Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment huh? downloads not wrapped for me (Score 1) 228

I just downloaded nmap and vlc.  Both files were identical to what I got from the source.

Actually,it looks like cnet redirected me to the nmap.org download link (http://nmap.org/dist/nmap-5.51-setup.exe) using a 'META HTTP-EQUIV="Refresh" ...'.  VLC was still from cnet.com.

I'm not logged in; I wonder if I have a cookie that prevents the wrapper -- or if download.com changed something.

Also, I'm using NoScript and cnet/download.com is not allowed.  Perhaps this turns off the wrapper too.

Submission + - Duqu Virus Detected in Iran (ibtimes.com)

Pierre Bezukhov writes: "We are in the initial phase of fighting the Duqu virus," said Gholamreza Jalali, the head of Iran's civil defense organization. "The final report which says which organizations the virus has spread to and what its impacts are has not been completed yet."

Jalali added that Iran had developed software to combat the virus, and would thoroughly check all computers at main sites to keep the virus at bay.

Duqu first surfaced when security researchers at Symantec, based in Mountain View, Calif., learned about the threat from a customer. The bug is called Duqu because the files it creates have the prefix "DQ," but Symantec believes the bug is "a precursor to a future Stuxnet-like attack."

Many experts believe Stuxnet was likely designed as an American-Israeli project meant to sabotage computers Iran's nuclear sites.

It is still unknown if Duqu is motivated by politics or state movements, but Symantec believes the virus is designed to gain remote access capabilities and gather data for future cyber attacks.

"If it is the Stuxnet author, it could be that they have the same goal as before," said Symantec CTO Greg Day. "But if code has been given to someone else they may have a different motive."

Software

Submission + - Long Term Effects of RSA Security Breach (darkreading.com)

An anonymous reader writes: However, critics like Moy say that the choice to stick with the old, compromised tokens is less a risk-based decision and more a pragmatic one. "I'm sure there's always going to be customers who are comfortable with that," he says. "It's very hard to rip out the plumbing in your house to put in new plumbing and that's essentially what the identity solution is."

It's a matter of both inertia on the part of RSA customers and what Phil Lieberman, CEO of privileged identity vendor Lieberman Software calls 'incompetence' on the part of RSA's competitors in failing to draw more disillusioned SecureID users in the wake of the breach that has kept things pretty much in stasis despite the severity of the breach.

"It doesn't seem to matter that RSA's tokens have been compromised; nobody is getting off of them, nobody is changing," he says. "The competitors who could potentially make hay on the opportunity simply don't want the business. The concept of making products ubiquitous with off-the-shelf SKUs as RSA has done seems to elude all of the competitors that they have. In a sense, it's somewhat like what happened with Microsoft and Novell. Novell was better, but Microsoft made it easy and they were better at marketing and better at market control."

Nevertheless, the breach may have stirred some organizations that were already squirrelly about the security of one time passwords to look for more secure alternatives. According to Aberdeen Group, the percentage of IT departments planning to deploy PKI smart cards in the next 12 months increased two-fold between December 2010 and May 2011, and the demand for one-time passwords dropped three-fold. The firm's analysts pinned that fluctuating demand curve on the RSA breach.

Even if smart cards are not the multi-factor flavor of choice, and if an organization would prefer to work with OTPs, many within the authentication space say the RSA breach has at least brought the debate to a head as to whether or not it is a good idea to outsource the sensitive seed information fundamental to these tokens to an outside vendor. As the attack on RSA shows, all of that information for every customer can prove a tantalizing target for hackers.

As a representative vendor that provides just such an alternative, allowing organizations to program their own tokens, Stina Ehrensvard of Yubico says she's seen a lot of prospects not only from RSA's customer base but from other organizations that use OTPs from other vendors that also hold onto a big repository of seeds waiting to be stolen.

"They've said the best way to be sure that it is secure and that there isn't a bunch of secrets being stolen from a database is if you control those secrets yourself and program the tokens in-house," says Ehrensvard, CEO and founder of Yubico. "We heard from one Department of Defense contractor that made a security audit of their tokens that were manufactured and programmed in Asia, and it turned out there was a copy of their seeds not only in Asia, but also Europe. They were two databases that they had no control over and weren't sure if they'd already been copied."
 

Science

Submission + - Macroscopic wave–particle duality (archives-ouvertes.fr)

advid.net writes: A 'walking' drop on a liquid surface behave like a particle with wave properties: diffraction, interference patterns, vibration quantization.

First, in a vibrating container they put a liquid like silicon oil, vibrations are just bellow the Faraday instability threshold. Then a drop of the same liquid is dropped on the surface, but it does not coalesce, it bounces. And further bounces make a static wave pattern on the liquid surface just bellow the drop and its immediate neighborhood. As the spike grows, instability increases and the drop slides down the spike, and start moving horizontally.

Then they have a combo object drop+wave pattern moving at 1/10th the speed of wave in this liquid, straight. They call it a walker.

What is really amazing is that the wave pattern below the drop has some kind of memory: it has accumulated energy from several drop bounces. It can also make the drop see "forward", as the small wave pattern bounces back from nearby obstacles. So the drop is "aware" of its environment and "recall" the path it has followed.

Diffraction is observed and explained by the multiple reflexions the wave makes when the drop passes through a small hole, randomizing the wave pattern and the angle of the path afterward. Interference patterns observed are explained a la de Broglie: as the drop passes through one of the two holes, its associated wave passes through both, carrying forward the message of the second hole to the drop and changing the statistical repartition of the drop's path direction. One more stunning result: they are circling the drop by moving the container (Coriolis), then the associated wave adopts a discrete series of pattern, depending on the speed and radius. Very much like the energy quantization of electrons.
English (and French) abstract
A short article (French but it has photos and formulas)
Full thesis (French,10Mb)

Comment Re:Extremely Serious (Score 3, Informative) 165

Not only can you retrieve the password for any user on the system but you can also reset their password without having to know what it was.

According to the FTFA, you can only reset passwords for the currently logged in user. It doesn't say anything about resetting other user's passwords:

It appears Directory Services in Lion no longer requires authentication when requesting a password change for the current user [emphasis mine]

Still not good, but not nearly as bad as you suggest. Now, all that said, I don't have a Lion system on which to test resetting another using password using dscl. I can only hope it doesn't work.

Comment Re:Poor NASA server (Score 1) 269

Not sure if serious...

NASA's main web site is served by Akamai; I doubt they'll have an issue.

# dig www.nasa.gov

; <<>> DiG 9.6.-ESV-R4-P1 <<>> www.nasa.gov
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3588
;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 9, ADDITIONAL: 0

;; QUESTION SECTION:
;www.nasa.gov.                  IN      A

;; ANSWER SECTION:
www.nasa.gov.           300     IN      CNAME   www.nasa.gov.speedera.net.
www.nasa.gov.speedera.net. 120  IN      CNAME   www.nasa.gov.edgesuite.net.
www.nasa.gov.edgesuite.net. 21600 IN    CNAME   a1718.x.akamai.net.
a1718.x.akamai.net.     20      IN      A       184.51.157.10
a1718.x.akamai.net.     20      IN      A       184.51.157.17

Comment Re:Bootable (Score 1) 517

That link you posted is how to make a blank disk image. It does *not* tell you how to make a bootable image from which you can (re)/install the OS. When your hard drive fails, how are you going to install Lion on that brand-new replacement hard drive? It would be nice to have an external drive or optical media from which to boot, wouldn't it?

Comment Re:How? (Score 4, Informative) 304

Blackberries can be securely encrypted, but it caused me a unforeseen problem.

I use my blackberry to filter incoming emails and alert me based on the message contents (or subject, sender, time of day, etc.) You can't do that with the default email program -- you have to get a third-party app.

Unfortunately, if you encrypt the phone, the third-party app can't read the incoming emails anymore. It seems to be a platform limitation. (If someone can prove me wrong, please do so!) I *want* to encrypt my blackberry, but it would then become basically useless to me.

I have a password on it, of course, but that's not nearly as good as using device encryption.

Slashdot Top Deals

The last thing one knows in constructing a work is what to put first. -- Blaise Pascal

Working...