Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Take advantage of Black Friday with 15% off sitewide with coupon code "BLACKFRIDAY" on Slashdot Deals (some exclusions apply)". ×

Comment Re:Want to buy (Score 1) 175

Theobroma hit retail availability two years ago, and is pretty widely carried. When in season, it's not hard to find - ask your retailer to ask their distributor to get some stock. Follow @dogfishbeer on twitter to know when they're brewing which recipe.


Palm WebOS Hacked Via SMS Messages 99

gondaba writes "Security researchers at the Intrepidus Group have hacked into Palm's new WebOS platform, using nothing more than text messages to exploit a slew of dangerous web app vulnerabilities. The white hat hackers found that the WebOS SMS client did not properly perform input/output validation on any SMS messages sent to the handset, leading to a rudimentary HTML injection bug. Coupled with the fact that HTML injection leads directly to injecting code into a WebOS application, the attacks made possible were quite dangerous (especially considering they could all be delivered over an SMS message)."

Comment BlockHosts (Score 2, Informative) 497

We started using BlockHosts to feed iptables rules, and our failure logs went from 30-50k per day to 100. Basically, with more than 'x' failed logins within 'y' time frame, the source IP is blocked for 'z' time period. Since it uses iptables, you could block it from just the ssh port, or the entire system (we do the latter).
All three variables are configurable, and we also have whitelisted a few select standby IPs for contingency use. (As another poster said, you **will** lock yourself out eventually.)


Submission + - Report: 7 Years of Advanced Persistent Threat (mandiant.com)

psychosis writes: Mandiant's "M-Trends" report highlights more than seven years of lessons learned while conducting computer and network intrusion investigations for the U.S. government, the defense industrial base, and commercial organizations. Recently, a number of device vendors and "security" shops have been attempting to surf the "APT PR wave," but Mandiant has been actively engaged in responding to the APT for longer than most in the industry have even acknowledged such a pervasive threat exists.
This report offers a comprehensive, FIRST HAND account, and includes several case studies.
Bottom line: if you run a computer network that is now or may someday be of interest to foreign governments or criminal organizations you should request and read this report.
Free registration required, but worth the 5sec of effort...

We all agree on the necessity of compromise. We just can't agree on when it's necessary to compromise. -- Larry Wall