Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Better solution: read only media (Score 3, Insightful) 264

And what about those BIOS/EFI[1] firmware-based hypervisor rootkits? If someone is able to gain root access in a given system that is somehow "vulnerable" in such way that a permanent EFI (or similar) rootkit can installed, then you'll be fucked even with the read-only media and all.

Speaking of which, I don't understand why manufacturers are so eagerly adding all this new intelligence into the firmware. What do we need it for anyway? IMO it would be so much simpler from security perspective, if the OS would be at the bottom of it all. Added complexity adds new possibilities for exploitation.

[1] http://en.wikipedia.org/wiki/Extensible_Firmware_Interface

The Internet

Submission + - French 3 strikes law returns with judicial oversig (arstechnica.com)

suraj.sun writes: French "3 strikes" law returns, now with judicial oversight!

The French Senate has once again approved a reworked version of the country's controversial "three strikes" bill designed to appease the Constitutional Council. Instead of a state-appointed agency cutting off those accused of being repeat offenders, judges will have the final say over punishment.

The approval comes exactly one month after the country's Constitutional Council ripped apart the previous version of the Création et Internet law.

Bring in the judges

Not content to let the idea die, President Nicolas Sarkozy's administration reworked the law in hopes of making it amenable to the Council--instead of HADOPI deciding on its own to cut off users on the third strike, it will now report offenders to the courts. A judge can then choose to ban the user from the Internet, fine him or her 300,000 (according to the AFP), or hand over a two-year prison sentence.

Those who are merely providing an Internet connection to dirty pirates can be fined 1,500 and/or receive a month-long temp ban from the online world. (A group of French hackers has already begun to work on software that cracks the passwords on locked WiFi networks so that there's an element of plausible deniability when law enforcement tries to go after home network owners.)

The Senate approved this version of the bill with a vote of 189-142 this week, sending it to the National Assembly for final passage.

ARS Technica : http://arstechnica.com/tech-policy/news/2009/07/its-baack-french-3-strikes-law-gets-another-go-from-senate.ars

Comment Typical user behaviour, asking for "impossible" (Score 1) 382

So, as usual, they are asking for an solution that is impossible to implement, at least in any meaningfully reliable way. I mean, how does one sanely "detect" child pornography or any other illegal content to begin with?

Despite these insurmountable odds, I am fairly certain that there will be a long line of companies willing to try and do some half-assed gadgets, because there will be lots of money involved.

Wireless Networking

Submission + - Virtual sticky notes make cell phones more useful (networkworld.com)

BobB-nw writes: Engineers at Duke University have come up with a system for one day exploiting cell phones worldwide so that mobile users can easily learn from each other about everything from art exhibits to traffic jams. "Every mobile phone can act as a telescope lens providing real-time information about its environment to any of the 3 billion mobile phones worldwide," said Romit Roy Choudhury, an assistant professor of electrical and computer engineering in Duke's Pratt School of Engineering, in a statement. The engineers have created an application that they call micro-blogging that enables cell phone users to enter site-specific information ("virtual sticky notes"), such as comments or photos or videos to a central server that other cell phone users can tap. Time and location can be logged as well, and attached to the other information.
Media

Submission + - Online chat with Hu Jintao 1

samsamsamj writes: A Danwei piece reported the event, also reported here, and here.

This guy noted the significance that when talking about the media's role, for the first time China's leadership juxtaposed the importance of "aligning to the correct steering" and "reflecting the people's opinions". But as usual, this largely fell on the deaf ears to the western people and their media, as one Danwei comment depicted, "he says *absolutely nothing of any meaning whatsoever*".

Contrary to the western belief that a non-democratic government must be out of touch and against its people, China's government is quite popular among its own people and generally considered nimble and competent. Lord Malloch Brown, UK's Foreign Office Minister for Africa, Asia, and UN, asked here: "How come a government which does not subject itself to electoral test, always impresses one as being more in touch with public opinion and public concerns than many governments that do go to the polls every five years?"

I think this may also be the question the slashdotters ask themselves. What do you know and do not know about China? How many of the beliefs you accepted as commonsense are not as indisputable as you think?
Communications

Submission + - The Positronic Brain, is it just around the corner (vsahost.com)

chyllaxyn writes: "Exciton-Based Computing.
Leonid Butov, a professor of physics at UCSD, and his colleagues at UCSD and UC Santa Barbara have built several exciton-based transistors that could be the basis of a new type of computer.
Particles called excitons that emit a flash of light as they decay could be used for a new form of computing better suited to fast communication,
Circuits Eliminate A 'Speed Trap' Between Computing And Communication Signals at Science Daily"

Google

Submission + - The New State Health Plan is Google

theodp writes: "In yet another case of life imitating Dilbert, the State of Georgia has issued a press release touting the health benefits of Google products for its citizens. According to the release and a follow-up Yo-State-So-Fat Official Google Blog post, this includes AdWords, Analytics, Maps, Earth, Picasa, Gadgets and a branded YouTube channel. 'We're thrilled that Google has joined us in the effort to help everyone in the state lead a healthier life,' said Sally Winchester, a manager for Georgia State Parks & Historic Sites. 'At Google, we are committed to helping our employees lead healthy lives,' added Maureen Schumacher, a Google regional sales director. 'We are very excited that Google products will be used as part of this effort to improve the health and well-being of all Georgians.'"
Security

Submission + - Latest trends in online criminal activity (computerworld.com)

Weblver1 writes: "How much is your stolen identity worth? Not as much as you would expect. Stolen data such credit card numbers and PIN became a commodity with price falling sharply due to the abundance of such available stolen records... Put it shortly (stolen) credit card numbers — Out, Healthcare, FTP, Citrix credentials — In"
Programming

Submission + - What is a program?

capitalG writes: "The other day my 83 year old grandmother asked me: "So, what is a program?" After a pause long enough to make her question my credibility, I responded: "A program is a machine made out of numbers." Her eyes went out of focus for a moment and she nodded with a smile. What would have been a better response to the query considering the client?"
Space

Submission + - How big could the universe be?

An anonymous reader writes: In the past we have repeatedly extrapolated from what we can see to estimate all there is. Up until modern times every previous extrapolation of this kind has been wrong. What makes us so sure we aren't making the same mistake today? Would any reinterpretation of what we currently know in mainstream science be consistent with the a universe that is far far larger than that commonly accepted?
United States

Submission + - US closing its borders, a step too far by the DHS? (cbp.gov)

An anonymous reader writes:
DHS Announces Pre-Travel Authorization for U.S.-Bound Travelers from Visa Waiver Countries. Getting this [electronic] information in advance enables our frontline personnel to determine whether a visa-free traveler presents a threat, before boarding an aircraft or arriving on our shores.
— said Homeland Security Secretary Michael Cherto

Finally it seems the US is closing its borders even to the trusted countries on the Visa Waver Program. Although the Dept. of Homeland Security is calling it "Pre-Travel Verification" for the countries allowed to travel to the US without a visa, it seems rather as if they are enforcing a pseudo-visa as this Electronic System for Travel Authorization (ESTA) not only bars the usual unwanteds but will also become mandatory in Jan 2009 after the trial period starting next month.

Microsoft

Submission + - Top 40+ Vista Tweaks, Tunes, & Hacks (poormanpcreview.com)

s14sh3r writes: "Vista: Tweaked, Tuned, and Hacked presents over 40 nifty tweaks and tricks to make Vista run better, faster, and less annoying. Learn how to boot faster, get rid of annoying prompts, customize your bootscreen, activate the hidden "super-admin" account, and even use YOUR video clips as an animated wallpaper (no third-party apps needed!)"

Slashdot Top Deals

To the systems programmer, users and applications serve only to provide a test load.

Working...