Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×

Comment Re: "Slashmirrored" (Score 2) 341

>> Gentoo can not be setup to use systemd too

Are you sure? My laptop begs to differ:
$uname -a
Linux jglaptop 3.12.6-gentoo #1 SMP PREEMPT Sat Dec 28 11:22:53 GMT 2013 x86_64 Intel(R) Core(TM)2 Duo CPU P8600 @ 2.40GHz GenuineIntel GNU/Linux

and spits out things like this:

gerdesj@jglaptop:~$ systemctl status apache2
apache2.service - Apache Web Server
      Loaded: loaded (/etc/systemd/system/apache2.service; enabled)
      Active: active (running) since Sat 2013-12-28 12:18:03 GMT; 1 day 10h ago
    Process: 2719 ExecStart=/usr/sbin/apache2 $APACHE2_OPTS -k start (code=exited, status=0/SUCCESS)
  Main PID: 2796 (/usr/sbin/apach)
      CGroup: /system.slice/apache2.service
                      2796 /usr/sbin/apache2 -D INFO -D MANUAL -D SSL -D SUEXEC -D LANGUAGE -D PHP5 -D DEFAULT_VHOST -D SSL_DEFAULT_VHOST -D SECURITY -D PERL -k start
                      2797 /usr/sbin/apache2 -D INFO -D MANUAL -D SSL -D SUEXEC -D LANGUAGE -D PHP5 -D DEFAULT_VHOST -D SSL_DEFAULT_VHOST -D

Cheers
Jon

Comment Re:Southwest.. (Score 1) 462

You feel happy to espouse views like that openly, using an account rather than AC.

The US really does not resemble either the DDR or USSR in any way. I'm from the UK but recently visited the US (again) for some time. I have also briefly visited the DDR via Checkpoint Charlie in Berlin in the '80s - that was an eye opener, as was the Corridor and the Wall.

There's no reason to dig up history for repression. You might like to note that women are not allowed to drive in Saudi Arabia but some brave souls flout the rules. You may also think about what life in say Syria or large parts of Africa, let alone Afghanistan and other large parts of the world I've missed out, might be like.

Are you sure the world is such a bad place for the likes of you and I?

Cheers
Jon

Submission + - WWII Japanese Aircraft-Carrying Super Submarine Located Off Hawaii (www.cbc.ca)

Freshly Exhumed writes: Scientists plumbing the Pacific Ocean off the Hawaii coast have discovered a Second World War era Japanese submarine, a technological marvel that had been preparing to attack the Panama Canal before being scuttled by U.S. forces. The 122-metre "Sen-Toku" class vessel — among the largest pre-nuclear submarines ever built — was found in August off the southwest coast of Oahu and had been missing since 1946, scientists at the University of Hawaii at Manoa said. The I-400 and its sister ship, the I-401, which was found off Oahu in 2005, were able to travel one and a half times around the world without refueling and could hold up to three folding-wing bombers that could be launched minutes after resurfacing, the scientists said.

Submission + - I challenged hackers to investigate me and what they found out is chilling 3

An anonymous reader writes: In 1999 while writing for Forbes, Adam Penenberg wanted to see how easy it would be for hackers to access his family's bank account information, social security numbers, and online passwords. Now, in 2013, with more of our data than ever at the fingertips of nefarious operators, Penenberg is at it again, asking a group of "white-hat" hackers how easy it would be to hack his and his wife's lives.

What he found is that if someone is determined and savvy enough to access your private information, there's a good chance that person will be successful. Using a combination of phishing emails, mal-ware, and old school surveillance tactics, the team at SpiderLabs was able to take over his laptop and iPhone, and gain access to his personal bank information and online passwords.

Submission + - GCC 4.9 Will Make Compilers More Exciting In 2014 (phoronix.com) 1

noahfecks writes: It seems that the GCC developers finally took actions to improve after CLANG is stepping ahead. Among the highlights to look forward to right now with GCC 4.9 include:
  • The Undefined Behavior Sanitizer has been ported to GCC.
  • ADA and Fortran have seen upgrades.
  • Improved C++14 support.
  • - RX100, RX200, and RX600 processor support by GCC.
  • Intel Silvermont hardware support.

Submission + - Mac OS 10.9 -- Infinity times your spam (fastmail.fm)

An anonymous reader writes: Email service FastMail.fm has an blog post about an interesting bug they're dealing with related to the new Mail.app in Mac OS 10.9 Mavericks. After finding a user who had 71 messages in his Junk Mail folder that were somehow responsible for over a million entries in the index file, they decided to investigate. 'This morning I checked again, there were nearly a million messages again, so I enabled telemetry on the account ... [Mail.app] copying all the email from the Junk Folder back into the Junk Folder again!. This is legal IMAP, so our server proceeds to create a new copy of each message in the folder. It then expunges the old copies of the messages, but it’s happening so often that the current UID on that folder is up to over 3 million. It was just over 2 million a few days ago when I first emailed the user to alert them to the situation, so it’s grown by another million since. The only way I can think this escaped QA was that they used a server which (like gmail) automatically suppresses duplicates for all their testing, because this is a massively bad problem.' The actual emails added up to about 2MB of actual disk usage, but the bug generated an additional 2GB of data on top of that.

Submission + - Capturing The Flag, SQLi-Style (darkreading.com)

CowboyRobot writes: Penetration tester and long-time security professional Sumit "Sid" Siddharth has developed a real-world SQL injection sandbox simulator, and invites the public for a capture the flag event later this month. "The only way you can understand the true impact of vulnerabilities is by practicing exploitation. Even vulnerability identification goes hand-in-hand with exploitation," says Siddharth. "Sometimes identifying the vulnerability is really difficult, and it's only when you know advanced exploitation techniques that you can do so. "We've also put together some really nice examples where identifying the vulnerability is really difficult, and we've asked people to find the needle in the haystack because that's how websites get compromised at the end of the day,"

Comment Re:TAILS (Score 1) 234

Yeah right, except quite a few of us post on Slashdot and other tech sites - we are a gated community. Nearly all sysadmins are a piece of piss to find on t'interwebs.

Perhaps those site's web log files might not be as well protected as you might want - I doubt that our host's web masters are the only viewers.

Perhaps you describe some aspect of your home/work/cloudy system, perhaps over many posts over several months/years (your modus operandus) on these tech sites.

Perhaps there is someone who has a system that draws neat graphs linking posts to persons to groups of IT systems and hence to how they are secured.

To make it especially easy to follow, why not sign off your posts in a distinctive way.

Cheers
Jon

PS Bugger AC - I've been here years and a few years before I signed up. I've never bothered posting AC - I'm a security consultant.

Comment Re:Hopefully (Score 1) 39

Stale -Ha!

Here's a snippet from one of the data dumps (telnet is less than 300MB), note the dates. Have a look yourself and you'll get the IP address this belongs to along with many, many others:

(This is a telnet login banner which I've had to clean out somewhat to post here)
Copyright (c) 1998-2007 Huawei Technologies Co., Ltd. All rights reserved. Without the owner's prior written consent, no decompiling or reverse-engineering shall be allowed.

I was pretty horrified but not too surprised at the contents of just one data dump after a quick look.

Cheers
Jon

Submission + - Scientists create new form of matter from photons (phys.org)

wasteoid writes: We are one step closer to Star Trek replicators and holodecks with the advancement achieved by scientists at the Harvard-MIT Center for Ultracold Atoms. The scientists have managed to coax the photons to bind together to form photonic molecules, a state of matter that was previously only theoretical. Using an ultra-cold version of light refraction, two photons were slowed down sufficiently to cause them to bind together in the ultra-cold media, exiting as a single photon molecule.

Slashdot Top Deals

We are each entitled to our own opinion, but no one is entitled to his own facts. -- Patrick Moynihan

Working...