Follow Slashdot stories on Twitter


Forgot your password?
Slashdot Deals: Deal of the Day - Pay What You Want for the Learn to Code Bundle, includes AngularJS, Python, HTML5, Ruby, and more. ×

Submission + - Hey Verizon, Why is my WEP Key my MAC Address? ( 2

A complete newb writes: WEP can be cracked in a few minutes with the right tools. But why bother trying to crack it when Verizon sets the default WEP key to the Access Point's MAC address? All you need is the right card in monitor mode and you can get all your neighbors WEP keys. The access point that comes with Fios has the capabilities for WPA but few people bother to change the default settings. With the gaining popularity of Verizon FiOS, customers could be faced with the increased possibility of personal data being stolen from their PC or having their broadband connection hijacked.

Submission + - Microsoft threatens startups over account info (

HangingChad writes: According to Fortune, there are reports that Microsoft is trying to strong arm startups to give preferential treatment to MSN Messenger and are using account information as leverage. "If the company wants to offer other IM services (from Yahoo, Google or AOL, say), Messenger must get top billing. And if the startup wants to offer any other IM service, it must pay Microsoft 25 cents a user per year for a site license." Of course, if the company is willing to use Messenger exclusively "fee will be discounted 100 percent." Getting detailed information is difficult as many of the companies being approached are afraid of reprisals.

Submission + - New Tool Automates Webmail Account Hijacks (

An anonymous reader writes: A pair of software tools demonstrated at the Black Hat security conference today automate the interception of cookie files transmitted over a wireless network that allow attackers to hijack accounts for Gmail, Hotmail, Facebook and a number of other Web 2.0 services,'s Security Fix reports. From the story: "the attack works even if victims subsequently change their passwords, or actively sign out of their accounts. However, attackers would be unable to change the victim's password, as all of the above-named services force the user to reenter the current password before changing it to a new one."

Submission + - a real telemarketer filter

hate-those-telemarketers writes: I just had one of those telemarketers call me despite being on the do-not-call list. There's still organizations that don't need to adhere to that list. Having googled the caller-id I came accross that seems to be a very comprehensive database of annoying caller-id's calling. What's even better is that in the "about" tab there's a script for asterisk to check all calls against that database. This is like a IP-list for spammers only for real telephony. Fantastic. I've implemented this and now I wish I weren't on the do-not-call list to see telemarketers deal with the very annoying Telemarket torture script that can be found on this site: rketer+Torture woo-hoo!!!

I have a theory that it's impossible to prove anything, but I can't prove it.