Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: Re:Single Sign on aka FB (Score 1) 446

by origin2k (#40755295) Attached to: Ask Slashdot: What's Holding Up Single Sign-On?

If you are like most people, then your email should be one of the most secure. If someone compromises your email they can reset the passwords on all your other accounts. They can figure out what other accounts you have by looking at your email.

One of the hazards of allowing people to reset their passwords by email.

Comment: Very sad (Score 1) 1613

by origin2k (#37620518) Attached to: Steve Jobs Dead At 56

It is really weird (for someone I really don't even know), but the news of his death hit me pretty hard. I think part of it was that he really wasn't very old, in fact he is wasn't much much older than one of my brothers.

A reminder that all of us have a finite amount of time here and we really should try and make the best of it.

RIP Steve.

Comment: So how does this all work? (Score 1) 79

by origin2k (#35096606) Attached to: Hack Chrome, Win $20,000

I'm curious, how does this contest work? You sign up for a 30 minute spot. Do they allow the security researcher to sit at the system to compromise and operate it or does the security researcher direct a user to visit some url with a potential exploit? Part of the contest is to exploit the browser so I am guessing that the browser needs someone operating it and fetching well crafted html etc. from some where.

The phone stuff looks interesting as they are looking for drive by exploits as well as browser exploits.


Study Finds Most Would Become Supervillians If Given Powers 419

Posted by samzenpus
from the super-power-corrupts dept.
It probably comes as no surprise, but researchers have found that most of us would gladly put on a mask and fight do-gooders if given super powers. From the article: "But power also acts like strong cologne that affects both the wearer and those within smelling distance, Galinsky noted. The person gains an enhanced sense of their importance, and other people may regard them with greater respect as well as extend leniency toward their actions. That combination makes for an easy slide into corruption."

Comment: Re:security holes of releasing source code (Score 1) 187

by origin2k (#32850360) Attached to: Microsoft Opens Source Code To KGB's Successor Agency

You don't need the source code to find holes to exploit! In fact some security researchers only care about having the released binaries. For more information read "Hacking: The Art of Exploitation". IIRC it has something to do with the fact that different; compilers, versions of same compiler, options to same compiler can all generate different binaries. So to truly exploit the code you need to know what instructions actually made it into the binary that people are using. That is why tools like IDA Pro are so useful.



+ - Baby locked up at Honolulu airport dies-> 3

Submitted by Anonymous Coward
An anonymous reader writes "Naturalized baby dies at air port in Homeland Security room while mother waiting to be interviewed From the article When they were first detained, Veavea, who speaks fluent English, explained to Homeland Security officials that Michael needed to get medical treatment, the lawyer said, and suggested that officials release her and Michael. But officials detained all of them. "Even if they had a valid cause for holding the mother of the baby ... there is absolutely no basis for holding the baby or the baby's nurse, who traveled with no luggage," Fried said, adding "the baby and the nurse are naturalized American citizens and have a U.S. passport.""
Link to Original Source

In a consumer society there are inevitably two kinds of slaves: the prisoners of addiction and the prisoners of envy.