Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Patents

Submission + - Die Hard or Live Free

k1980pc writes: The elves,dwarves,hobbits and men of Linux world have come together in the ancient kingdom of Googleplex to plot the final stand against The Evil Eye. Leading names of Linux, the world's biggest grassroots software phenomenon, are spending three days to Friday debating whether an increasingly commercial open source community should fight or ignore the world's largest software maker. They will decide the strategy that would be followed against the recent patent threats and alleged "protection rackets" by Microsoft. Read more about it at reuters
IBM

Submission + - IBM gets into web security with Watchfire buy

Rob writes: IBM has become the first major player to buy into the web application security testing space with its offer to buy Watchfire. The deal, which is expected to close later this quarter, would bring in tooling that performs ethical hacking of web apps based on a database of known vulnerability signatures. "We will move security detection and remediation closer to the developer cycle," said Danny Sabbah, head of IBM's Rational Software business unit. "A theme in Rational is our integration with Tivoli where we bridge development and operational deployment organizations. Watchfire is a great fit in that they play on both sides of that divide."
Puzzle Games (Games)

Submission + - Aussie Monopoly Voting Hacked

Samah writes: "The new Australian edition of the popular board game Monopoly has had a couple of surprise winners for the top two spots after a group of hackers from South Australia wrote a program to place hundreds of thousands of votes using the flawed public voting system. From the article: "...Hasbro's Monopoly marketing manager claimed the Barossa's triumph was largely due to networking among people within the region. "...While the hackers concerned might have believed that their attempts were successful, they in fact had very little impact on the excellent results Barossa achieved."""
Operating Systems

Submission + - Sun CEO reveals ZFS will be OSX default filesystem

Fjan11 writes: Sun's Jonathan Schwartz announced that "Apple would be making ZFS "the file system" in Mac OS 10.5 Leopard". It seems likely that Leopad's Time Machine feature will require ZFS to run, because ZFS has back-up and snapshots build right in to the filesystem as well as a host of other features, such as built in Raid. Jobs is probably not happy about his thunder being stolen right before for the June 11th keynote...
Republicans

Submission + - Congressman Orrin Hatch caught pirating software

Rocketship Underpant writes: "Orrin Hatch, the Congressman viewed by many as a shill for corporate copyright interests, recently stated that people who download copyrighted materials should have their computers destroyed as punishment. However, as Wired.com reports, Hatch's own website uses copyrighted software without permission — a Javascript menu system developed by a British company. Is Mr. Hatch accepting volunteers to go through his home and office destroying all his computers, or were his comments to Congress just a bunch of hypocritical hot air?"
IBM

Submission + - IBM Goes Dutch to Cut Tax Bill

theodp writes: "What does IBM, Bono, Sun Microsystems, and Keith Richards have in common? An affinity for the Netherlands. The NY Times has the scoop on how IBM formed a new Netherlands subsidiary to buy back 8% of its U.S. parent's shares, allowing Big Blue to save an estimated $1.6 billion in U.S. taxes. Two days after IBM pulled off the largest accelerated stock repurchase ever, the IRS moved to shut so-called 'Killer B' corporate-tax loopholes."
Privacy

Submission + - Legal password hacking?

An anonymous reader writes: I work for a company that hosts an application for one of the US Federal multi letter government agencies. I've just been asked to run "John the Ripper" against the Active Directory (Please no Windows jokes, K?) accounts we setup for them. Not just one or two accounts, but ALL the accounts which are made up of Federal Employee's.

Why? To see if any account is using a weak password. Now mind you we have followed or exceeded all the guidelines they have set before us (password length, complexity, history, age, etc.). The agency is rather paranoid with all the recent leaks of personal information.

When I was asked to do this, warning sirens went off in my head. Can they make me do this? What are the legal ramifications of doing this? Can I be held accountable? My gut is saying "What-ever you do, DON'T DO IT! These are federal employee accounts!". 10 years ago I wouldn't have thought twice about doing this, but with all the new laws that have been passed I'm no sure.

Does anyone have good reference material backing my stance of not doing this. Or am I stuck hacking the accounts?

P.S. I will be calling my attorney in the morning for guidance. They just dropped this on me on my way out the door for the night.
Programming

Submission + - The Death Of A Software License (GPL) (bmc.com)

An anonymous reader writes: The Death Of A Software License argues that Google's Greg Stein's "license pressure" is something that Richard Stallman and the Free Software Foundation should pay more attention to. If the FSF takes the GPL v3 in an opposing direction to the developers that gave the GPL legs in the first place, then we'll see an obvious outcome — the death of the GPL. Interesting blog post if nothing else.
OS X

Submission + - Making ProcFS Cooler On OS X

An anonymous reader writes: Amit Singh recently released a FOSS process filesystem (procfs) for OS X. Like its other Unixy cousins this procfs shows tons of info on system proceses, threads, tasks, memory, ports etc. A new article on the OS X internals blog explains some new procfs features which are pretty cool... For instance instead of pid numbers you can lookup things by name like "Safari" and "Terminal". Another file will tell you where each app's windows are on screen. There's a screenshot.tif file which contains a live screenshot of your screen! Basically opening or copying the screenshot.tif file gives you what's showing on the screen. The iSight has its own screenshot file which gives a live camera picture if you open it. Sorta weird but neat :)
Security

Submission + - Hacked server and all I have is an IP address...

allebone writes: "Hi there I'm an IT engineer in London. Last Thursday I was called out to a client who I had never been to before. They were having some major server problems. After poking around a bit it transpired that their server had been hacked. Whoever had got in had created himself a user account with domain admin privileges and inserted a virus on the server which ran as "2footninja.exe" or something like that. I spent most of the day locking down the server so it couldn't be repeated. However, I then began checking the logs to see if I could find anything about who had hacked this server. I subsequently found that whoever had hacked this server did so from the IP address 82.165.182.119. After doing a quick whois on the ptr record it seemed that this was a "one and one internet" customer (I assume this is a broadband provider in the US). More than that I cannot tell. I then did some portscans and found 3389 and ftp open. I also managed to login via anonymous ftp and located the virus he used to infect my server in a file "foot.zip" I then left and went home, that night I ran tsgrinder against his terminal server port but came up with nothing — no doubt my dictionary attack would have been ineffective against someone who knew what he was doing anyway. I was hoping if I could log into his server I might be able to find out his name or email address... Other files I located on his server of interest was a directory "artexpo 2007" which seemed to have been files perhaps taken from another company. I tried contacting the person Kim who was listed on the bottom of some of the documents via email but got no reply. My question is this: Have I reached the end of my detective work? Is there nothing more I can learn about this person? Has he escaped forever without me being able to (at least) send him an angry email? Any thoughts/comments would be interesting. Pete"
Censorship

Submission + - US Military launches YouTube channel

Jenga717 writes: The US military has launched its own channel on YouTube, in efforts to shift the media's focus of Iraq from a negative to a more positive light, and to "counter the messages of anti-American sites." From the article:

The footage is not picked specifically to show the military in a good light...and is only edited for reasons of time or content too graphic to be shown on YouTube...And while all the clips currently posted have been shot by the military's combat cameramen, soldiers and marines have been invited to submit their own clips.

So, soldiers can submit their own videos, only to have them edited by the US military. The question is, where are they supposed to submit them? Starting "on or about 14 May 2007", the Department of Defense will block troop access to Myspace, Youtube, MTV, and more sites,, due to a "growing concern for our unclassified DoD Internet, known as the NIPRNET". The troops will be unable to access these sites from any computer on the DoD network, yet are still able to access them from their home computers — which they can't use on the DoD network.

So why the censorship? The DoD cites security reasons, but the Commander of Global Network Operations (DoD's Joint Task Force)"has noted a significant increase in the use of DoD network resources tied up by individuals visiting certain recreational Internet sites." The PDF released by the DoD reminds troops that this "benefits not only you, your fellow Servicemembers, and Civilian employees, but preserves our vital networks for conducting official DoD business in peace and war."

Sounds like quite a sticky situation.

Slashdot Top Deals

"The one charm of marriage is that it makes a life of deception a neccessity." - Oscar Wilde

Working...