Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Microsoft

Submission + - Vista makes forensic exam of PC easier for lawyers (abanet.org)

Katharine writes: Jason Krause, a legal affairs writer for the American Bar Association's 'ABA Journal' reports in the July issue that Windows Vista will be a boon for those looking for forensic evidence of wrongdoing on defendants' PC's and a nightmare for defendants who hoped their past computer activities would not be revealed. Krause quotes attorney R. Lee Barrett, 'From a [legal] defense perspective, [Vista] scares me to death. One of the things I have a hard time educating my clients on is the volume of data that's now discoverable.' The fun is primarily attributable to Shadow Copy, TxF and Instant Search.
Privacy

Submission + - Newly Declassified Window Film Keeps Out Hackers, (sciam.com) 1

An anonymous reader writes: A newly declassified window film from CPFilms Inc. (Solutia Inc.) will give war drivers a run for their money. As printed in a recent issue of Scientific American: Once manufactured under an exclusive contract with the U.S. government, this recently declassified window film is now available to the public. But don't expect to see it on store shelves anytime soon. Currently, it's only available directly from the manufacturer, and at prices that will likely make it prohibitive for all but the wealthiest home owners. The two-millimeter-thick coating can block Wi-Fi signals, cell phone transmissions, even the near-infrared, yet is almost transparent, making it no more intrusive than conventional window treatments. It can keep signals in (preventing attempts to spy on electronic communications) or out, minimizing radio interference and even the fabled electronics-destroying electromagnetic pulse (EMP) generated by a nuclear blast.
Biotech

Submission + - Star Trek medicine device

An anonymous reader writes: While SCENAR is around for more than 30 years, it is not widely known among physicians and Slashdot readers ;). Initially developed for soviet space program as cure-all device to be used by astronauts, with the fall of USSR empire the device was disclosed in Russia for public healthcare. It was immediately associated with medical device from Star Trek movie due to it's origin and application. Today I even found it in YouTube. It is not easy to change the minds of doctors and even harder to believe in "panacea" after all false attempts before. But it is a science behind SCENAR and it worths attention not less than iPhone.
Security

Submission + - Up to 40 million Mastercards compromised by theft (securityfocus.com) 2

John3 writes: "Mastercard announced that at least 68,000 and possibly as many as 40 million Mastercard accounts were compromised by a security breach at Cardsystems Solutions. Cardsystems Solutions has been in trouble before due to security breaches, so one would have hoped that they would have beefed up security. I received a replacement Mastercard yesterday in the mail (with a totally new account number) due to this security breach, and a number of customers shopping at my hardware store today commented that they also received new Mastercards. Anyone else receive a replacement Mastercard in the past few days and how much is this breach costing the banks (and ultimately the cardholders)?"
Printer

Submission + - Which printer won't rip me off?

Wellington Grey writes: "My old inkjet printer died on me today, and after the number of stories we've had on slashdot about the dirty tricks that printer companies pull — from misreporting ink levels to DRM and preventing refills — I wanted to know if slashdotters had any printers they can actually recommend. I don't do a lot of printing, perhaps 50 pages a week, but I don't want to support any companies that try and deceive their customers or sell products designed to fail."
It's funny.  Laugh.

Journal SPAM: Wealthy People Annoyed with Reality 13

The Biltmore area in Phoenix is full of lush golf courses and man made lakes. It's really beautiful and a place for the wealthy to enjoy. Of course - the set up makes it incredibly attractive to coyotes. Not the kind running illegals across the border - real, honest to goodness coyotes. And the thing is, coyotes are happy eating quail, rabbits or some rich persons pet. This makes the rich people upset and the rich people
Intel

Submission + - Intel's AMT: Free Rootkits for All?

An anonymous reader writes: Intel seems to be surprising everyone lately: Some people are starting to get alarmed after Intel started introducing its new AMT (Active Management Technology) in its recent Core2 Duo T,L,U7000 and E6000 series (Centrino Pro for laptops and vPro for desktops, formerly known as Santa Rosa). "AMT is a technology intended to facilitate survailance, maintenance and control computers remotely. Essentially, all new Intel machines (and a number of current Intel servers) come with free hardware rootkit functionality on die, which is operational and accessible when the machine is powered off, and in the case of laptops, even when they are unplugged and powered off. This is OS agnostic, and it will take out your OSX, Windows and Linux boxen. there is a microcontroller that is always on and can recieve and perform instructions even though the system appears to be turned off. AMT allows for the following funcitons among others: Monitor and control (filter) the network traffic — before/under the running operating system; sending out patches to computers — even if they are turned off; Control, upgrade, change, add and remove software; re-route hdd access to a location on the network; re-route mouse, keyboard, screen and other extras to a location on the network." It's really becoming difficult to decide who actually owns the information in my computer.

Comment Mathematical certainly not important here (Score 1) 82

I've an idea then for how to circumvent this, that doesn't require defeating the mathematics involved.

Alright, so say you're running this software for whatever reason, maybe just to keep up appearences. But you don't want your traffic flagged, and you don't want to filter at the router. We can still decompile though. So... What about extracting the placeholder and the public key, then replacing the software with your own version that ALWAYS outputs the encrypted placeholder regardless of the input?

Just a thought, thanx for your attention.

Slashdot Top Deals

An Ada exception is when a routine gets in trouble and says 'Beam me up, Scotty'.

Working...