Become a fan of Slashdot on Facebook


Forgot your password?

Comment: Re:Single point of failure... (Score 1) 191

by fedcb22 (#37678514) Attached to: RIM Server Crash Leaves Millions Without BBM
Nope, you can't get any email. Trust me, I have one next to me (and I'm certainly not an enterprise user, just standard BIS plan with my GMail and University email accounts) and was affected by this outage - web browsing, BBM, WhatsApp, _all_ email accounts, Facebook and Twitter were not working. There is a way to make the browser use the network directly, but it does not do so automatically.

Comment: Re:Or (Score 1) 217

by fedcb22 (#34054702) Attached to: The iPhone Serial Port Hack
On the N900, you don't even need to install Debian. Want to play around? Install the root enabler from the stock application manager, open up the terminal (which is standard) and type in "root". Bam, you have root on a _proper_ GNU/Linux device that you can carry around in your pocket. libc? check. Not to mention, you can easily run a Debian chroot, should you want, or boot into Android.

+ - Alternatives to Windows 7 Applocker

Submitted by BurningSpiral
BurningSpiral writes: Microsoft Windows 7 Enterprise edition includes AppLocker: the ability to prevent users from running applications that haven't been specifically authorized by the system administrator. These restrictions can be put in place based on path name, cryptographic hash, publisher signatures, etc. AppLocker is increadibly helpful in protecting sensative data from both known and unknown threats. Unfortunatly, not every organization is in a position to switch operating systems to take advantage of this feature. Is there a way to implement similar application restrictions on Windows XP, Windows Vista, Windows 7 Home/Pro, OS X, and Linux?

+ - Critical flaw found in virtually all AV software-> 1

Submitted by
Securityemo writes: "The Register is running an article about a new method to bypass antivirus software, discovered by Maltousec. By sending benign code to the antivirus driver hooks, and switching it out for malicious code at the last moment, the antivirus can be completely bypassed. This attack is apparently much more reliable on multi-core systems. Link to original article here."
Link to Original Source

Comment: Re:Hollywood is partially right (Score 1) 874

by fedcb22 (#32087976) Attached to: Top 10 Things Hollywood Thinks Computers Can Do
True, but if a file were actually open, the deletion would have no effect. As a neat trick, you can be downloading a file, say, using wget. Then move the file that's being downloaded, or even delete it. The download will continue as if nothing happened. Reason being that on *nix systems, a file descriptor is used, and as long as that is open, the file isn't really deleted. It's even possible to recover deleted files that are open this way. And undelete depends on the underlying filesystem, journaling, etc.

A debugged program is one for which you have not yet found the conditions that make it fail. -- Jerry Ogdin