Solve real business challenges on Google Cloud and run workloads for free. For Slashdot users: Get $300 in free credits to fully explore Google Cloud. Get started for free today.
carlmenezes writes: Arstechnica has an article on Microsoft's open letter to IBM that adds fresh ammunition to the battle of words between those who support Microsoft's Open XML and OpenOffice.org's OpenDocument file formats. Microsoft has strong words for IBM, which it accuses of deliberately trying to sabotage Microsoft's attempt to get Open XML certified as a standard by the ECMA. In the letter, general managers Tom Robertson and Jean Paol write: "When ODF was under consideration, Microsoft made no effort to slow down the process because we recognized customers' interest in the standardization of document formats." In contrast, the authors charge that IBM "led a global campaign" urging that governments and other organizations demand that International Standards Organization (ISO) reject Open XML outright.
Could MS actually be getting a taste of their own medicine?
drm4lyfe writes: SlySoft AnyDVD now supports HD-DVD. AnyDVD is a very simple and easy to use tool that is as simply as drag and drop. The apparent ease in copying these disks may put HD-DVD ahead of Bluray...
Apro+im writes: PCWorld is reporting: "If you haven't changed the default password on your home router, do so now. That's what researchers at Symantec and Indiana University are saying, after publishing the results of tests that show how attackers could take over your home router using malicious JavaScript code."
The root of the problem seems to stem from routers allowing GET requests to have side-effects, allowing attackers to change settings and then perform man-in-the middle attacks. Though the story and the linked paper (PDF) claim that routers with changed passwords are immune, a quick experiment shows that routers which use HTTP Authentication can be compromised the same way, if the user has logged into their router earlier in the browser session. Also, though the article says this is a Javascript exploit, it can actually be executed by any tag which allows the inclusion of a "src" element from another domain (e.g., "img").