Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re:Coming to Cydia (Score 1) 541

There is actually 1 thing missing in your spec list.

Touch screen: Resistive vs Capacitive with multitouch support. iPhone wins big.

I don't actually know it's resistive, but most other HTC stuff is. I use a XV6900 (HTC Vogue) running Android and love it, only thing I really would love would be a capacitive screen. Wouldn't consider an iPhone, but it is a huge selling point.

Networking

Submission + - Pimping out a new house

Jason Michael Perry writes: "I just got preapproved to buy some gutted property in New Orleans. A lot of the houses I'm looking at are blank canvases that need new wiring, new walls, the whole nine-yards. i've always dreamed of a high tech house that says my name when I walk in and now is my chance to get a close as i can with current technology. That said, I'm looking for ideas to pimp out a newly renovated house with all the best technology. If you had a blank canvas to start with what would you do? Run CAT-5 or Fiber Optics? Build a closet for servers and A/V equipment? Install a 7.1 speaker system into the living room inside the walls and ceillings? Automated lights and intercom (with support for Apple equipment)? How about applicances, the kitchen, and other spots...what cool tech can I use there? My only rules and requirements are support for the 4 Mac's I have in the house...and resonable support for technology on the fringes... -Jason"
Security

Submission + - The Next Super Worm - Analysis of future AJAX Worm (gnucitizen.org)

An anonymous reader writes:
I will start my discussion by linking to XSSED.com. If you don't know what is XSSED.com I would suggest to go and check what it does right now. Are you done? OK! To summarize XSSED.com has the largest archive of real, fully working, XSS vulnerabilities available today. They even have a list of XSS vulnerabilities that are found in websites ranked 500 and bellow according to ALEXA. We are talking about high profile websites here people.

Why this database is interesting to attackers? Well, obviously, attackers can use it to phish users and steal important/sensitive information. In a very typical scenario, the attacker will grab a few of these XSS vectors, develop exploits for them, and send them to as many victims as possible. Of course the situation is quite grim. However, it is a lot worse then that.

Today it is so easy to create an epidemic infection that is totally based on XSS. If an unaware user visits a page that contain malicious JavaScript which recreates a behaviour similar to the one that a described above, they can be exploited on every single domain they have visited during their entire session.


"The Next Super Worm" is quite interesting article that show the characteristics and behavioural patterns of the next generation AJAX worms. The article is based on a research PDP presented at OWASP and there are some really cool POCs that can be found over GNUCITIZEN.

Red Hat Software

Submission + - Fedora 7 Released!

Vertana writes: After being developed for 6 months, the Fedora Project today has released the 7th release of Fedora (formerly Fedora Core). New in this release are Fast User Switching, the merging of the repositories (Core and Extras are now all in Core), faster package management, as well as more robust hardware detection. Read more about it here.
Microsoft

Submission + - Microsoft unveils new device called Surface

GnarlyDoug writes: According to MSNBC, Microsoft has a new device called Surface . It is in effect a very large touch-screen device built into a large work surface, and it looks like Bill Gates sees this as the future of computing. What do you think?

Slashdot Top Deals

Ya'll hear about the geometer who went to the beach to catch some rays and became a tangent ?

Working...