You can choose the GDI ending too. If you destroy everything in the last GDI mission but the Temple of NOD and then raze it with an ion cannon strike, you get the secret "canonical" ending. Otherwise you get the boring ending.
Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
It seems this has been going on forever now. The most high-profile cases where the excel bugs a while back.
1. Fuzz MS file format handling code until bug is found.
2. Develop exploit, and mail infected files to high-profile targets.
This type of bug relies on "glitches" in the memory management (simplifying it a bit...) of the program, not on any high-level misses in the actual mechanisms of the code. Any program written in a programming language without automatic memory management can be exploited in this way, if the programmer "misses his step" somewhere. They can also be devilishly hard to find, because data can be structured and handled in memory in very complex and abstract ways.
In my university (LinkÃping university, Sweden) the intro programming course is lisp, interwoven with the calculus courses.
The source is right there for you to read. Also, he's not the only guy working on the project, lots of other people have reviewed the code. Anything fishy would have been caught a long time ago.
A point is that one of the more useful basic features of NMap, the SYN partial-handshake scan (default when run as root) can't be replicated by nc. It always leaves marks in connect logs. Hping can replicate that feature though: "hping -8 -S known host.com" will SYN scan all ports listed in
That's really one of those one-in-a-million things. Getting trolled like that, Yahoo vuln, open X server on a home *nix box. The stars really aligned.
NMap is the best there is, period. There's not even specialist scanners that can up it's features, especially since you can set packet flags manually in the more recent versions. It really, really fills it's niche. I use it all the time in my daily life just for benign remote service discovery, and I assume many people do too. I've never had anyone complain about it either.
Okay, i stand corrected. The attack described in that article is obviously a professional targeted heist, especially considering the 0day. Just out of curiosity, how was the attack discovered? It should be quite possible to pull off that kind of attack without discovery even considering the spamming (injecting rookits with steganographic connect-back using dual-stage shellcode and making the website look like harmless viagra spam, assuming that the "unknown vulnerability" is a normal client memory corruption class of vuln). How do you know more subtle attacks aren't passing under your radar?
This and it's descendants is going to be really useful for hacking/pen testing. It's the perfect platform model for wireless attacks. Imagine walking through a crowd with one of these in your pocket, compromising computers and phones as people stream around you. Or, you could use it as a deniable relay, penetrating a 802.11 network via a cell connection to the phone. Or as a http://en.wikipedia.org/wiki/Jack_Box, enabling control of a rootkited server via a cell connection. That kind of stuff will be a lot easier to pull off with this kind of platform. Yes, i have a perverted mind. *sigh* But i think people with similiar minds will put this one to some real clever uses. I mean, all the heavy computing can be moved to a host behind TOR hidden service, or in a "bulletproof" country.
Whoopsie, I posted anonymous for some reason?
The "masses of probes" are just normal automated botnet attacks, and the "unidentified attacks" are probably just unwashed masses of skiddies. If you want me to believe that a real cyberwar (in this case more aptly named "computer espionage") is up and going you better give me or assure me that you have some sort of evidence (like captured transmissions showing that the attackers know what they are looking for in terms of intercepted/exfiltrated data) showing that you're actually being attacked by foreign governments or skilled people with an actual terrorist agenda. There is nothing in TFA except buzzwords, hyperbole and "x declined to comment".
Yay, the headline quotes one of my favorite poems: http://poetry.poetryx.com/poems/784/
In the TV series, she gets her first body at the hospital as a child after a plane crash. Swapping her cyborg body gender in that situation seems unlikely.
I agree. However, the name of the song is indeed "Aerith's Theme".