Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Oh honestly (Score 2, Insightful) 436

It seems to have become trendy again to hate Apple no matter what, but this is getting ridiculous. Why is it that Apple is expected to be the only platform vendor that has to maintain their own version of the JVM for free? Jobs is quite correct in saying that Java under OS X has long lagged behind the latest official Sun release. I wish it was more common for Apple to leave more components to third parties now that they've got more market share. Another example would be graphics drivers, which lag tremendously in both performance and features. I don't understand why on Earth any Java dev would want to be stuck indefinitely with Apple's outdated implementation that by definition would never be a major priority rather then get a version from the main organization behind it. For that matter I blame Sun's longstanding ambivalence toasted FOSS. If we had a fully open GPL edition of the JVM that was best of class like we should have gotten years ago, this never would have been an issue in the first place. It's yet another tech Sun's BS has screwed us on, with their insistance to out ZFS under the CDDL rather then Apache/BSD/LGPL being another major example. Anyone still have that old sun strategy wheel, from before 'acquisition' became their final exit?

Comment Adds another layer to hardware solutions? (Score 4, Interesting) 260

Or the converse, I suppose (hardware solutions can add another layer to this). This looks like some very interesting work, and may have more applicability in general beyond this one scenario. I'm certainly looking forward to following their implementation as it comes along. But with that said, if this attack was a serious concern for a given entity there seem to be some obvious potential hardware solutions. The attack essentially depends on being able to shutdown the computer but keep the memory cold enough that the randomization time is slowed down tremendously, giving enough time to perform a dump of the contents onto another system for further analysis. Therefore, it can be prevented by, for example, having electric heater units surrounding the memory connected to a dedicated capacitor bank and temperature sensor, as well as a sensor to detect if someone tries for force open the machine (intrusion alarm). Then the system can perform a scram shutdown (or if it is just shutdown normally), and the heaters can assure that the memory is kept hot for a couple of seconds afterwards even in the face of attempted cooling. It only needs to manage it very briefly and then all the contents are scrambled. Other similar methods (maybe a really micro EMP inside a shield memory space) would be possible to, but basically they just need to deny an attacker for a very short amount of time or ensure entropy in the RAM and then the attack is useless.

Ultimately a dedicated hardware secure key store would be better and easier to integrate across all systems, and this more software solution of course has the massive advantage of being able to run for free on existing hardware. But the above could at least be retrofitted on nearly anything, and while it is more esoteric, then again so is the attack since it requires physical access.

Spam

Spam Flood Unabated After Bust 188

AcidAUS writes "Last week's bust of the largest spam operation in the world has had no measurable impact on global spam volumes. The spam gang, known by authorities and security experts as HerbalKing, was responsible for one-third of all spam, the non-profit antispam research group Spamhaus said." The article speculates that the operators of HerbalKing simply passed on to associates the keys to the automated, 35,000-strong botnet, and the spam flow didn't miss a beat.

Comment Trademark and ads actually the real issues (Score 5, Insightful) 621

Contrary the the statement there, I don't the even pretty wild interpretations of an EULA would apply at all. If they wished to pursue that angle Apple would need to go after individual users. From Apple's POV, I believe the only true point of contention would be if Open Tech uses any of their trademarks in its advertising or general web. They can't just plaster Apple OS X images all over the place for example.

No, the real potential source of suits isn't even necessarily from Apple. Rather, Open Tech will have to be very careful in their wording when it comes to promotion. From what I've seen an early draft of their PR used phrases like "Mac Compatible." What exactly does that mean, legally? What happens when a software update breaks the OS? If a customer sees "Mac Compatible" and nothing else, and then buys based on that, I could see grounds for a false advertising suit.

Of course, that can be avoided quite neatly I think with some very careful wording, and by making the limitations and lack of support from Apple very explicit. "Capable of running OS X", with a big fat bold "Not supported by Apple, future updates may not be compatible" warning might work just fine. This just seems like the area where, if these guys are amateur or don't think about it much, they could get tripped up.

Security

Submission + - {Update}Mac OS X Root Escalation via AppleScript

Zergwyn writes: This is just a suggestion to update the "Mac OS X Root Escalation Through AppleScript" article to add a temporary solution. The cause of the escalation is having the set-user-ID-on-execution (SUID) bit set for /System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/MacOS/ARDAgent which is an application owned by root. As a result anything it executes is also owned by root, thus the escalation. Unsetting the SUID bit via chmod prevents this behavior until there is a more permanent patch.
Music

Submission + - First Recorded Song Found on 1860 Phonautogram

Pickens writes: "Thomas Edison has long been considered the father of recorded sound but researchers say they have unearthed a recording of the human voice, made by Frenchman Édouard-Léon Scott , that predates Edison's invention of the phonograph by nearly two decades. The 10-second recording of a singer crooning the folk song "Au Clair de la Lune" was discovered earlier this month in an archive in Paris by a group of American audio historian and made playable by scientists at the Lawrence Berkeley National Laboratory in Berkeley, California. "This is a historic find, the earliest known recording of sound," said Samuel Brylawski, the former head of the recorded-sound division of the Library of Congress, Scott's device had a barrel-shaped horn attached to a stylus, which etched sound waves onto sheets of paper blackened by smoke from an oil lamp. The recordings were not intended for listening; the idea of audio playback had not been conceived. Scott's 1860 phonautogram was made 17 years before Edison received a patent for the phonograph and 28 years before an Edison associate captured a snippet of a Handel oratorio on a wax cylinder, a recording that until now was widely regarded by experts as the oldest that could be played back."
Music

Submission + - RIAA calls attorney fee "excessive" (arstechnica.com)

An anonymous reader writes: It seems that the RIAA is finally listening to the arguments of the people getting sued, but not in the way many of us would have hoped since they use it in there own defence. According to Ars, they have this to say over the attorney fee in the Atlantic v. Andersen case: "... the RIAA called the $298,995 figure "excessive" and said that it should be drastically slashed to something along the lines of $30,000. In the RIAA's opinion, Atlantic v. Andersen was a "straightforward copyright infringement claim," and the labels' independent expert believes that the fees sought are excessive "in numerous respects." ..."

The official filings are also available on Ray Beckermans site, and can be found here.

Programming

Submission + - Webkit passes Acid3. (webkit.org)

ablaze writes: The latest Webkit nightlies are the first public available browser to pass Acid3. The Surfin' Safari Weblog has the news:

WebKit has become the first publicly available rendering engine to achieve 100/100 on Acid3. The final test, test 79, was a brutal torture test of SVG text rendering. [...] Indeed, we found a critical bug in the test itself that would have forced a violation of the SVG 1.1 standard to pass, so until a few hours ago it was not possible to get a valid 100/100. Acid3 test editor Ian Hickson has the details.

Media

Submission + - U.S. to File Trade Cases Against Pirated Material

ecoshift writes: "RIAA driving US Trade policy....???

"The Bush administration announced today that it is filing two new trade cases against China to force the Asian giant to crack down on the distribution of pirated products and to drop barriers to the sale of American music, movies and books."

— washingtonpost.com

http://www.washingtonpost.com/wp-dyn/content/artic le/2007/04/09/AR2007040900574.html?nav=rss_email/c omponents"
Math

Submission + - Celebrating the HP-35 calculator with a new model

An anonymous reader writes: Hewlett-Packard last week announced a contest whereby HP-35 fans create and submit videos of their favorite calculator memories. HP will choose the best videos and you can win a 50-inch, high-def plasma TV. But everyone wins, because HP this summer will debut a special new calculator model. The details aren't announced, however, it's likely to be a 35th anniversary edition of some sort. This was covered in Computerworld's new vintage technology blog.

Feed Tropical Forests -- Earth's Air Conditioner (sciencedaily.com)

Planting and protecting trees -- which trap and absorb carbon dioxide as they grow -- can help to remove carbon dioxide from the atmosphere. But a new study suggests that, as a way to fight global warming, the effectiveness of this strategy depends heavily on where these trees are planted. In particular, tropical forests are very efficient at keeping the Earth at a happy, healthy temperature.
The Internet

Stretching the Net To Its Limits

DebNY writes "A study from the Technology, Media & Telecommunications (TMT) group at Deloitte Touche Tohmatsu says the rapid rise of Web video and broadband net access 'may overwhelm some of the Internet's backbones' in 2007, while 'ISPs may struggle to keep pace with demand.' Ed Cone of CIO Insight however says reports of the Internet's imminent demise are greatly exaggerated." He goes on to say: "An Internet that is broken or seriously impaired at its core would obviously be bad for business in all kinds of ways...but as in the case of the most notorious prognostication of impending disaster, made in 1995 by Ethernet co-inventor Robert Metcalfe, the doom seers seem likely to eat their words. In fact, the supply of available bandwidth, especially at the core of the net, looks healthier than the pessimists would have it — or even bother to support with hard numbers when pressed to defend their arguments."

Slashdot Top Deals

This restaurant was advertising breakfast any time. So I ordered french toast in the renaissance. - Steven Wright, comedian

Working...