Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security

Submission + - Former MS (now FF)Security Honcho: MS Hides Holes (mozilla.com) 1

theranjan writes: "When Jeff Jones, a Security Strategy Director at Microsoft, decided to compare Internet Explorer security vulnerabilities with those of Mozilla Firefox, and decided to publish his results showing that Internet Explorer was more secure, he perhaps forgot that the Head Security Strategist of Mozilla, Window Snyder, was a former MS employee, in fact the security lead for the Service pack of Windows XP and Server. In a rebuttal of the study, Window Snyder said that the number of vulnerabilities publicly acknowledged was just a "small subset" of all vulnerabilities fixed internally. The vulnerabilities found internally are fixed in service packs and major updates without public knowledge. This is probably one of the first times that we have confirmation from one of Microsoft's former workers that this practice is routinely followed in Microsoft. This also confirms that the studies performed or referenced by Microsoft touting itself as the safest Operating system, comparing the vulnerabilities between OSes, needs to be taken with bucketfuls of salt. Finally, Window speaks out against the practice of counting bugs,stating plainly that "If we as an industry would just acknowledge that counting bugs is useless then vendors could feel safe talking about what they are doing to protect users" and "Were not building fixes for our PR team, were building them for our users. Go ahead and count.""
Wii

Submission + - New exclusive GAME Wii SKU for Christmas (blogspot.com)

LewieP writes: "SavyGamer reports — "GAME have just struck a deal with Nintendo for a supply of Wii consoles over Christmas — Exclusive packs which have games included with the hardware, a separate SKU. There is a 2 game and a 3 game bundle price (tentatively) at £250 and £280 respectively. The Games seem to be 1st party, most likely "Mario & Sonic at the Olympics", "Mario Party 8" and possibly "Super Mario Galaxy"

These bundles will be shipping from Monday, they may be in stock on Monday, or may be in warehouses on Monday, and in stores later in the week. These bundles are totally exclusive to GAME — Nintendo is thanking GAME for their support over the years, and repaying loyality.

The number of Wii shipping has been described as "considerate", and continuing up to Christmas. Previous shipments have been "small amount"." I suspect this is because with previous forced bundles from GAME, if you keep the games sealed, you can return them, and end up paying RRP for the console on it's own. This way GAME benefit more from the excess demand, since they can't charge more than RRP for the console, and sell the most additional games this way. I do find it funny that Nintendo are thanking for support, since I know pretty early on the Gamecube section in my local GAME store was far smaller than the PS2 or Xbox equivalent. This is not a hardware revision (or at least, we have no reason to believe so yet), so it is safe to assume it will just be like any other consoles, just different packaging."

Wii

Submission + - Rockstar's Table Tennis for Wii Reviewed

An anonymous reader writes: HEXUS.gaming has a review of Rockstar's Table Tennis for the Wii, accompanied by a gameplay video. Despite the massive computational deficit the Wii has versus the XBox 360, the game can be a lot of fun, especially in multiplayer (albeit offline) mode:

Head to head two player is, quite possibly, some of the most amazing, intense Wii action you'll see short of a game of strip Baseball with a randy Kiera Knightley. It's hard to describe just how amazing a two player rally is when you're both in the focus mode... the action is instantly taken up a notch, as is the tension as you both slam the ball back and forth.
Privacy

Submission + - Best way to track stolen Notebooks/Delete Data 1

bover07 writes: As a Consultant for several corporations, a couple of our clients have recently had some notebooks stolen. Most of them were upper management, or sales mangers, victims of random break-and-enters in hotel rooms, vehicle's etc. Before I replace the latest one, I wanted to suggest a few ways for my clients to protect their data, and their investment. Here are the recommendations we are using:
1.All email is to be accessed through a web client (ie not ost,pst files)
2.Use of remote off site backups to keep backups up to date when away from office
3.Use of biometrics to encrypt hard drive data.
Even with all of this, are there any "Tracking" programs that can trace a notebook, delete all data, and alert the authorities of its location? Have any of you used them, with success or horror stories? What do you recommend?
Security

Submission + - Cybercrime and the Electoral System

An anonymous reader writes: There has been a look of hoop la around the security of electronic voting machines but what about online security threats affecting on-line components of campaigns? Well Oliver Friedrichs of Symantec has posted a blog and a chapter (PDF) from the forthcoming Crimware book. The chapters covers the US's current primary elections and diverse set of topics including typo squatting and phishing and their actual and potential impact. As the author states the primaries was the focus but it could be used for any on-line election campaign.
Networking

Submission + - Speakeasy Launches ADSL2 (speakeasy.net) 1

ejoe_mac writes: Speakeasy is starting to qualify loops for ADSL2 circuits for speeds up to 15/1mbps! Finally, an option in Qwest areas not served by Verizon FIoS service.
Emulation (Games)

Submission + - Prototype Sega Dreamcast Zip Drive on eBay 1

Croakyvoice writes: "DC News have details on their web of an Ebay auction of an Unreleased Sega Dreamcast prototype Zip Drive, from the description, " Made by Imega Corp, the makers of the Zip Disc format, this Zip drive was made to increase the Dreamcast's storage capacity but mainly for emails, web pages, and other internet based files.The 100 Mega-Byte storage disk drive is essentially the same as the ones made for PCs with slight modifications made to make it compatible with the DC." Sadly the auctioneer has put a $10,000 price tag on the Drive."
Programming

Submission + - Christian Science Monitor - Vanishing programmer (csmonitor.com)

An anonymous reader writes: [if you want to pretty this up,... that's fine by me] Not that much different than similar stuff,... but it is the CSM..... http://www.csmonitor.com/2007/0702/p15s01-wmgn.htm l The vanishing American computer programmer Move to increase number of foreign worker visas fails in Senate, but that has not stopped what critics call a push for cheaper labor.
Robotics

Submission + - Head of Australian Feds Fears Cyborg Clone Gangs (smh.com.au)

cranos writes: "From the article:

Technology such as cloned part-robot humans used by organised crime gangs pose the greatest future challenge to police, along with online scamming, Australian Federal Police (AFP) Commissioner Mick Keelty says."

Windows

Submission + - NTFS File Recovery Tool (recoverdatatools.com)

Recover Data writes: "Recover Data offers Best NTFS File Recovery Tool to restore NTFS Files from lost and corrupt NTFS Partition. Recover Data for NTFS Software supports NTFS & NTFS5 File System. Recover Data for NTFS Software is complete, easy and safe to use NTFS File Recovery Software as it is non-destructive utility and offers best & effective Data Recovery Options such as Desktop Recovery, Raw Recovery, Image Recovery & Remote Recovery."
Power

Submission + - Congress Rebukes NRC for Excessive Secrecy

Wilson_6500 writes: The New York Times reports (registration required) on the NRC's possibly overzealous secrecy regarding an incident at a Nuclear Fuel Services fuel processing facility — a very serious potential criticality incident that resulted in the plant being closed for months. That the incident occurred is one thing; that the public would never have been informed of the incident or the NRC's actions regarding the matter is quite another. The NRC, it is reported, had an agreement with NFS to label all correspondence "Official Use Only." This identifier limits public access to the document so labeled even though this identifier falls below the level of "secret." The period of public comment following the resulting NRC investigation was therefore pointless; only the actions of Congress brought the incident and the NRC's response to public light. The NRC has an unenviable position considering the delicate nature of nuclear security and low public opinion of nuclear power in general, but even Congress seems to think that these measures were somewhat excessive: a letter sent to the NRC by the House Energy and Commerce Committee calls the agency's measures excessive, asserting that many documents were classified needlessly.
Software

Submission + - 5 great free utilities which I use as an IT pro (techyreview.com)

prevett writes: "This article is not an advertisement for any of the utilities/packages listed. These are the most common utilities which I use in a real world situation,to support friends and family (outside of real job) during my everyday life as an It Professional. I hope it will be helpful to anybody who reads this article. 5. RealVNC (http://www.realvnc.com) — Whenever I install a new machine, whether it be at the office, or in my personal life (you know, mom, dad, neighbor, etc), I always throw a copy of VNC server on their machine. Although I would generally consider this security risk, I always set the startup type to manual in the services management console. I then put a shortcut to the command to start the VNC server service on their desktop and open port 5900 on their firewall. Now, if they ever need my support, all I need to do is tell them to double click the VNC icon on their desktop, and hold their mouse over the little VNC logo next to the clock, and give me the ip address which pops up. Within seconds I am connected and fixing the issues which "magically" started happening to their machine... which they of course had nothing to do with. This generally works out just fine, unless they are behind a router, and have a private IP address, but even in most of these cases, I am the one who installed the router, and I have made sure that the correct ports are forwarded to the machine. Then I just tell them to send me an email from their local email. I can then in most cases get their routers IP address from the internet headers, and I am in. 4. Lavasoft Ad-Aware SE personal (http://www.lavasoft.de) — How many times have you logged onto somebody's computer to troubleshoot an issue, and you realize the issue is that the user has clicked on just about every single popup window he/she has ever seen in their life? This has caused 37 different toolbars to be running on top of IE, and whenever you open IE, 40-50 more IE windows popup with the content which you generally wait until really late at night to view! Now you get smart, and enter the registry and remove all 97 entries within the HKLM/Software/Microsoft/Windows/Current Version/Run section, only to realize that as soon as you delete them they come right back. At this point I generally install Ad-Aware SE, let it update itself. Reboot the machine INTO SAFE MODE, and run it from there. Let it quarantine all 89000 items it has found. Upon reboot, the machine will be much more manageable, and you can then troubleshoot it, if the issue hasn't been fixed. 3. AVAST Antivirus by Alwil software (http://www.avast.com) — If I had a nickel for every machine which I set out to trouble shoot/fix which I found to have antivirus software which expired in 1989, I would probably be a millionaire. AVAST's business model allows for free home use of their product, AKA the "home" version. I actually don't really know the difference between the home and pro version. This nice Antivirus package scans everything, instant messaging, internet mail, a network shield, an Outlook plug-in, a p2p shield, a web shield, and a standard virus shield. It scans all files coming in and going out of the computer. And here is the kicker. It works, and works very well. I have actually found that it detects and cleans items which big boy AV software simply ignored. It's nice every morning when I turn on my home PC, it yells out "Virus Database has been updated" Every morning! Alwil software is on the ball! On another note, their pre-boot scan which AVAST can be set to do has helped me on a couple of occasions where the virus has been loading before the Virus software has loaded and would not get removed during a regular scan. The licensing on this software allows for home use, and not business use, but when my current two year virus license expires at the office, I will be purchasing Avast Pro for my 40 office computers and their server products for my servers. This is truly how happy I am with the product which this company puts out. 2. RyanVM Integrator (http://www.ryanvm.net/msfn) — How many times have you had to do a fresh install of Windows XP, and then, an hour later, after it has been installed, take another two hours to run windows update and download and install close to 100 updates? Well, this little utility, along with a secondary download will take your current windows XP SP2 CD, and Integrate all of Microsoft updates, and then create a new ISO which you can burn to a CD. You now have a bootable windows XP SP2 disk will 99% of the Microsoft updates already integrated into the install. I think the last time I did a fresh install, there were only like 7 updates which were required after the install. Need I say more? 1. BartPE — Preinstallation Environment (http://www.nu2.nu/pebuilder) If I could only tell you how many times this utility has saved my ASS in a hurry.. Have you ever had a windows XP or Windows Server machine which would simply not boot, and you had no way to get into the system to see what the hell is going on. This utility allows you to boot into a stripped down windows XP environment (completely outside of your computers environment) and yet get to your files on your hard drive. So that you can restore a registry or remove a virus, etc. you can set it up with Ghosting utilities, check disk, VNC, Remote Desktop, Firefox, and so much more. I have even created a thumb drive which boots this environment for those times when I don't have my trusty boot cd available. If you are an IT Pro, you should really have a look-see! You won't be disappointed."
Businesses

Submission + - Business Week shows offshoring bad for the economy (businessweek.com)

Obasan writes: "A 'gaping flaw' in the way economic numbers are computed may be the cause of a disconnect between GDP growth claims and actual growth, especially in terms of real wages, a phenomenon many of us are at least anecdotally familiar with. Business week calls this gap "phantom-GDP", gains in reported GDP that cannot be correlated with domestic production."
Quickies

Submission + - Cellphone "Phantom Vibration Syndrome" ... (usatoday.com)

Ant writes: "This USA Today article on what some call it "phantom vibration syndrome." Others prefer "vibranxiety" — the feeling when you answer your vibrating cellular/cell phone, only to find it never vibrated at all. Though no known studies have analyzed what may cause spontaneous buzzing. Some who experienced recurring phantom vibrations wondered whether the phenomenon had physical roots: Was it caused by nerve damage or muscle memory? But experts say the false alarms simply demonstrate how easily habits are developed. Psychologically, the key to deciphering phantom vibrations is "hypothesis-guided search," a theory that describes the selective monitoring of physical sensations, says Jeffrey Janata, director of the behavioral medicine program at University Hospitals in Cleveland. It suggests that when cellphone users are alert to vibrations, they are likely to experience sporadic false alarms, he says... Seen on Digg."

Slashdot Top Deals

The hardest part of climbing the ladder of success is getting through the crowd at the bottom.

Working...