Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:BluRay? Why? (Score 1) 419

Go to your friend's Bluray Player and click "zoom" on the picture. It brings-up details in the movie you can't see on DVD or Upconverting DVD. (Zooming on dvd just shows a blur of MPEG2 artifacts.)

Oh yes ! Because I like very much stopping and zooming on movies. In fact I always do that each 5mn, so I can watch details, *that* is really much more entertaining - even if my GF disagrees.

Thanks you for proving it's bullshit.

Comment Re:Someone's gonna get in trouble... (Score 1) 680

[...] he'll be marked as a terrorist and in the cross hairs of watch-list databases for the next decade.

Don't screw with the cops man, at best it's a College frat gone bad. However technically right you may be this is playing with fire while surrounded by dynamite.

Mmmh ... from the sound of it you don't seem to be living in a democracy. What's the name of your country already ?

Government

European Parliament Declaring War Against ACTA 307

An anonymous reader writes "The European Parliament is preparing to take on ACTA. A joint resolution (DOC) has been tabled by the major EP parties that threatens to go to court unless things change. The EP is calling for public access to negotiation texts and rules out further confidential negotiations. Moreover, the EP wants a ban on imposing a three-strikes model, assurances that ACTA will not result in personal searches at the border, and an ACTA impact assessment on fundamental rights and data protection."
Government

US Immigration Bill May Bring a National Biometric ID Card 619

schwit1 sends this quote from the Wall Street Journal: "Lawmakers working to craft a new comprehensive immigration bill have settled on a way to prevent employers from hiring illegal immigrants: a national biometric identification card all American workers would eventually be required to obtain. Under the potentially controversial plan still taking shape in the Senate, all legal US workers, including citizens and immigrants, would be issued an ID card with embedded information, such as fingerprints, to tie the card to the worker. ... A person familiar with the legislative planning said the biometric data would likely be either fingerprints or a scan of the veins in the top of the hand. It would be required of all workers, including teenagers, but would be phased in, with current workers needing to obtain the card only when they next changed jobs, the person said. The card requirement also would be phased in among employers, beginning with industries that typically rely on illegal-immigrant labor."
Security

Aurora Attack — Resistance Is Futile, Pretty Much 268

eldavojohn writes "Do you have branch offices in China? iSec has published a new report (PDF) outlining the severity of the attacks on Google.cn, allegedly by the Chinese government, dubbed 'Aurora' attacks. Up to 100 companies were victims, and some are speculating that resistance to such attacks is futile. The report lays out the shape of the attacks — which were customized per-company based on installed vulnerable software and antivirus protection: '1. The attacker socially engineers a victim, often in an overseas office, to visit a malicious website. 2. This website uses a browser vulnerability to load custom malware on the initial victim's machine. 3. The malware calls out to a control server, likely identified by a dynamic DNS address. 4. The attacker escalates his privilege on the corporate Windows network, using cached or local administrator credentials. 5. The attacker attempts to access an Active Directory server to obtain the password database, which can be cracked onsite or offsite. 6. The attacker uses cracked credentials to obtain VPN access, or creates a fake user in the VPN access server. 7. At this point, the attack varies based upon the victim. The attacker may steal administrator credentials to access production systems, obtain source code from a source repository, access data hosted at the victim, or explore Intranet sites for valuable intellectual property.' The report also has pages of recommendations as well as lessons learned, which any systems administrator — even those inside the US — should read and take note of."

Slashdot Top Deals

Love may laugh at locksmiths, but he has a profound respect for money bags. -- Sidney Paternoster, "The Folly of the Wise"

Working...