Forgot your password?
typodupeerror

Comment: Re:Not so hippocritical (Score 5, Insightful) 532

by k1980pc (#26940719) Attached to: Ballmer Pleads For Openness To Compete With Apple
Completely agree.
Apple was open the same way with Xcode and developer tools for Mac platform - free IDE, SDK and no restrictions on nature of applications you can create. May be due to commercial interests, they are being very closed in the iphone ecosystem. Initial reluctance to open up the sdk, arbitrary selections on the apps you can distribute ( Considering Appstore is the only "legal" and future proof way to get apps on to iphone, I consider this very monopolistic*)
To add to this, Microsoft has licensed active sync to Apple and Google for iphone and android respectively.

OT,but being a long term apple user, I am currently having an identity crisis. The special hardware, quality of software and openness no longer applies. Does RDF wear-off with age or is it due to Steve's departure? :)

* I know what monopolistic actually means, thank you!
Patents

+ - Die Hard or Live Free

Submitted by k1980pc
k1980pc (942645) writes "The elves,dwarves,hobbits and men of Linux world have come together in the ancient kingdom of Googleplex to plot the final stand against The Evil Eye. Leading names of Linux, the world's biggest grassroots software phenomenon, are spending three days to Friday debating whether an increasingly commercial open source community should fight or ignore the world's largest software maker. They will decide the strategy that would be followed against the recent patent threats and alleged "protection rackets" by Microsoft. Read more about it at reuters"
IBM

+ - IBM gets into web security with Watchfire buy

Submitted by Rob
Rob (703254) writes "IBM has become the first major player to buy into the web application security testing space with its offer to buy Watchfire. The deal, which is expected to close later this quarter, would bring in tooling that performs ethical hacking of web apps based on a database of known vulnerability signatures. "We will move security detection and remediation closer to the developer cycle," said Danny Sabbah, head of IBM's Rational Software business unit. "A theme in Rational is our integration with Tivoli where we bridge development and operational deployment organizations. Watchfire is a great fit in that they play on both sides of that divide.""
Puzzle Games (Games)

+ - Aussie Monopoly Voting Hacked

Submitted by
Samah
Samah writes "The new Australian edition of the popular board game Monopoly has had a couple of surprise winners for the top two spots after a group of hackers from South Australia wrote a program to place hundreds of thousands of votes using the flawed public voting system. From the article: "...Hasbro's Monopoly marketing manager claimed the Barossa's triumph was largely due to networking among people within the region. "...While the hackers concerned might have believed that their attempts were successful, they in fact had very little impact on the excellent results Barossa achieved."""
Operating Systems

+ - Sun CEO reveals ZFS will be OSX default filesystem

Submitted by Fjan11
Fjan11 (649654) writes "Sun's Jonathan Schwartz announced that "Apple would be making ZFS "the file system" in Mac OS 10.5 Leopard". It seems likely that Leopad's Time Machine feature will require ZFS to run, because ZFS has back-up and snapshots build right in to the filesystem as well as a host of other features, such as built in Raid. Jobs is probably not happy about his thunder being stolen right before for the June 11th keynote..."
Republicans

+ - Congressman Orrin Hatch caught pirating software

Submitted by
Rocketship Underpant
Rocketship Underpant writes "Orrin Hatch, the Congressman viewed by many as a shill for corporate copyright interests, recently stated that people who download copyrighted materials should have their computers destroyed as punishment. However, as Wired.com reports, Hatch's own website uses copyrighted software without permission — a Javascript menu system developed by a British company. Is Mr. Hatch accepting volunteers to go through his home and office destroying all his computers, or were his comments to Congress just a bunch of hypocritical hot air?"
IBM

+ - IBM Goes Dutch to Cut Tax Bill

Submitted by
theodp
theodp writes "What does IBM, Bono, Sun Microsystems, and Keith Richards have in common? An affinity for the Netherlands. The NY Times has the scoop on how IBM formed a new Netherlands subsidiary to buy back 8% of its U.S. parent's shares, allowing Big Blue to save an estimated $1.6 billion in U.S. taxes. Two days after IBM pulled off the largest accelerated stock repurchase ever, the IRS moved to shut so-called 'Killer B' corporate-tax loopholes."
Privacy

+ - Legal password hacking?

Submitted by Anonymous Coward
An anonymous reader writes "I work for a company that hosts an application for one of the US Federal multi letter government agencies. I've just been asked to run "John the Ripper" against the Active Directory (Please no Windows jokes, K?) accounts we setup for them. Not just one or two accounts, but ALL the accounts which are made up of Federal Employee's.

Why? To see if any account is using a weak password. Now mind you we have followed or exceeded all the guidelines they have set before us (password length, complexity, history, age, etc.). The agency is rather paranoid with all the recent leaks of personal information.

When I was asked to do this, warning sirens went off in my head. Can they make me do this? What are the legal ramifications of doing this? Can I be held accountable? My gut is saying "What-ever you do, DON'T DO IT! These are federal employee accounts!". 10 years ago I wouldn't have thought twice about doing this, but with all the new laws that have been passed I'm no sure.

Does anyone have good reference material backing my stance of not doing this. Or am I stuck hacking the accounts?

P.S. I will be calling my attorney in the morning for guidance. They just dropped this on me on my way out the door for the night."
Programming

+ - The Death Of A Software License (GPL)->

Submitted by Anonymous Coward
An anonymous reader writes " The Death Of A Software License argues that Google's Greg Stein's "license pressure" is something that Richard Stallman and the Free Software Foundation should pay more attention to. If the FSF takes the GPL v3 in an opposing direction to the developers that gave the GPL legs in the first place, then we'll see an obvious outcome — the death of the GPL. Interesting blog post if nothing else."
Link to Original Source
OS X

+ - Making ProcFS Cooler On OS X

Submitted by Anonymous Coward
An anonymous reader writes "Amit Singh recently released a FOSS process filesystem (procfs) for OS X. Like its other Unixy cousins this procfs shows tons of info on system proceses, threads, tasks, memory, ports etc. A new article on the OS X internals blog explains some new procfs features which are pretty cool... For instance instead of pid numbers you can lookup things by name like "Safari" and "Terminal". Another file will tell you where each app's windows are on screen. There's a screenshot.tif file which contains a live screenshot of your screen! Basically opening or copying the screenshot.tif file gives you what's showing on the screen. The iSight has its own screenshot file which gives a live camera picture if you open it. Sorta weird but neat :)"
Security

+ - Hacked server and all I have is an IP address...

Submitted by
allebone
allebone writes "Hi there I'm an IT engineer in London. Last Thursday I was called out to a client who I had never been to before. They were having some major server problems. After poking around a bit it transpired that their server had been hacked. Whoever had got in had created himself a user account with domain admin privileges and inserted a virus on the server which ran as "2footninja.exe" or something like that. I spent most of the day locking down the server so it couldn't be repeated. However, I then began checking the logs to see if I could find anything about who had hacked this server. I subsequently found that whoever had hacked this server did so from the IP address 82.165.182.119. After doing a quick whois on the ptr record it seemed that this was a "one and one internet" customer (I assume this is a broadband provider in the US). More than that I cannot tell. I then did some portscans and found 3389 and ftp open. I also managed to login via anonymous ftp and located the virus he used to infect my server in a file "foot.zip" I then left and went home, that night I ran tsgrinder against his terminal server port but came up with nothing — no doubt my dictionary attack would have been ineffective against someone who knew what he was doing anyway. I was hoping if I could log into his server I might be able to find out his name or email address... Other files I located on his server of interest was a directory "artexpo 2007" which seemed to have been files perhaps taken from another company. I tried contacting the person Kim who was listed on the bottom of some of the documents via email but got no reply. My question is this: Have I reached the end of my detective work? Is there nothing more I can learn about this person? Has he escaped forever without me being able to (at least) send him an angry email? Any thoughts/comments would be interesting. Pete"

FORTH IF HONK THEN

Working...