Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Submission + - SourceForge MITM Projects (github.io) 2

lister king of smeg writes: What happened?

SourceForge, once a trustworthy source code hosting site, started to place misleading ads (like fake download buttons) a few years ago. They are also bundling third-party adware/malware directly with their Windows installer.

Some project managers decided to leave SourceForge – partly because of this, partly just because there are better options today. SF staff hijacked some of these abandoned accounts, partly to bundle the crapware with their installers. It has become just another sleazy garbage site with downloads of fake antivirus programs and such.

How can I help?

If you agree that SourceForge is in fact distributing malicious software under the guise of open source projects, report them to google. Ideally this will help remove them from search results, prevent others from suffering their malware and provide them with incentive to change their behavior.

As this story has been submitted several times in the past several days, by various submitter and is going around various other tech forums( https://news.ycombinator.com/i... , https://soylentnews.org/articl... , https://www.reddit.com/r/progr... ,) this submitter wonders has our shared "glorious Dice Corporate overloads" been shooting this story down?

Comment Re:Embedded and dynamic memory (Score 2) 366

Today, though, dynamic memory allocation is a reasonable thing. Granted you want to make sure it can't fail, and that "out of memory" is handled appropriately.

I don't completely disagree but you might watch the CPPCON 2014 presentation on the Curiosity rover for some insights into how the industry actually does things. One thing I noticed right off; rad hardened hardware is way behind the latest thing from Intel.

Comment Re:Seriously? (Score 1) 366

It's basic security practice to never count on something like this, what if something is configured in a way that the only access an attacker has is to the place you drop this file and read it back; do you really want to have a system where someone can slip in, remove a recently dropped file, and kill the system? Perhaps they didn't think they had to consider security but this is also, as you point out, just basic robustness. Also as others state, watchdogs, Our PC software product has a watchdog, and it's sure as heck not controlling a satellite.

Slashdot Top Deals

"Engineering without management is art." -- Jeff Johnson

Working...