Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Report them (Score 1) 298

I know that much of the world doesn't care but many of these attacks come from compromised servers. I scripted to automatically do a whois on the ip and construct an email to the abuse address with all pertinent log info included. this gets saved to a file and a report generated. I check the report once a month and run another script which sends the emails. I regularly get responses from companies like Amazon letting me know they are tracking them. usually it is a hosting service server and te client didn't lock down the machine, but i have had a few unnamed companies discover their own servers were compromised. you have to fight back people.

Comment Temperature measurements (Score 1) 810

If you are going to measure temperature, get many thermometers and place them in many places at the same time. Don't forget to put one outside as well. If you get a cold snap / temperature drop then you need to compare that to the outside temperature as it very well could be a breeze. Do the same for checking for sounds, and as stated before, get equipment that will "hear" outside the normal range of human hearing. Same for video equipment, get stuff that will "see" in infrared as well as the visible spectrum, many of the surveillance cameras will do this. As was stated before, remember that disproving ghosts is not possible so don't expect to convince anyone.

Comment Overwhelm the storage capacity... (Score 1) 286

Wouldn't it be relatively easy to diseminate a little program that ran in the background and just opened massive numbers of connections to random, or not so random, IP address constantly. If everyone did this, the volume of data collected would become such a burden to the ISPs that something would have to give. And then of course there are anonymizers outside your country of origin who are not bound by said laws.

Comment Re:Next please! (Score 1) 446

Yes, I upgrade my 3G to iOS4 and then rolled it back to 3.1.3 after about a week. Not difficult to do but meant I had to essentially reset the phone to factory defaults and return to a previous backup, not the most recent because that would include upgrading the phone to iOS4 again. Now that I am back on 3.1.3 I am going to stay there until I get a new phone... possibly the new X coming out as I am a bit tired of the lock in that apple has with the app store and also because I am tired of AT&T's poor network and restriction on Tethering.

Comment Re:How is this human to computer? (Score 1) 393

There is a perfect analogy in nature to this, it is called an asymptomatic carrier. Typhoid Mary is the classic case of this. The carrier is infected with a disease but are not themselves affected by it but they can pass it on to others. As to the "cross platform" nature of this example, A number of animal species can act as a vector of human disease. That said, this is a completely contrived example to show it is possible. Call it a Proof of Concept. I can see it being much more likely to happen in reverse, i.e. someone's implant gets infected by a computer virus. Therea are many people walking around today with computers implanted in their bodies performing very specialized tasks, pacemakers being the most common today. The latest models of these are designed to be accessible via wireless technologies to allow doctors to monitor and update them without having to perform surgery. There is a great deal of concern in the industry that these devices could be hacked (maliciously or otherwise) thus causing death.

Comment Spammers are spoofing Google Groups (Score 2, Interesting) 251

I manage a moderated google group and I have received spam "from the group" from someone who is not a member. This makes me think that they sent it directly to me and just spoofed the headers to make it appear to come from google to get past my local spam filter. I wonder if this is what is really happening?
Sci-Fi

Submission + - RIP: Barbara Bova dies - Ben Bova's Wife

farnsaw writes: Former Daily News columnist, Barbara Bova, dies from cancer.

Barbara Bova was the founder and president of a literary agency named after her. Barbara Bova was the wife of famed science fiction author Ben Bova, who also writes a weekly column for the Daily News.

Full story at: http://www.naplesnews.com/news/2009/sep/25/former-daily-news-columnist-dies-cancer/

Deepest Sympathies to Ben.

To honor Barbara, please send a donation to Avow Hospice..
Security

Vulnerability, Potential Exploit In Cisco WLAN APs 35

An anonymous reader writes "The AirMagnet Intrusion Research Team has uncovered a new wireless vulnerability and potential exploit associated with Cisco wireless LAN infrastructure. The vulnerability involves Cisco's Over-the-Air-Provisioning (OTAP) feature found in its wireless access points. The potential exploit, dubbed SkyJack by AirMagnet, creates a situation whereby control of a Cisco AP can be obtained, whether intentionally or unintentionally, to gain access to a customer's wireless LAN."

Slashdot Top Deals

The hardest part of climbing the ladder of success is getting through the crowd at the bottom.

Working...