Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Cellphones

Cell Phone Searches Require Warrant 161

schleprock63 writes "The Ohio state supreme court has decided that a cell phone found on a suspect cannot be searched without a warrant. The majority based this decision on a federal case that deemed a cell phone not to be a 'closed container,' and therefore not searchable without a warrant. The argument of the majority contended that a cell phone does not contain physical objects and therefore is not a container. One dissenting judge argued that a cell phone is a container that simply contains data. He argued that the other judges were 'needlessly theorizing' about the contents of a cell phone. He compared the data contained within an address book that would be searchable." The article notes that this was apparently the first time the question has come up before any state supreme court.
Spam

Project Honey Pot Traps Billionth Spam 118

EastDakota writes "Project Honey Pot today announced that it had trapped its 1 billionth spammer. To celebrate, the team behind the largest community sourced project tracking online fraud and abuse released a full rundown of statistics on the last five years of spam. Findings include: spam drops 21% on Christmas Day and 32% of New Year's Day; the most spam is sent on Mondays, the least on Saturdays; spammers found at least 956 different ways to spell VIAGRA (e.g., VIAGRA, V1AGRA, V1@GR@, V!AGRA, VIA6RA, etc.) in mail received by the Project; and much more."
Security

Adobe Warns of Reader, Acrobat Attack 195

itwbennett writes "Monday afternoon, Adobe 'received reports of a vulnerability in Adobe Reader and Acrobat 9.2 and earlier versions being exploited in the wild,' the company said in a post to the company's Product Security Incident Response Team blog. According to malware tracking group Shadowserver, the vulnerability is due to a bug in the way Reader processes JavaScript code. Several 'tests have confirmed this is a 0-day vulnerability affecting several versions of Adobe Acrobat [Reader] to include the most recent versions of 8.x and 9.x. We have not tested on 7.x, but it may also be vulnerable,' Shadowserver said in a post on its Web site. The group recommends that concerned users disable JavaScript within Adobe's software as a work-around for this problem. (This can be done by un-checking the 'Enable Acrobat JavaScript' in the Edit -> Preferences -> JavaScript window). 'This is legit and is very bad,' Shadowserver added."

Comment More annoyances (Score 1) 447

I am a sysadmin for a school district, so it just means that I have to deal with teachers and students again. I prefer the summer, when I can get some actual work done, instead of showing teachers how to save pictures of their kids and pets as their wallpaper.
It's funny.  Laugh.

10th Annual System Administrator Appreciation Day 232

jonk689 writes "Let's face it, System Administrators get no respect 364 days a year. This is the day that all fellow System Administrators across the globe will be showered with large piles of cash and expensive sports cars in appreciation of their diligent work. But seriously, we are asking for a nice token gift and some public acknowledgment. It's the least you could do."

Comment Re:Failure to appear in court... (Score 1) 255

Actually failure to appear can be a big deal, even with some traffic tickets. It varies state to state, but most places will require your appearance for excessive speeding, reckless driving, DUI, etc.

When a driver fails to appear in court on misdemeanor traffic offenses If a person is charged with a misdemeanor traffic offense and fails to appear in court, in most instances the following will occur: * the judge will issue a warrant for that person's arrest; * the bail deposited will be forfeited and the case will be continued for the entry of a judgment of the bond forfeiture; and * the Clerk of the Circuit Court will notify the defendant of the new court date.

From: http://www.cookcountycourt.org/traffic_court/traffic_ticket/appear.html
Image

Pakistan Used Google Earth For Military Targeting 111

NeoBeans writes "According to this article in the New York Times about the recent 'improvements' in military strikes by the Pakistani military it is revealed that they have dropped Google Earth as part of their target planning for a more precise technology. From the article, '... the air force has shifted from using Google Earth to more sophisticated images from spy planes and other surveillance aircraft, and has increased its use of laser-guided bombs. And no, you can't really find Osama Bin Laden using Google Maps either."

Comment Re:This is a common stack in wifi APs (Score 1) 225

In reality I would wager less of the dd-wrt routers would get patched, but only because a lot of them were deployed by non-professionals who will likely not see the news.

That is a good point, but I would have to disagree. I think that if someone is going to deploy DD-WRT, they would probably be as likely to see an article or two on it. Most of the people I know that use DD-WRT are geeky security types anyway. :)

Comment Re:This is a common stack in wifi APs (Score 3, Insightful) 225

Yes, there's a fix for this, but what is the likelihood of every person who owns a Wifi router fixing this flaw?

We talk about the dangers of homogeny, but this is exactly the type of thing that homogeny causes. All the routers with DD-WRT implemented to save costs, but in the end everyone is screwed.

Just because we love Linux doesn't mean that we should sacrifice the entire ecosystem to that love. We need to nurture other implementations to prevent this type of virus from wiping out our entire networking infrastructure.

What is the likelihood of any flaw on any system getting patched? I don't see how a vulnerability in DD-WRT is any different than if Cisco announced a major vulnerability in one of their systems. I bet just about the same percentage would be patched.

Slashdot Top Deals

FORTRAN is not a flower but a weed -- it is hardy, occasionally blooms, and grows in every computer. -- A.J. Perlis

Working...