Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Uh, RTFA? (Score 1) 510

How do you verify system files? TDSS/Aleron or Popureb all infect random "*.SYS" files located in "%systemroot%\system32", and there are NO tools released for linux to do actual disinfection. I'm sure you could copy drivers from a known good configuration, but how is this that much easier then a reimage?

Comment Re:Ignorance is strength (Score 1) 389

Apple has NEVER denied that any computer, including it's own, is potentially vulnerable to exploits. Their position is the same as it's always been ... users should take appropriate precautions. At times in the past they've offered for free commercial anti-virus apps as part of AppleCare and DotMac. Current users should download Sophos Antivirus for Mac. It's free.

http://www.apple.com/why-mac/

Bottom left of the reasons to get a Mac, "It doesn't get PC viruses." Now this isn't saying it doesn't get any viruses, but it's sure as hell implying it.

Comment Re:Summary is misleading (Score 5, Informative) 336

So some 3 year old HP laptops that cost a lot back then are being replaced by $350 HP laptops now. Normally a 3 year laptop can't even be sold for $350 (unless it's a top of the line Apple model - and these aren't). And what about the specs? Nowhere in TFA is a comparison of the specs of the system being offered with the specs of the original systems...
Where exactly is the bait? Or the switch? I guess the article was submitted by one of people who expected his 3 year old system with something that costs the same now, so he could have a substantial improvement in performance.

The TX1000 series which is a large portion of this suit is a convertible tablet PC. I own one of these, it was a dual-core 1.9GHz Proc, 3GB RAM, 12.1"(which is VERY portable), and had a screen that could be turned over and closed to provide a tablet. You cannot touch one of these for anywhere near the price of that Compaq being offered, nor does this "comparable" computer listed offer ANY of the features this notebook did. An iPad would be a closer fit to a Tx1000 series notebook, and even that is less of a machine and twice the cost of the Compaq.

Comment Re:no ssid = no target (Score 1) 458

If you use portable devices and this it is a horrible idea. It will leave your laptop up to attacks like what Jasager does. Basically with hidden networks your computer has to probe them, a rogue AP can reply "why yes i'm XXX" and do anything it wants to with your connection, redirect pages, display adds, serve up malware, etc. Not to mention aircrack or kismit can still pick it up if there is any traffic.

Comment Re:wow (Score 1) 380

Yet another reason I'm glad I've always recommended against Linksys to friends and family. Shoddy equipment in the past, and no preparation for the future now.

Wait what? I have a WRT54G v1 that's still kicking, as well as working upgraded models, they have always been great to me. For example: The only Belkin router I ever owned was garbage out of the box, the only D-Link I ever owned caught on fire on it's own. As far as Netgear goes thier hardware is decent enough but their firmware is the most obtuse I've ever dealt with(the web front-end), it has multiple links for some categories of settings and uses html frames, it's like I've been sucked back to 1997 every time I want to change a setting.

Comment Re:Look (Score 5, Insightful) 339

And just out of curiosity can someone tell me why punitive damages should be awarded to the plaintiff? Why should someone make more money in a court of law then they otherwise would. I mean real damages I'm ok with, they're real. Punitive damages though are just some arbitrary number assigned to case. The plaintiffn has no right to that money, it doesn't belong to them, so why should they be awarded it.

Comment Re:HP ProtectTools (Score 1) 429

I can assure you that the HP G60 mentioned in this article can boot a regular Vista Disc. And I can assure you that the key on the bottom of the notebook can be used to activate that copy of windows once installed. All of the OEM's have a special copy with all the drivers pre-installed and usually all the trial-ware and bullshit they like to put on them and those discs are model-locked, so an HP G60 model-locked disc doesn't work with an HP G62 or any other vendor's PC. However a generic disc can still be used. If they bundled an "Anytime Upgrade" disc with the PC you can use that, the AU discs are literally normal Vista(x86 only) discs. Otherwise it sounds like a bad optical, try to boot Ubuntu or something else and see if that works.

Comment Easy passwords (Score 1) 563

An easy alternative is to run a dictionary word through a hash algorithm. For example my WPA key is a normal dictionary word, with a salt that i can easily remember, then checksumed with MD5. Produces something pretty much psuedo-random alphanumeric like this: b6ba4077d4421cb6ad49c1321453e37c you could also truncate it as >8 chars provides much the same security against brute force. Yet, is very easy for me to retrieve should i forget it, if you really wanted to you could also have a method after the checksuming for adding special chars to it, like every other char use the shift key on.

Comment Re:I got no problem with this. (Score 1) 169

Criminals gave up their rights when they committed a crime.

Someone's rights(within reason to what they did) are forfeited when they are CONVICTED, there is a HUGE difference there. Otherwise if a murder happened in a small town the police should be able to collect evidence from everyone in the town, after all it could have been anyone, and that person who did it doesn't have rights at all, right? And if someone is proven innocent later is their DNA purged from the database or does it stay there forever just because someone suspected they committed a crime?

In fact, I don't think it's anyone's right not to be identified by the epithelial they leave lying around.

And I believe they do have the right; now how are you going to tell me I'm wrong? There is no legitimate gain from collecting DNA from a person if they where law abiding, or did not commit a crime where DNA was involved at all.

In fact, I'd encourage everyone to get registered for fingerprints and DNA, because the time, money, and grief it will save your family when your unrecognizable torso is dug up in the woods, is significant.

That seriously the best answer you have? If you really did leave DNA around wherever you go why couldn't they compare the body to samples taken from another piece of clothing or something you owned? Hell, if it was a relative you could just run a DNA test with a sample from the relative and when it comes back with a 99% odds they're related be all set. Your argument does not stand on it's own.

I swear to God, if you believe this is a good idea I hope there's a special place in hell for you. This is called unreasonable search and seizure, police even when executing a warrant must only collect evidence pertaining to the crime. This law pertains only to evidence collection that does not pertain to a crime otherwise it would have been collected in the original investigation. My body, my fucking epithelium! If I did commit a crime and DNA was valid evidence in it go ahead and keep it, you'd need to in case of appeal anyways, but otherwise you have no right or grounds to keep it, so do the right thing and destroy it.

Comment Um... (Score 1) 574

I really enjoyed the cell phone usage was one of the complaints. Someone better not tell this guy that cell towers are omnidirectional so he'll experience that radiation regardless.

If he truly had an EM sensitivity, the odds of it existing on a higher wavelength(like 2.4Ghz) than visible light and on the lower wavelengths(like UV which affects everyone) are incredibly low without visible light affecting him as well. If visible light did affect him as well I think it would be very hard for a successful law suit unless he wanted to sue the sun as well.(and oh yea, the sun gives off far more things then his neighbors wifi, like trillions of neutrinos that pass through your body every second.)

Comment Re:What gets around Firewalls and AVS? (Score 1) 396

I'm a coder not IT so my knowledge of security pretty much stops at installing anti-virus and setting up a firewall.

Do you work for Adobe? Because this is the mindset they have that keeps getting their products pwned. If you program you need to have a good idea about security, otherwise you're endangering others.

Slashdot Top Deals

Understanding is always the understanding of a smaller problem in relation to a bigger problem. -- P.D. Ouspensky

Working...