Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment Re:Say what? (Score 1) 72

If that's the case, I'm going to run a genetic code generator for a few thousand iterations, get some really meaningless routines, make a random main(), add some TicTacToe code, then submit it for review: HotTicTacToe as a 7MB binary... Let them figure it out.

Comment Re:Time to reconsider "anti-worms":? (Score 1) 239

Go for it. See if you can reverse engineer conficker's encrypted and digitally signed binaries. It's only RC4 and MD-6. MD-6 was only released a few weeks prior to the first wild sightings of version C. Still wanna mess with these guys? Then all you have to do is figure out which of the 50,000 domains spread across ~120 .tlds to register so you can put your binary on it for when conficker does it's daily payload check.

Or if you want, you can try to infiltrate it via its own P2P network. You better be quick, if conficker detects it is being debugged, it quits. Can't look at the code? Hmmm, maybe look at the p2p protocol? Doh! you cannot run wireshark on an infected system, conficker process kills just about anything you would use for disinfecting every second (though I might change the .exe name of a tool i was using). But even then you have to figure out the digital signature before conficker will run your binary, it's a 4096 bit key, you better get started. Bonus points for breaking it before the authors update it.

This worm is piece of work. It memory patches your dns resolver. It kills your security products. With it's encryption, every copy is different. It hides with random file name, in several locations, date same as your kernel, and the registry entries get pretty names most would overlook on a quick glance. The ports it opens are a function of your IP address, so you cannot just look for port xyz traffic, but a remote conficker can figure out which ports should be open for your IP. It does updates with a plain URL that no IDS could catch without red flagging genuine HTTP requests. It closes it's infection vector but opens another back door. It pokes holes in your firewall, and gives them pretty names too. But wait there's more! It tries to spread through network shares with weak passwords and copies itself to the modern sneakernet of USB drives. Its IP scanner even avoids unregistered address space.

The authors of this worm seem to be a few steps ahead of everyone. It's weaknesses get patched, it's vulnerabilities get updated. As long as we have people running pirated copies of Windows, or people too afraid to auto-update for whatever reason, we better get used to things just "living" in the internet. Anti-worm? goodluckwiththat!

Real Time Strategy (Games)

Early Praise For Empire: Total War 79

CVG had a chance to preview Empire: Total War, the latest in Creative Assembly's popular strategy series. This installment focuses on a time period which includes the Industrial Revolution and the struggle for US independence. CVG praises the intuitive interface and the improved AI, as well as the level of detail shown in large-scale battles. Quoting: "With a single mouse click I changed my troops' attack orders to melee and sent a sea of blue uniforms sweeping down the hill at the enemy. Zooming into the action revealed a previously unmatched level of battlefield realism and detail, with each motion captured soldier actively seeking out an opponent before engaging in a mortal shoving and stabbing match. Men toppled into the mud, squirming with terror before receiving a deft bayonet jab to the windpipe. After a titanic, 20-minute struggle the tide turned my way with the enemy hightailing it thanks in no small part to a bullet to the British general's head that broke his men's morale."
Security

Huge iPhone Cut-and-Paste Tool Security Flaw 85

Harry writes "I'm using Pastebud, the new third-party copy-and-paste solution for the iPhone. It's extremely clever, using a Web-based clipboard to get around the fact that Apple doesn't provide one on the phone. Unfortunately, it seems to be giving users access to e-mails that other Pastebud users send to their clipboards. This has happened to me repeatedly and is being reported by other users in Pastebud's Get Satisfaction support forum. Pastebud is operational and still doing this as I write, even though a message at Get Satisfaction says they're working on the problem."

Comment Re:Epic Fail! (Couldn't resist) (Score 1) 244

> 1) What happens 10 years down the line when the game is abandonware? Can I still install it, even though the Key can't verify, and the company doesn't exist anymore?

I found out what happens. The CD stops working. If you remove it from the drive and look close, there are black squiggles where the aluminum substrate has dissolved. I thought fading magnetic bits on 5.25" floppies was bad. At least those didn't dissolve. I'm stickin' with stone tablets.

Besides, if these guys really want to stop piracy, they should get off their asses and send some warships to the Gulf of Aden and Somalia. Put up or shut up guys. Sheesh.

Comment Neptune's Domain (Score 0, Redundant) 374

No captain of any seagoing vessel that does not respect the ocean upon which he sails ever escapes the wrath of Neptune. The sea will ultimately get it's revenge.

p.s. I'd like to believe usul294's post below, citing references would help. How do you see a whale underwater with binoculars? Seems like everyone in this thread bought the lie that we need the govt to protect us at all costs.

Comment Re:Poverty (Score 4, Funny) 785

A stick? Luxury.

We had to make jump rope from our own eyebrows. The only way to play hop scotch was to break our own leg, then trace the court on the ground with our protruding bone. When our dad came home and found out we broke our own legs and marked up the drive way, he used to drag us through a cactus patch with our own jump rope tied round our necks.

Slashdot Top Deals

Work without a vision is slavery, Vision without work is a pipe dream, But vision with work is the hope of the world.

Working...