Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Submission + - Ask Slashdot: When and how did Europe leapfrog the US for internet access?

rsanford writes: In the early and middle 90's I recall spending countless hours on IRC "Trout-slapping" people in #hottub and engaging in channel wars. The people from Europe were always complaining about how slow their internet was and there was no choice. This was odd to me, who at the time had 3 local ISPs to choose from, all offering the fastest modem connections at the time, while living in rural America 60 miles away from the nearest city with 1,000 or more people. Was that the reality back then? If so, what changed, and when?

Submission + - D-Link Routers Vulnerable To DNS Hijacking 1

An anonymous reader writes: At least one and likely more D-Link routers as well as those of other manufacturers using the same firmware are vulnerable to remote changing of DNS settings and, effectively, traffic hijacking, a Bulgarian security researcher has discovered. Todor Donev, a member of the Ethical Hacker research team, says that the vulnerability is found in the ZynOS firmware of the device, D-Link's DSL-2740R ADSL modem/wireless router. The firmware in question is implemented in many networking equipment manufactured by D-Link, TP-Link Technologies and ZTE, he noted for Computerworld.

Submission + - Comcast Customer Service renames customer "Asshole" (arstechnica.com) 1

An anonymous reader writes: Ars reports that a Comcast customer in Spokane, Washington, who called to cancel the television portion of his service was initially hassled by "retention" specialist before receiving his next bill, with his first name changed to "Asshole".

Comment Re:Slave Labour is certainly profitable (Score 1) 534

Also, please tell me the name of your MADE IN THE USA cellphone and computer.

So if no one else is producing cellphone or computer in USA, then Apple cannot be expected to? They made the biggest profit, they might as well be the trendsetter of moving manufacturing back to America.

Comment Re:God, what drivel ... (Score 4, Insightful) 214

You can disable her.

But why get an OS of which you have to disable half of the features? I don't want Modern UI, I don't want to send information to Microsoft to help to improve my computing experience, I don't want a Windows Live Account, I don't want SkyDrive, I don't want Cortana.

Me no want anything! Waaah!

Submission + - Serious Network Function Vulnerability Found In Glibc 1

An anonymous reader writes: A very serious security problem has been found and patched in the GNU C Library (Glibc). A heap-based buffer overflow was found in __nss_hostname_digits_dots() function, which is used by the gethostbyname() and gethostbyname2() function calls. A remote attacker able to make an application call to either of these functions could use this flaw to execute arbitrary code with the permissions of the user running the program. The vulnerability is easy to trigger as gethostbyname() can be called remotely for applications that do any kind of DNS resolving within the code. Qualys, who discovered the vulnerability (nicknamed "Ghost") during a code audit, wrote a mailing list entry with more details, including in-depth analysis and exploit vectors.

Submission + - Why Screen Lockers On X11 Cannot Be Secure (martin-graesslin.com)

jones_supa writes: One thing we all remember from Windows NT, is the security feature requiring the user to press CTRL-ALT-DEL to unlock the workstation (this can still be enabled with a policy setting). The motivation was to make it impossible for other programs to mimic a lock screen, as they couldn't react to the special key combination. Martin Gräßlin from KDE team takes a look at the lock screen security on X11. On a protocol level, X11 doesn't know anything of screen lockers. Also the X server doesn't know that the screen is locked as it doesn't understand the concept. This means the screen locker can only use the core functionality available to emulate screen locking. That in turn also means that any other client can do the same and prevent the screen locker from working (for example opening a context menu on any window prevents the screen locker from activating). That's quite a bummer: any process connected to the X server can block the screen locker, and even more it could fake your screen locker.

Slashdot Top Deals

There are two ways to write error-free programs; only the third one works.

Working...