Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re:A truly ridiculous idea. (Score 1) 166

Maybe we can re-use some parts from the Ark.
The Ark, a Cybertronian spacecraft, crash lands on the dark side of Earth's Moon.
http://en.wikipedia.org/wiki/Transformers:_Dark_of_the_Moon
http://4.bp.blogspot.com/-4LNd6xGAnII/TgqIiaIn4xI/AAAAAAAAByk/M1Rc35s_BsQ/s1600/transformers-dark-of-the-moon-original.jpg
Microsoft

Submission + - Microsoft blasts IBM in open letter

carlmenezes writes: Arstechnica has an article on Microsoft's open letter to IBM that adds fresh ammunition to the battle of words between those who support Microsoft's Open XML and OpenOffice.org's OpenDocument file formats. Microsoft has strong words for IBM, which it accuses of deliberately trying to sabotage Microsoft's attempt to get Open XML certified as a standard by the ECMA. In the letter, general managers Tom Robertson and Jean Paol write: "When ODF was under consideration, Microsoft made no effort to slow down the process because we recognized customers' interest in the standardization of document formats." In contrast, the authors charge that IBM "led a global campaign" urging that governments and other organizations demand that International Standards Organization (ISO) reject Open XML outright.
Could MS actually be getting a taste of their own medicine?
Security

Submission + - Malicious Websites Can Subvert Personal Routers

Apro+im writes: PCWorld is reporting: "If you haven't changed the default password on your home router, do so now. That's what researchers at Symantec and Indiana University are saying, after publishing the results of tests that show how attackers could take over your home router using malicious JavaScript code."

The root of the problem seems to stem from routers allowing GET requests to have side-effects, allowing attackers to change settings and then perform man-in-the middle attacks. Though the story and the linked paper (PDF) claim that routers with changed passwords are immune, a quick experiment shows that routers which use HTTP Authentication can be compromised the same way, if the user has logged into their router earlier in the browser session. Also, though the article says this is a Javascript exploit, it can actually be executed by any tag which allows the inclusion of a "src" element from another domain (e.g., "img").

Slashdot Top Deals

To do nothing is to be nothing.

Working...