Become a fan of Slashdot on Facebook


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:How did they do it (Score 1) 25

by kesuki (#49178929) Attached to: Lost City Discovered In Honduran Rain Forest

"I'm always amazed that they were able to build a civilization in such a thick jungle."

have you ever heard of Wraith bioelectronics? how about Zerg bio-infestation? what about the orc former ally the undead serving nazul?

a zero-point-module can sustain a sufficently large jungle if it gets one the above applied to it.

Comment: Re:someone else can be first (Score 2, Informative) 41

by kesuki (#49178901) Attached to: Schneier: Either Everyone Is Cyber-secure Or No One Is

packet injection for dummies.
1. user initiates comms
2. MITM detects comms
3. MITM rewrited packet headers and sends falsified packets AS user
4. Computer reads funny joke
5. computer spits coffee into keyboard
6. device is fried, user is blamed.
7. government sells broken device to user
8. user can't push device sold to them
9. user wishes it never happened
10. quantum paradox occurs
11. server reboots
12. ???
13. nuked from orbit
14. goto step 1.
15. bitch complains about tight loop.

+ - Either everyone is cyber-secure or no one is

Submitted by Presto Vivace
Presto Vivace (882157) writes "Bruce Schneier on The Democratization of Cyberattack

When I was working with the Guardian on the Snowden documents, the one top-secret program the NSA desperately did not want us to expose was QUANTUM. This is the NSA's program for what is called packet injection--basically, a technology that allows the agency to hack into computers.

Turns out, though, that the NSA was not alone in its use of this technology. The Chinese government uses packet injection to attack computers. The cyberweapons manufacturer Hacking Team sells packet injection technology to any government willing to pay for it. Criminals use it. And there are hacker tools that give the capability to individuals as well.

All of these existed before I wrote about QUANTUM. By using its knowledge to attack others rather than to build up the internet's defenses, the NSA has worked to ensure that anyone can use packet injection to hack into computers.


+ - Lost City Discovered in Honduran Rain Forest->

Submitted by jones_supa
jones_supa (887896) writes "An expedition to Honduras has emerged from the jungle with discovery of a previously unknown culture's lost city. The team was led to the remote, uninhabited region by long-standing rumors that it was the site of a storied "White City", also referred to in legend as the "City of the Monkey God". Archaeologists surveyed and mapped extensive plazas, earthworks, mounds, and an earthen pyramid belonging to a culture that thrived a thousand years ago, and then vanished. The team also discovered a remarkable cache of stone sculptures that had lain untouched since the city was abandoned. The objects were documented but left unexcavated. To protect the site from looters, its location is not being revealed."
Link to Original Source

Put not your trust in money, but put your money in trust.