Forgot your password?
typodupeerror

Comment: Re:So stupid it's got to be official. (Score 4, Informative) 106

by antonymous (#40936373) Attached to: New State-Sponsored Malware "Gauss" Making the Rounds
I know it's bad form to RTFA, but here's the part where they talk about their current inability to properly decrypt the payload:

The malware uses that configuration to generate a key to unlock the payload and unleash it. Once it finds the configuration itâ(TM)s looking for, it uses that configuration data to perform 10,000 iterations of MD5 to generate a 128-bit RC4 key, which is then used to decrypt the payload. âoeUnless you meet these specific requirements, youâ(TM)re not going to generate the right key to decrypt it,â Schoewenberg says.

Comment: Not quite true (Score 3, Informative) 245

by antonymous (#40101611) Attached to: US State Department Hacks Al-Qaeda Websites In Yemen
What actually happened was that the State Department purchased some anti-Al-Qaeda ads to run when certain key terms were also on the screen, similar to how AdWords works. It's a pretty interesting concept, really - the necessity of displaying advertising on a site can open the door for alternative messages/realities to reach the viewer.

Comment: Nice discussion... (Score 1) 338

by antonymous (#40065761) Attached to: Ask Slashdot: Best Way To Monitor Traffic?
What I used to love about slashdot was the discussions that would result from articles and questions. But now everyone just jumps down the submitter's throat (though part of that is deserved in this case, especially coming from a brand-new account) if the question isn't phrased properly. Yes, censorship is bad, clandestine monitoring is bad, we should all trust each other, etc. but we all know that isn't the case. Only by offering solutions can we help improve our collective level of problem-solving. For example, I'm already thinking about several ways around this: is there any way to stop a user from using a VPN (or use your monitoring solution to impersonate one), and how are you going to deal with SSL traffic?

Comment: Simple solution (Score 1) 78

by antonymous (#35797034) Attached to: How Attackers Will Use Epsilon Data Against You
Yes, it's too simple to actually work, but after data breaches like this, Epsilon should be required to publish all the data that was compromised. It devalues the data held by the malicious entity (a deterrent against future attacks), and allows security personnel to more accurately gauge the risk and present additional strategies for mitigation. Any action that reduces the value of these databases is a step in the right direction.

Comment: Re:Open Office Gave Up "Anonymous" Alex Tapanaris (Score 1) 263

by antonymous (#34672230) Attached to: EFF Offers an Introduction To Traitorware
I don't think it's a matter of being "well-intentioned" software. One nice feature to add to publishing software would be a "redact metadata" option for publishers. Also, the type of metadata in this case is laughably easy to spoof and cannot be relied upon - why wouldn't I register my desktop publishing software with the name of an enemy?
Data Storage

Building a Searchable Literature Archive With Keywords? 211

Posted by timothy
from the must-be-in-here-somewhere dept.
Sooner Boomer writes "I'm trying to help drag a professor I work with into the 20th century. Although he is involved in cutting-edge research (nanotechnology), his method of literature search is to begin with digging through the hundreds of 3-ring binders that contain articles (usually from PDFs) that he has printed out. Even though the binders are labeled, the articles can only go under one 'heading' and there's no way to do a keyword search on subject, methods, materials, etc. Yeah, google is pretty good for finding stuff, as are other on-line literature services, but they only work for articles that are already on-line. His literature also includes articles copied from books, professional correspondence, and other sources. Is there a FOSS database or archive method (preferably with a web interface) where he could archive the PDFs and scanned documents and be able to search by keywords? It would also be nice to categorize them under multiple subject headings if possible. I know this has been covered ad nauseum with things like photos and the like, but I'm not looking at storage as such: instead I'm trying to find what's stored."

Comment: Tinfoil hat time (Score 1) 332

by antonymous (#22952140) Attached to: Comcast Offers 50 Mbps Residential Speeds
So Comcast offers ultra-fast speeds at a ridiculous price. Rich p2p pirates purchase this service, get tracked, and get sued.

This could also lead to "harder" GB caps at lower tiers, encouraging users to bump up to a more expensive service.

While I think better last-mile speeds are important, I can't see many "residential" customers willing to pay $100 more per month for increased bandwidth - if you really need that much, you probably already have a business account. There just aren't existing net applications which gain significant performance advantages at these speeds (though I'm sure they're coming).
KDE

+ - KDE 4.0 Beta 1 Released->

Submitted by Anonymous Coward
An anonymous reader writes "August 2, 2007 (The INTERNET). The KDE Community is happy to announce the immediate availability of the first Beta release for KDE 4.0. This release marks the beginning of the integration process which will bring the powerful new technologies included in the now frozen KDE 4 libraries to the applications. Almost two months after the foundations of KDE 4 have been laid with the first alpha, KDE enters the stage of a full freeze of the library interface. From now on, the applications will focus on integrating the new technology refined during the last months, and the library developers will try to fix all bugs found during this process. No new applications will enter the official KDE modules and usability and accessibility work is of course an ongoing process. In the following weeks KDE developers will be able to add features to their applications until the next beta is released and the application features will be frozen as well."
Link to Original Source
The Internet

+ - Pirate Bay earns 20,000 Euros a day-> 2

Submitted by
An anonymous reader writes "controverisal pro-piracy website the piratebay likes to portray itself as an innocent hobby site that provides a free index without censorship, but recent facts show that the site is earning up to 20,000 Euros per day from its advertising. Taking in money on this scale puts a different slant on the motives behind the Swedish filesharing site, and could open up the runners of the site to prosecution for profiting from copyright infringement."
Link to Original Source
Google

+ - Gmail accounts hacked - no response from Google->

Submitted by jared51
jared51 (71757) writes "A few friends have recently had their Gmail accounts hacked, causing immense life complications. With Gmail storing all information (many people have a handy label "Accounts" making life easier) that has ever been emailed, a hijacker can easily move on to eBay, PayPal and credit card accounts to turn the crime into cash. Making matters worse, Google is impossible to contact by human. Hijacked users must contend with an endless series of forms."
Link to Original Source

If money can't buy happiness, I guess you'll just have to rent it.

Working...