Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Biotech

Cheap Blood Clot Detection Device 103

Gearoid_Murphy writes "The BBC details the news of a cheap handheld device to detect blood clots on the surface of the brain. The device uses infrared light to penetrate 3 cm into the body; light that has passed through clotted blood changes detectably. A doctor who is testing the device in India said, 'We found a 98% accuracy for showing blood clots or haematomas.'"
Networking

Submission + - Fixing the IPv6 dilema

jd writes: "In an attempt to attract more people to using IPv6, a New Zealand group is offering free porn to those with access to an IPv6 tunnel or connection. This may or may not work, considering that the country involved has a hundred times as many sheep as humans, which may create a degree of scepticism over what exactly is on offer."
The Almighty Buck

EU Launches Antitrust Probe Into iTunes 318

Macthorpe writes "ABC News is reporting that the EU has started an antitrust probe into the way that Apple sells music on iTunes. As you can only purchase from the store of the country where your credit or debit card is registered, the price differences and availability differences between iTunes stores for different EU countries constitute a violation of EU competition laws which forbid territorial sales restrictions.'Apple spokesman Steve Dowling said Monday the company wanted to operate a single store for all of Europe, but music labels and publishers said there were limits to the rights that could they could grant to Apple. "We don't believe Apple did anything to violate EU law," he said. "We will continue to work with the EU to resolve this matter."'"
Hardware Hacking

Submission + - New Powered USB Part 3: Response to Slashdot

Patrick McFarland writes: "I've written a third, and hopefully final part, to the originally two part Why Powered USB Is Needed article that was featured on Slashdot three days ago, and this response is pretty much due to Slashdot users asking smart questions and poking a few holes in my argument. The third part covers how USB 3.0 essentially needs to follow in Firewire's footsteps to truly succeed and overcome people's views on USB as just a low bandwidth bus that no one uses seriously and, combined with New Powered USB, could overtake Firewire in high bandwidth applications."
Software

PC World's 50 Best Tech Products of All Time 399

Ant writes "PC World picks the 50 best tech products of all time. Apple holds down seven places in the list, Microsoft two, and open source software (Red Hat Linux) one. The top five, according to PC World, are: Netscape Navigator (1994), Apple II (1977), TiVo HDR110 (1999), Napster (1999), and Lotus 1-2-3 for DOS (1983).
Windows

Submission + - Professional Rootkits review

cpm80 writes: "Professional Rootkits (http://www.amazon.com/gp/product/0470101547/ref=c m_arms_pdp_dp/102-0642403-7880107) fully details rootkit technology in a modular, easy to learn progression from extremely simple to extremely functional. The book offers both chapter-by-chapter binaries and compile-and-run options, to cater to every level of development. Whether you want to read along and use the precompiled binaries, or modify the code and recompile new binaries, you can start simple and build your knowledge quickly.

The Wrox format really helps with this topic. The author begins with a very simple rootkit that's easy to understand, and slowly adds functionality throughout the book. There are no snippets that require extensive rework to integrate, no vague references to technology beyond the scope of the book, no indecipherable compile errors or blue screens; just good code wrapped in a book that fully details rootkits.

I was amazed by how easy it was to learn Windows kernel internals and use that knowledge to write fully functional rootkits. I took the time to download all the free software required to compile and run the code provided, so I was able to use the modularity of the code to create specific rootkits. I now have a key logger, an Outlook email filter, a network filter and a USB key filter. But aside from these new "utilities" I now have a thorough understanding of rootkits and how they can be used.

On the flip side, there is a certain amount of irresponsibility involved in providing the world with an easy to understand tutorial explaining the development and use of rootkits. Now, anyone who suspects their spouse is cheating can make a key logger. Anyone who thinks their boss is trying to replace them can make an email filter. The book even provides a common technique for installing rootkits from a visited web site! As a software engineer, I find the subject "interesting", but as a security officer, I suspect this book will be more "critical".

There are 14 chapters; of these, 9 chapters detail rootkit technology. The topics are:

A Basic Rootkit (a very simple introduction to rootkits)
Kernel Hooks ( this chapter adds a single kernel hook)
User Hooks (this chapter uses the kernel hook to do "Process Injection")
I/O Processing (this chapter explains Device I/O Control )
Communications (this is very stealthy TDI communications)
Filter Drivers (file filters and network filters!)
Key Logging (the first unloadable key logger I've ever seen)
Concealment (this caters to "old style" rootkit hiding techniques)
E-mail Filtering (Outlook and Lotus Notes "corporate" email filtering)

Knowing how these tricks are performed can be invaluable to both rootkit developers and security specialists. In addition, the book provides chapters on Rootkit Detection and Rootkit Prevention. Even if you're not worried about rootkits, knowing these basic security concepts can make a big difference if you use the Internet.

In summary, it's a great book (unless you're Microsoft) and I can't wait for the Linux version!"
The Almighty Buck

X Prize For a 100-MPG Car 741

Heinen writes in about the X Prize Foundation, which spurred innovation by offering US $10 million for the first privately built spacecraft. The Foundation now plans to offer millions for the first practical car that increases mileage five-fold. The specs for the competition are out in draft form amd call for cars in two categories that are capable of 100 MPG in tests to be run in 2009. The categories are: 4-passenger/4-wheel; and 2-passenger/unspecified wheels. The cars must be manufacturable, not "science projects. The prize is expected to top $10 million. The X Prize Foundation says that so far it has received more than 1,000 inquiries from possible competitors.
Google

Google In Bidding To Buy DoubleClick 120

A number of readers clued us to the latest development in the saga of te sale of DoubleClick: Google has thrown its hat into the ring against Microsoft and (reportedly) Yahoo and AOL. Most of the stories quote a Wall Street Journal piece that is only available to subscribers. Google's entry into the bidding may boost the price for the remaining pieces of DoubleClick (parts of the company having already been sold off) to $2 billion, twice what its current owners paid for the whole thing. Some reports speculate that this figure could give Microsoft pause.
Sci-Fi

1979 Interview With Douglas Adams 73

An anonymous reader points out the inaugural issue of the online sci-fi mag Darker Matter, which start off with a bang by publishing an interview with the late Douglas Adams that has not seen the light of day in 28 years, except for brief excerpts published in the magazine that commissioned the interview. The first two parts are now online with the last part coming next month.
Security

E-Voting Reform Bill Gaining Adherants 161

JeremyDuffy sends us to Ars Technica for a look at an e-voting bill making its way through Congress that is gaining the support of the likes of Ed Felten and the EFF. Quoting: "HR 811 features several requirements that will warm the hearts of geek activists. It bans the use of computerized voting machines that lack a voter-verified paper trail. It mandates that the paper records be the authoritative source in any recounts, and requires prominent notices reminding voters to double-check the paper record before leaving the polling place. It mandates automatic audits of at least three percent of all votes cast to detect discrepancies between the paper and electronic records. It bans voting machines that contain wireless networking hardware and prohibits connecting voting machines to the Internet. Finally, it requires that the source code for e-voting machines be made publicly available."

Slashdot Top Deals

An Ada exception is when a routine gets in trouble and says 'Beam me up, Scotty'.

Working...