Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Image

IT Worker's Revenge Lands Her In Jail 347

aesoteric writes "A 30-year-old IT worker at a Florida-based health centre was this week sentenced to 19 months in a US federal prison for hacking, and then locking, her former employer's IT systems. Four days after being fired from the Suncoast Community Health Centers' for insubordination, Patricia Marie Fowler exacter her revenge by hacking the centre's systems, deleting files, changing passwords, removing access to infrastructure systems, and tampering with pay and accrued leave rates of staff."
Oracle

RIP, SunSolve 100

Kymermosst writes "Today marks the last day that SunSolve will be available. Oracle sent the final pre-deployment details today for the retirement of SunSolve and the transition to its replacement, My Oracle Support Release 5.2, which begins tomorrow. People who work with Sun's hardware and software have long used SunSolve as a central location for specifications, patches, and documentation."

Comment miniscule Man in the Middle attack (Score 4, Informative) 251

A link http://www.networkworld.com/community/blog/newest-attack-your-credit-card-atm-shims?t51hb&hpg1=mp in the original story, entitled "Newest Attack on your Credit Card: ATM Shims" has some interesting information:

"The shim needs to be extremely thin and flexible. In fact it must be less than 0.1mm"

"The shim is inserted using a "carrier card" that holds the shim, inserts it into the card slot and locks it into place on the internal reader contacts."

"Once inserted, the shim is not visible from the outside of the machine. The shim then performs a man-in-the-middle attack between an inserted credit card and the circuit board of the ATM machine."

"flexible shims are recently being mass produced and widely used in certain parts of Europe"

"Diebold released five new anit-skimming protection levels for its ATM devices june 1st 2010...Unfortunately, none of these helps with the shim skimming attack. That problem has yet to be solved mechanically yet."

Television

MythTV 0.23 Released 214

An anonymous reader writes "After six months of our new accelerated development schedule, MythTV 0.23 is now available. MythTV 0.23 brings a new event system, brand new Python bindings, the beta MythNetvision Internet video plugin, new audio code and surround sound upmixer, several new themes (Arclight and Childish), a greatly improved H.264 decoder, and fixes for analog scanning, among many others. Work towards MythTV 0.24 is in full swing, and has be progressing very well for the last several months. If all goes according to plan, MythTV 0.24 will bring a new MythUI OSD, a nearly rewritten audio subsystem capable of handling 24- and 32-bit audio and up to 8 channels of output, Blu-ray disc and disc structure playback, and various other performance, usability, and flexibility improvements."
Privacy

Lower Merion School's Report Says IT Dept. Did It, But Didn't Inhale 232

PSandusky writes "A report issued by the Lower Merion School District's chosen law firm blames the district's IT department for the laptop webcam spying scandal. In particular, the report mentions lax IT policies and record-keeping as major problems that enabled the spying. Despite thousands of e-mails and images to the contrary, the report also maintains that no proof exists that anyone in IT viewed images captured by the webcams."
Science

Aussie Scientists Find Coconut-Carrying Octopus 205

An anonymous reader writes with this excerpt from an AP report: "Australian scientists have discovered an octopus in Indonesia that collects coconut shells for shelter — unusually sophisticated behavior that the researchers believe is the first evidence of tool use in an invertebrate animal. The scientists filmed the veined octopus, Amphioctopus marginatus, selecting halved coconut shells from the sea floor, emptying them out, carrying them under their bodies up to 65 feet (20 meters), and assembling two shells together to make a spherical hiding spot. ... 'I was gobsmacked,' said Finn, a research biologist at the museum who specializes in cephalopods. 'I mean, I've seen a lot of octopuses hiding in shells, but I've never seen one that grabs it up and jogs across the sea floor. I was trying hard not to laugh.'"
Open Source

Linux Kernel 2.6.32 Released 195

diegocg writes "Linus Torvalds has officially released the version 2.6.32 of the Linux kernel. New features include virtualization memory de-duplication, a rewrite of the writeback code faster and more scalable, many important Btrfs improvements and speedups, ATI R600/R700 3D and KMS support and other graphic improvements, a CFQ low latency mode, tracing improvements including a 'perf timechart' tool that tries to be a better bootchart, soft limits in the memory controller, support for the S+Core architecture, support for Intel Moorestown and its new firmware interface, run-time power management support, and many other improvements and new drivers. See the full changelog for more details."

Comment Re-Post - USB-Based NIC Torrents... 04.27.09 (Score 1) 188

http://tech.slashdot.org/article.pl?sid=09/04/27/2310234

and my comment to the first story: http://slashdot.org/comments.pl?sid=1213805&cid=27741803

I'm guessing the inventor's statistics "In the office environment, 52% of respondents left their machines on for remote access, and 35% did so to support applications running in the background, of which e-mail and IM were most popular (47%)." are still true.

http://mesl.ucsd.edu/yuvraj/research/documents/Somniloquy-NSDI09-Yuvraj-Agarwal.pdf

Encryption

New AES Attack Documented 236

avxo writes "Bruce Schneier covers a new cryptanalytic related-key attack on AES that is better than brute force with a complexity of 2^119. According to an e-mail by the authors: 'We also expect that a careful analysis may reduce the complexities. As a preliminary result, we think that the complexity of the attack on AES-256 can be lowered from 2^119 to about 2^110.5 data and time. We believe that these results may shed a new light on the design of the key-schedules of block ciphers, but they pose no immediate threat for the real world applications that use AES.'"

Comment Statistical significance (Score 2, Informative) 300

http://en.wikipedia.org/wiki/Statistically_significant>

"In statistics, a result is called statistically significant if it is unlikely to have occurred by chance. "A statistically significant difference" simply means there is statistical evidence that there is a difference; it does not mean the difference is necessarily large, important, or significant in the common meaning of the word....

The significance level is usually represented by the Greek symbol, (alpha). Popular levels of significance are 5%, 1% and 0.1%. If a test of significance gives a p-value lower than the -level, the null hypothesis is rejected...."

Comment Why should security be a reason? (Score 1) 496

Bandwidth and interference/reliability are good enough reasons for me not to use WIFI when I don't have to.

But, just because "security" is not (or weakly) configured out of the box, and a lot of users don't bother to read and learn how to configure their wifi device, why should security be a one of those reason (assuming WPA and higher) not to use wifi? Is there a new flaw with WPA (and higher? Yes I know about the TKIP weakness.

Comment at home 37% leave computer ON to support IM/Email (Score 3, Insightful) 246

"In the office environment, 52% of respondents left their machines on for remote access, and 35% did so to support applications running in the background, of which e-mail and IM were most popular (47%)."

Never mind the fact that emails are saved on the server, but is this device is really necessary in case "An instant messenger (IM) client will require the PC to be on in order for the user to stay "online" (reachable) to their contacts."

So instead of telling a significant number of respondents that they really don't have to leave their computer ON to run background applications such as IM and email (unless of course you are running an IM/email server at work or home), the author does a cartwheel while holding a sermon on how to be green.

Now that everybody has get some green in order to be green, something similar but different, here is a bare-bone OS running on a daughter card (PCIe) which allows secure access to the host's hardware even when the host is OFF but the motherboard still has power. http://support.dell.com/support/edocs/software/smdrac3/drac5/OM53/en/ug/racugc1.htm#31825. Works with Dell. A must if you don't have unrestricted physical access to your servers, and every once in a while the main power cycles but your servers don't boot/reboot automatically.

Small correction to the main article, a couple of the authors are from University of California, San Diego and not University of San Diego.

Slashdot Top Deals

Old programmers never die, they just hit account block limit.

Working...