Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Submission + - Twitter Suffers Web Interface Exploit (mashable.com)

HaloZero writes: "We're seeing lots of re-tweets on Twitter.com right now, all containing a fragment of JavaScript, which re-tweets itself when moused-over on the Twitter web interface. This could easily be muted into a more sinister attack, so it is recommended that you use a third party client application, or refrain from social media altogether until the problem is resolved."
The Internet

Submission + - Frontier tells Rochester, NY 'You don't need FiOS' (stopthecap.com)

HaloZero writes: "Frontier Communications feels that rolling out FiOS service to it's Rochester, NY market is unnecessary, despite having just bought some of Verizon's FiOS assets. From TFA: "The general manager of Frontier’s Rochester division, told WHAM-TV reporter Rachel Barnhart the company believes its current DSL service is more than adequate for residents in the company’s largest service area. This, despite the fact Frontier recently adopted a handful of FiOS markets purchased from Verizon Communications. While Frontier has promised to continue delivering the fiber-to-the-home service in areas already offered the service started by Verizon, they have no plans to expand FiOS.""

Comment Great (Score 1) 220

According to the expiry date on my HSBC card, one of the mailed cards could very likely have been mine.

I will be cancelling my HSBC account as soon as I can find an effective replacement bank. We have an ESL Credit Union nearby; looking for any other alternatives if anyone has any suggestions.

Comment Re:DIY phone backups (Score 1) 304

Unfortunately, BitPim would not have been an option for this situation, as the T-Mobile Sidekick does not store any data locally - simply plus down an image from the giant server in the sky on a reboot.

And that's the 'server' that's gone, now.

This is an epic fail; many bards will send their sons to school on the song that will be sung from this gross misadventure.

Comment Re:How do you know when you've decrypted something (Score 4, Informative) 104

You don't know - and neither does the computer.

Decryption is a mathematical operation. You are given a blob of yunk. You can be fairly certain it is encrypted with a given cipher because it meets certain characteristics - either length, or hash-depth, or there is a header or footer of a given length, or some revealing information about the cipher may have been sent prior to or alongside the encrypted blob.

Then, if you're smart enough, or you have enough money, or time, or computing power, or a lot of luck, the decryption operation might occur. You can check as to whether or not you've successfully decrypted the data mathematically - e.g. does the result set fit with the function I've just run and give me the source data I started with? If so, yes, you've decrypted the data.

It's your responsibility as a researcher to decide what to do with whatever came out the other side. You may have to decrypt it again before proceeding. You may find out that what you just decrypted was nothing more sinister than ICMP_FRAGMENTATION_REQUIRED (Frak!).

The holy grail of cryptography may infact be steganographical encryption - or binary / machine language that reads as Grandmother's Cookie Recipe, but when run as an executable it actually glasses the machine. Who knows?

Comment Proof / Evidence (Score 4, Insightful) 436

Unless Jobsy himself has told you this, I'm pretty sure that running this article either violates HIPPA, or is simply full of lies...

Where did the information about a transplant come from? I hope the source was verified, and re-verified, and then re-verified again. Remember when CNN posted that Jobs had had a heart attack, but it simply turned out to be "citizen journalism" gone horribly, horribly wrong? Gotta be careful with this crap.

Either way, all the best to The Steve.

Slashdot Top Deals

One man's constant is another man's variable. -- A.J. Perlis

Working...