Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Malware and Worms in GNU/Linux and *BSD (Score 1) 600

Looks scary, right? Wrong. Because the solution is as simple as changing the default policy. Make it so that the default behavior is to notify only. On every system update the user should be told: "Go start the updater via the system menu. By the way, if you EVER see an "updater" you didn't start yourself, you are being pwned." Make sure that the system menu is strictly read-only, and even the dimmest user will be safe.

This will make it more difficult to trick the user, but not impossible. As long as the system menu is running with the user's privileges, it can be modified to launch a different program. And even if you find a way to prevent the user from messing with it - e.g., run it as a different user - the user won't be able to make any legitimate changes, either.

It's even easier for command-line tools: add a line to .bashrc that creates aliases or modifies $PATH so "sudo" and "su" point to malicious programs. How many users would actually check their $PATH or aliases before running sudo?

Finally, here's a way to create an almost undetectable malware. Add the line "LD_PRELOAD=~/.malware.so" to .bashrc where ~/.malware.so does the following:
- Removes the LD_PRELOAD variable from the environment, so it's undetectable.
- Modifies "exec..." functions so they add LD_PRELOAD back (and also replace "su", "sudo", etc. with a different program).
- Modifies "open" and "read" functions so the line in .bashrc is invisible to the user.
- Modifies "opendir" and "readdir" to make ~/.malware.so invisible to the user.
- etc.
(This would work for any application - not just command-line ones.)

Comment Re:Broken security model (Score 1) 355

4. Run embedded flash objects in the context of the page they are embedded in, rather than that of the origin server. (Flash objects accessed directly, like javascript run through the javascript: uri handler, have no permissions)

I'd call that the proper solution. JavaScript files are executable, too. Why don't they have the same vulnerabilities as SWFs? Because they run in the context of the page they're embedded in.

Graphics

Submission + - Cooliris Enables NVIDIA 3D Vision Support (marketwatch.com)

BerkeleyDude writes: Cooliris, a browser plugin that lets you view media in a 3D wall, now supports true 3D — provided you have a GeForce(R) GPU with NVidia 3D Vision glasses:

"NVIDIA 3D Vision technology is the perfect platform for showcasing just how cool the Cooliris application really is," says Ujesh Desai, vice president of GeForce GPU business at NVIDIA. "Their flexible and dynamic interface when combined with NVIDIA 3D Vision technology creates a powerful experience that enables the user to consume rich media in a new and stimulating way."


Comment Re:Developer tools - eclipse died in Debian (Score 1) 165

The primary problem is that eclipse is not being actively maintained upstream in Debian. It is in some ways rather hard to package which has to be actively maintained much like firefox, and nobody has stepped up to take it over. If nothing changes, I would not be surprised to see eclipse eventually dropped in Debian and by extension in Ubuntu.

And yet, people keep arguing that centralized repositories are the way to go, and there's no need for projects like autopackage. Do we expect Eclipse developers to maintain a Debian package for it? As well as packages for RedHat, Suse, and all the other distros while they're at it?

Comment Re:Good thing (Score 1) 408

Funny, I thought that all Mozilla (Firefox/Thunderbird/Sunbird/etc) add-ons are already, in effect, open source.

You can write binary add-ons, too. You just need to use Mozilla's API, and put the shared library into the "components" directory of the XPI.

But then, of course, you have to deal with different OS'es, architectures, and so on.

Education

Submission + - College Police: Using Linux is suspicious behavior (eff.org)

FutureDomain writes: The Boston College Campus Police have seized the electronics of a computer science student for allegedly sending an email outing another student. The probable cause? The search warrant application states that he is "a computer science major" and he uses "two different operating systems for hiding his illegal activity. One is the regular B.C. operating system and the other is a black screen with white font which he uses prompt commands on." The EFF is currently representing him.
Power

Submission + - Open source energy meters help reduce consumption

An anonymous reader writes: Researchers at UC Berkeley have released their open-source system for monitoring AC power through the Green Soda project. The AC meters, called ACme, plug into wall outlets and power strips, and form an ad-hoc IPv6 subnet accessible from the Internet. There are over 50 different switches, desktops, and kitchen appliances (and an Xbox!) being monitored by the system. The data is available in real-time on the project web page. Their goal is to significantly reduce the 500kW draw of the computer science department.
It's funny.  Laugh.

Submission + - Sex doll for dogs

BerkeleyDude writes: If Slashdoters' pets have as much success with females as their owners do, they will probably be interested in this sex doll for dogs from Gizmodo:

Is your dog in heat and humping anything it can wrap its horny little legs around? Are you constantly having to pry your promiscuous pooch off the legs of guests, parents and members of your church? Protect your leg from a hump attack by getting Scruffy a Hotdoll. Yes, it's a sex doll for dogs. It's shaped like a dog and it'll allow your tension-filled pet to go to town as much as his little heart desires, humping away until he passes out in exhaustion, leaving a wispy coil of friction-singed dog-fur smoke wafting into the air.

Slashdot Top Deals

"Look! There! Evil!.. pure and simple, total evil from the Eighth Dimension!" -- Buckaroo Banzai

Working...