Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security

Apple Keyboard Firmware Hack Demonstrated 275

Anonymouse writes with this excerpt from SemiAccurate: "Apple keyboards are vulnerable to a hack that puts keyloggers and malware directly into the device's firmware. This could be a serious problem, and now that the presentation and code (PDF) is out there, the bad guys will surely be exploiting it. The vulnerability was discovered by K. Chen, and he gave a talk on it at Black Hat this year (PDF). The concept is simple: a modern Apple keyboard has about 8K of flash memory, and 256 bytes of working RAM. For the intelligent, this is more than enough space to have a field day. ... The new firmware can do anything you want it to. Chen demonstrated code which, when you put in a password and hit return, starts playing back the last five characters typed in, LIFO. It is a rudimentary keylogger; a proof of concept more than anything else. Since there is about 1K of flash free in the keyboard itself, you can log quite a few keystrokes totally transparently."
Data Storage

A Short History of Btrfs 241

diegocgteleline.es writes "Valerie Aurora, a Linux file system developer and ex-ZFS designer, has posted an article with great insight on how Btrfs, the file system that will replace Ext4, was created and how it works. Quoting: 'When it comes to file systems, it's hard to tell truth from rumor from vile slander: the code is so complex, the personalities are so exaggerated, and the users are so angry when they lose their data. You can't even settle things with a battle of the benchmarks: file system workloads vary so wildly that you can make a plausible argument for why any benchmark is either totally irrelevant or crucially important. ... we'll take a behind-the-scenes look at the design and development of Btrfs on many levels — technical, political, personal — and trace it from its origins at a workshop to its current position as Linus's root file system.'"
Security

BIOS "Rootkit" Preloaded In 60% of New Laptops 236

Keldrin_1 writes "Researchers Alfredo Ortega and Anibal Sacco, from Core Security Technologies, have discovered a vulnerability in the 'Computrace LoJack for Laptops' software. This is a BIOS-level application that calls home for instructions in case the laptop is ever lost or stolen. However, what the application considers 'home' is subject to change. This allows the creation of malware capable of 'infecting the BIOS with persistent code that survive reboots and reflashing attempts.' Computers from Dell, Lenovo, HP, Toshiba, Asus, and others may be affected."
Data Storage

How Heavy Is a Petabyte? 495

Jon Morgan writes "Whilst heaving around numerous data storage systems to sell (they weigh A LOT!), we got to wondering: How heavy is a Petabyte of data storage? Our best guess is 365KG, which is 6 million times lighter than in 1980! But is there a lighter way to store a Petabyte?"
Networking

What Would You Want In a Large-Scale Monitoring System? 342

Krneki writes "I've been developing monitoring solutions for the last five years. I have used Cacti, Nagios, WhatsUP, PRTG, OpManager, MOM, Perl-scripts solutions, ... Today I have changed employer and I have been asked to develop a new monitoring solution from scratch (5,000 devices). My objective is to deliver a solution that will cover both the network devices, servers and applications. The final product must be very easy to understand as it will be used also by help support to diagnose problems during the night. I need a powerful tool that will cover all I need and yet deliver a nice 2D map of the company IT infrastructure. I like Cacti, but usually I use it only for performance monitoring, since pooling can't be set to 5 or 10 sec interval for huge networks. I'm thinking about Nagios (but the 2D map is hard to understand), or maybe OpManager. What monitoring solution do you use and why?"
Biotech

Human Sperm Produced In the Laboratory 368

duh P3rf3ss3r writes "The BBC is carrying a report from a team of researchers at Newcastle University who claim to have developed a the first 'artificial' human sperm from stem cells. The research, reported in the journal Stem Cells and Development, involved selecting meristematic germ cells from a human embryonic stem cell culture and inducing meiosis, thus producing a haploid gamete. The authors claim that the resulting sperm are fully formed, mature, human sperm cells but the announcement has been greeted with mixed reaction from colleagues who claim the procedure is ethically questionable and that the gametes produced are of inferior levels of maturation."
Medicine

This Is Your Brain On Magnets — Or Maybe Not 59

conspirator23 writes "Jon Hamilton of National Public Radio brings us a story about 'voodoo correlations' in fMRI studies that seek to learn more about emotional states, personality, and social cognition in the human brain. Many of us outside the scientific community have been treated to fascinating images of brain activity and corresponding explanations about how the images reveal which portions of the brain are engaged in certain kinds of thinking. But these images are not actual snapshots; they are visualizations of data generated by repeated scans during experiments. Flaws in the statistical methods used by researchers can result in false images with a variety of inaccuracies. Yet the images produced are so vivid and engaging that even other neuroscientists can be misled by them."
PC Games (Games)

Experimental Video Game Evolves Its Own Content 167

Ken Stanley writes "Just as interest in user-generated content in video games is heating up, a team of researchers at the University of Central Florida has released an experimental multiplayer game in which content items compete with each other in an evolutionary arms race to satisfy the players. As a result, particle system-based weapons, which are the evolving class of content, continually invent their own new behaviors based on what users liked in the past. Does the resulting experience in this game, called Galactic Arms Race, suggest that evolutionary algorithms may be the key to automated content generation in future multiplayer gaming and MMOs?"
Space

Cosmic Fireworks Display Seen Inside Helix Nebula 34

goran72 writes "A new image, taken with an infrared camera on the Subaru Telescope in Hawaii, has revealed a cosmic fireworks display, in the form of tens of thousands of previously unseen comet-shaped knots inside the Helix Nebula. Unlike previous optical images of the Helix Nebula knots, the infrared image shows thousands of clearly resolved knots, extending out from the central star at greater distances than previously observed. These images enable astronomers to estimate that there may be as many as 40,000 knots in the entire nebula, each of which are billions of kilometers/miles across. Their total mass may be as much as 30,000 Earths, or one-tenth the mass of our Sun."
Data Storage

Revisiting the Five-Minute Rule 153

In 1987, a study published by Jim Gray and Gianfranco Putzolu evaluated the trade-offs between holding data in memory and storing it on a disk. Known widely as the "five-minute rule," their research was updated and expanded 10 years later. Now, as jamie points out, Communications of the ACM is running an article by Goetz Graefe with another decennial update, evaluating the rule using hardware and software typical of 2007, with an eye toward how flash memory will affect the situation. An excerpt from Graefe's conclusion: "The 20-year-old five-minute rule for RAM and disks still holds, but for ever-larger disk pages. Moreover, it should be augmented by two new five-minute rules: one for small pages moving between RAM and flash memory and one for large pages moving between flash memory and traditional disks. For small pages moving between RAM and disk, Gray and Putzolu were amazingly accurate in predicting a five-hour break-even point two decades into the future. Research into flash memory and its place in system architectures is urgent and important. Within a few years, flash memory will be used to fill the gap between traditional RAM and traditional disk drives in many operating systems, file systems, and database systems."
Encryption

Behind the First Secure Quantum Crypto Network 51

schliz writes "Researchers behind the world's largest quantum encrypted network said the technology could secure business networks inside six years. The prototype Quantum Key Distribution network was built by the Secure Communication Based On Quantum Cryptography (SECOQC) group last year. It is described in a journal paper published by the Institute of Physics this week, which includes details on how it is based on the trusted-repeater paradigm."
Image

Universal Design for Web Applications 85

Michael J. Ross writes "Two decades ago, Web usage was limited to a single individual (Sir Tim Berners-Lee) using the only browser in existence (WorldWideWeb) running on a single platform (a NeXT Computer). Nowadays, billions of people access the Web daily, with the ability to choose from over a dozen browsers running on desktop computers, laptops, and a variety of mobile devices, such as cell phones. The number of possible combinations is growing rapidly, and makes it increasingly difficult for Web designers and developers to craft their sites so as to be universally accessible. This is particularly true when accounting for Web users with physical and cognitive disabilities — especially if they do not have access to assistive technologies. The challenges and solutions for anyone creating an accessible website are addressed in Universal Design for Web Applications, authored by Wendy Chisholm and Matt May." Keep reading for the rest of Michael and Laura's review.
Image

The Rootkit Arsenal 79

Nicola Hahn writes "One of the first things I noticed while flipping through this hefty book is the sheer number of topics covered. Perhaps this is a necessity. As the author puts it, rootkits lie "at the intersection of several related disciplines: computer security, forensics, reverse-engineering, system internals, and device drivers." Upon closer inspection, it becomes clear that great pains have been taken to cover each subject in sufficient depth and to present ideas in a manner that's both articulate and well organized. This accounts for the book's girth; it weighs in at roughly 900 pages." Keep reading for the rest of Nicola's review.
Announcements

Submission + - Passenger landed plane with 'focused fear' (cnn.com)

phobot writes: "White saved the day after the pilot passed out.

"He was just sitting there. He had his chin on his chest, looking down at his lap, but there's nothing in his lap that he needed to be looking at.
That's when I kind of looked at him for a minute, probably two, three seconds, and I touched him on the shoulder. I said, 'Joe! Joe!, and that's when his head rolled over to the side, and his eyes rolled back in his head, and his arm fell off the armrest ... and I knew if he wasn't gone then, he was in deep distress, but we were in trouble."

The plane's autopilot was on, and the plane was at about 5,000 feet and climbing, White said. Although he was a certified single-engine pilot and had about 130 flying hours, he had no idea how to fly the much larger Super King Air two-engine turboprop plane.

"The only thing I knew how to do up there was talk on the radio," White told WINK. "I've only been up there (in the cockpit) one other time. I made it a point to ask the pilot — not Joe, but another one — 'How do I talk on the radio?' and they showed me what button to push.""

Education

College Police Think Using Linux Is Suspicious Behavior 1079

FutureDomain writes "The Boston College Campus Police have seized the electronics of a computer science student for allegedly sending an email outing another student. The probable cause? The search warrant application states that he is 'a computer science major' and he uses 'two different operating systems for hiding his illegal activity. One is the regular B.C. operating system and the other is a black screen with white font which he uses prompt commands on.' The EFF is currently representing him."

Slashdot Top Deals

If you want to put yourself on the map, publish your own map.

Working...