Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment There is a reason you are listed. (Score 5, Insightful) 279

There is a reason you are listed:

* You have spam originating from your system for too long of a time.
* You are unresponsive to reports.

So, your entire network range is listed. Everyone is bouncing emails. Everyone is complaining to you, and you've noticed. You've been forwarded the site, and you're contemplating just paying them off... except that it just won't work. You'll be relisted again, and with reason -- someone on your network spammed and nobody's listening.

Thus:

* If you haven't done so, open up abuse@ and point it to somebody with the power to diagnose, disable, and close accounts.
* If the guy behind abuse@ doesn't have said above power, GIVE IT TO HIM.
* If the guy behind abuse@ does, but doesn't use it, FIRE HIM.
* If you haven't done so, disable outbound port 25 at your border router with the exception of an out-bound SMTP server.
* Put an outbound spam filter in place.

If you are unwilling to do the above, then there is one last thing you will eventually do: CLOSE SHOP.

Data Storage

OCZ Wants To Cache Your HDD With an SSD 189

sl4shd0rk writes "OCZ is coming out with Synapse Cache; an SSD cache for your hard drive. The SSD runs software that copies data into the cache from your hard drive as you work with it. The data sits on the SSD until it gets less activity and gets flushed to the hard disk. Aside from boosting your IOPS to 10k/75k (read/write), the SSD also supports AES encryption, SMART and TRIM."
IOS

iOS 4.3.4 Prevents Hacking and Jailbreaking 281

Mightee writes "Apple has released a software update to iOS, version 4.3.4, for the iPhone 4, 3GS, iPad 2, 1, and iPod Touch. The main objective of this version is to prevent the hacking in Apple iOS devices which occurs through malicious PDF files. Another objective is to prevent the jailbreaking which occurs as a consequence of the previous effect. In previous versions, the iOS device is easily vulnerable to attacks. It happens because of mishandling of fonts embedded in the PDF file. Sometimes a downloaded PDF may be malicious, and there is a possibility that the file could inject malware into the iOS device, which gives a chance for the hackers to access the hardware of the iOS device."

Comment Option/feature removal has been going on since v2 (Score 1) 797

First, half the features in Gnome 1.x go in Gnome 2. Then the steady removal of options and features. Now they're *)!@#( with the window features that are standard on all windowing systems in the major OS's?!?

I'm glad I already moved onto KDE. I couldn't hack Gnome Option/feature Removal Syndrome (GOFRS).

PHP

Drupal Competes As a Framework, Unofficially 178

tgeller writes "Drupal developer Ben Buckman attended the BostonPHP Framework Bake-Off with the hopes of pitting the CMS against CakePHP, Symfony, Zend, and CodeIgniter. He was told that he couldn't because Drupal is 'not a framework,' a response he felt was 'coder-purist snobbery ("it's not a framework if you build any of it in a UI").' So he decided to unofficially compete in the back of the room by accepting the challenge of building a job-posting app in 30 minutes, while the official competitors did the same from the stage. He recorded the results, which are impressive. In the process he raised the question: What is a framework, anyway?"
Chrome

Chrome May Drop the URL Bar 343

An anonymous reader writes "There isn't much Google can still eliminate from the browser's interface. Yet Google appears to be considering a drastic step to free up space in the UI: It may simply kill the URL bar. Instead of showing the URL bar all the time, it may be hidden within tabs. There are some other features coming as well. For example, Google will allow users to be logged into different Google accounts at the same time, as long as you use those accounts in different windows."
Security

Linux Kernel Exploit Busily Rooting 64-Bit Machines 488

An anonymous reader writes "Running 64-bit Linux? Haven't updated yet? You're probably being rooted as I type this. CVE-2010-3081, this week's second high-profile local root exploit in the Linux kernel, is compromising machines left and right. Almost all 64-bit machines are affected, and 'Ac1db1tch3z' (classy) published code to let any local user get a root shell. Ac1db1tch3z's exploit is more malicious than usual because it leaves a backdoor behind for itself to exploit later even if the hole is patched. Luckily, there's a tool you can run to see if you've already been exploited, courtesy of security company Ksplice, which beat most of the Linux vendors with a 'rebootless' version of the patch."
Graphics

Wolfenstein Gets Ray Traced 184

An anonymous reader writes "After showcasing Quake Wars: Ray Traced a few years ago, Intel is now showing their latest graphics research project using Wolfenstein game content. The new and cool special effects are actually displayed on a laptop using a cloud-based gaming approach with servers that have an Intel Knights Ferry card (many-core) inside. Their blog post has a video and screenshots."

Slashdot Top Deals

"What man has done, man can aspire to do." -- Jerry Pournelle, about space flight

Working...