Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:That was rather pretty (Score 1) 291

I also had a paper at this year's CCS conference, so perhaps I can shed some light on the process. The publisher had some fairly picky requirements for the PDFs, and warned that most PDFs created by (for example) pdflatex would probably not pass muster. So along with a PDF we had to submit a Postscript file so that they could distill it into a PDF that met their requirements if necessary. That's likely what happened here--the final Acrobat Distiller step was probably done by the publisher to make everything fit their publishing requirements.

Comment Re:Vendor B ancient IOS (Score 1) 196

I believe this has been shown incorrect; from the article:

As it turns out, the reason for all those routing resets and general instability was due to a previously unknown Cisco bug involving AS paths close to 255 in length.

(emphasis mine). More info:

http://blog.ioshints.info/2009/02/oversized-as-paths-cisco-ios-bug.html

And the Cisco description (the bug ID, CSCsx73770, is linked in there, but you need a login to access it):

http://tools.cisco.com/security/center/viewAlert.x?alertId=17670

Comment Re:This seems abrupt (Score 1) 856

Last time I installed Ubuntu it still asked for a password for the normal user account. It asked for that same password when it needed to elevate privileges and perform some configuration command as root (via sudo).

So, you have a password, and if you need to you can get root-level privs, but the random everyday stuff you do doesn't have the potential to wipe out the whole OS.

Seems like a win-win to me, really.

Comment Re:Rates (Score 0) 281

The iPhone doesn't have support for Linux (no iTunes!), and since it (unlike previous incarnations of the iPod) doesn't function as a standard USB mass storage device, it's effectively useless on that platform. I agree that it's not limited to one, but it is limited to two.

Current workarounds involve jailbreaking your iPhone/iPod and then (I am not making this up) syncing files over SSH.
Image

Slashdot's Disagree Mail Screenshot-sm 264

In this week's Disagree Mail, I try to show the range of messages I get. It's not all angry or insane, sometimes it's sent to us for no apparent reason. We start off a little mad, slip into a whole bunch of crazy and finish with someone who has a complaint about racism at his favorite restaurant. Read below to get started.
Books

Submission + - The Entomology of Kafka (blogspot.com)

moyix writes: "Most people probably read Kafka's Metamorphosis in a high school or college lit course and know the story of Gregor Samsa turning into a giant bug man. But exactly what kind of giant bug man? A three part series of articles over at the Rogue Entomologist blog looks at Kafka's Metamorphosis from an entomological standpoint and tries to answer this question."
Books

Submission + - The Entomology of Kafka (blogspot.com)

moyix writes: "Most people probably read Kafka's Metamorphosis in a high school or college lit course and know the story of Gregor Samsa turning into a giant bug man. But exactly what kind of giant bug man? A three part series of articles over at the Rogue Entomologist blog looks at Kafka's Metamorphosis from an entomological standpoint and tries to answer this question."

Will Internet TV Crash the Internet? 267

Stony Stevenson writes "Analyst groups and Cisco have come out saying that the internet is heading for a crash unless it increases its bandwidth capabilities which are being strangled by the increased use of Web TV. Stan Schatt, research director at ABI said: "Uploading bandwidth is going to have to increase, and the cable providers are going to get killed on bandwidth as HD programming becomes more commonplace." He added that the solution to the problem is to change to digital switching and move to IPTV. "They will be brought kicking and screaming into the 21st century," he said. Cisco weighed into the argument, adding that it had found American video websites currently transmit more data per month than the entire amount of traffic sent over the internet in 2000."
The Media

Blogs Are Eating Tech Media Alive 247

Heinz writes with an article in Forbes on how advertising in tech media is drying up and going — where else? — into specialist blogs and Google. "Silicon Valley is booming again. But if you work in tech media, there's blood on the floor. Take Red Herring. It hung onto its offices after getting the eviction notice earlier this month. But gossip site Valleywag is breaking story after story not just on its beat — but about its woes. Meanwhile, bigger publications are hurting too: Time Warner's Business 2.0 saw ad pages drop 21.8% through March from the same period a year ago; PC Magazine's editor in chief walked out the door after ad pages fell 38.8% over the same period; and one-time online powerhouse CNET is reporting growing losses even as the companies it covers flourish. It may be happening in tech first, but there's no reason the same thing won't happen, eventually, in every media niche."
Security

Submission + - Damn Vulnerable Linux

Scott Ainslie Sutton writes: "Enterprise GNU/Linux Resource Linux.com have highlighted a newly created GNU/Linux distribution named Damn Vulnerable Linux, built upon Damn Small Linux. The distribution, headed by Thorsten Schneider, aims to deliver the Operating System in such a way that it allows Security Students first hand insight and hands on experience with Security issues within GNU/Linux in order to teach them protection and mitigation techniques The project's website describes the distribution as 'the most vulnerable, exploitable Operating System ever' and it's true, the developers have ensured that it contains outdated, ill-configured, flawed code and contains GNU/Linux 2.4 Kernel which is known to have many exploitable avenues in itself. Damn Vulnerable Linux's website can be viewed here."
Encryption

Submission + - Final AACS key found

julie-h writes: The PowerDVD AACS private key for playing Blu-Ray and HD-DVD's have been found. This was the last key needed. What does this mean? We don't have to sniff/snoop Volume IDs anymore. We can create a program that can decrypt (or play if you will) a disc without any need for WinDVD or PowerDVD. So no sniffing/extracting of keys anymore. And more over: it can work on all platforms... In other words: we can make our own independent, user friendly player (or decrypter).
Security

Submission + - Released Wordpress source code included hack

Slinky Sausage writes: "Thousands of servers running the Wordpress blogging software are at tremendous risk after it was revealed that a cracker had hacked into the Wordpress download servers and modified the software's source code. The hack was done shortly after the new version 2.1.1 was released, and the hack was undetected for several days, meaning that thousands of people who have upgraded to the latest 'security release' version of Wordpress have unintentionally installed what amounts to a trojan horse on their web server."

New Cye Support for Linux! 38

Brian Chemel wrote in to let us know that all the Cye Robot Map-n-Zap software, the interface, everything, is now being released under the GPL. This is fantastic news for anyone interested in robotics and Linux. Update: 01/24 05:30 by E : Hey, there's cool Java Open Source Cye stuff available at http://www.teambots.org. Rock on, guys.

Slashdot Top Deals

To program is to be.

Working...