Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Slashdot Deals: Deal of the Day - 6 month subscription of Pandora One at 46% off. ×

Comment Re:More than just money (Score 4, Interesting) 147

No they could not unless they had the backing of someone wealthy to pay for the ships

Yes they could. People cross the ocean in small boats all of the time. And just look at the Pacific? All of those islands were colonized by people with Stone Age level tech. It's not a great analogy to space, but surely you don't need a billion dollar rocket to get into orbit. Surely it can be made more affordable, and that's what they're trying to do.

Comment The virus? (Score 1) 2

So you've essentially reinvented the computer virus and restricted your hosts to .net assemblies? This is interesting, but it's still just a common virus. These have been around for decades. The comment "So you know, never trust a .net binary again." seems a bit of a stretch...since every executable is vulnerable to some sort of infection regardless of whether or not it's .NET.

Submission + - Google+ Redesigned (blogspot.com)

An anonymous reader writes: Google has announced that its Google+ social network has received a major overhaul, which is rolling out today to users who opt in. The company says the new design focuses on the "Communities" and "Collections" sections of Google+, since those were the ones most well received by users. "[Product Director Luke] Wroblewski, known for his responsive and progressive design work, tells me that the key to this rollout is the consistent, mobile first experience that hasn’t historically been a hallmark of G+." The article describes the new experience thus: "As you click through the new Google+ there is a lighter feel to it for sure. It’s a product with more purpose, as before it felt like there was a million things flying at you. Notifications, +1’s, share buttons. You were pretty much sharing things into a pit and hoping that Google would do fun things with them."

Submission + - The Next Gold Rush Will Be 5,000 Feet Under the Sea, With Robot Drones

merbs writes: In Papua New Guinea, one well-financed, first-mover company is about to pioneer deep sea mining. And that will mean dispatching a fleet of giant remote-operated robotic miners 5,000 feet below the surface to harvest the riches scattered across ocean floor. These mammoth underwater vehicles look like they’ve been hauled off the set of a sci-fi film—think Avatar meets The Abyss. And they'll be dredging up copper, gold, and other valuable minerals, far beneath the gaze of human eyes.

Submission + - Your C# Executables: Now Even More Unsafe (imgur.com) 2

Redmancometh writes: So I have made hacks for a few semi-popular games that involve C#. Recently I discovered a library called mono.cecil which made ILcode manipulation relatively painless. After discovering this I put a bit of my infosec background to use. So...I used it to make an application that allows the injection of "agent" dlls into a bytecode assembly (exe or dll.)

Features currently available
: — Search directories for .net assemblies. Filter for .exe/.dll and whether or not to search recursively.
  — Get assembly of running process and determine if it's .net. If so, add to file list
  — Specify entry point for "jumpMethod()" instructions in C# dll assemblies from the GUI. This guarantees you can hook something that you know will be called.
  — Can completely replace entry point method if the option is specified
  — Can inject code from specified agent into all constructors in target assembly. Separate methods in agent correspond to instructions inserted at top/bottom of constructors respectively.
- Can inject code from specified agent into all methods of target assembly. Separate methods in agent correspond to instructions inserted at top/bottom of methods respectively...No checkbox yet, just an argument. I'll add the checkbox when methods can be hooked via select-able BindingFlag filters

Here are some photos:
The good:
      — A means of instrumentation in C#. The ability to fully interact with the code causing you problems...at runtime.
      — The ability to deploy patches to 3rd party C# applications extremely easily.
      — Very few pieces of malware written in C# are "stealthy"
      — C# has authentication checks when accessing fol
The Bad:
    — I can cheat in all your .net games.
    — It can search specifically for .net assemblies, or the assemblies of chosen processes, and inject .net code into them. This could be used maliciously..and make injected code quite hard to remove.

So you know, never trust a .net binary again. I'll be releasing the application once it's 100% done. Currently it works with about ~90% of C# assemblies with a pretty significant agent payload. Let me know what you guys think, and let me know if you have any ideas. I'll be releasing the first version in the next week or so.

Comment Re:Another example (Score 1) 728

All focus on destroying the opponent's will to fight, rather than his ability to fight.

And yet, this didn't seem to be what 9/11 was about at all. Nor the previous WTC attack, nor the attack on the Cole. Actually, the more I read your reply, the more you seemed to strengthen my point that their true motives cannot be simply gleaned from a word.

Comment Re:Another example (Score 0, Troll) 728

Regardless, they are called "terrorists" because their strategy is not to defeat through superior military power, but to instill terror into the populace.

Terrorist is a pejorative term applied to them by the targets of the violence. They don't call themselves that. You can't determine their strategy with insults.

Use the Force, Luke.