changed (sometimes called “meeting hijacking”).

Among Microsoft's recommended work arounds;

Block iOS 6 devices — Exchange server comes with the Allow/Block/Quarantine functionality that enables admins to block any device or user.

Tell users not to upgrade to iOS 6 or to downgrade their devices – This solution may work as a temporary fix until Apple provides a fix but many users may have already made the decision to update.


Slashdot Top Deals

THEGODDESSOFTHENETHASTWISTINGFINGERSANDHERVOICEISLIKEAJAVELININTHENIGHTDUDE

Working...