Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Worthless Trademark (Score 2, Interesting) 273

by MikaelC (#33640120) Attached to: Woman Trademarks Name and Threatens Sites Using It

Comment: Re:Worthless Trademark (Score 2, Insightful) 273

by MikaelC (#33637432) Attached to: Woman Trademarks Name and Threatens Sites Using It
I did a quick search for this Nutrilab Corp.

Take a look at the following sites, that all link to each other, and revolves about dr. Ann: [ip:] [ip:] [ip:] [ip:] [ip:] [ip:] [ip:]

Notice anything peculiar about the IP-number?

Comment: !Exploit (Score 1) 234

by MikaelC (#31692460) Attached to: New Method Could Hide Malware In PDFs, No Further Exploits Needed
Okay. So the PDF standard has the potential for launching external (or even embedded) files. In Adobe Reader this will create a warning dialog with the following text: "The file and its viewer application are set to be launched by this PDF file. The file may contain programs, macros, or viruses that could potentially harm your computer. Only open the file if you are sure it is safe. If this file was placed by a trusted person or program, you can click Open to view the file." That seems perfectly clear to me. There is really no reason to change this behavior. This is not an exploit.

Behind every great computer sits a skinny little geek.