Become a fan of Slashdot on Facebook


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).


Comment: still better... (Score 3, Insightful) 392

The thing to note, though, regardless of the BS nature of most of these statements, is that physical intrusions like breaking into someone's home and bugging their place of work etc. doesn't scale, so in that sense strong encryption thwarts mass surveillance.

Comment: world's thinnest argument (Score 1) 395

Yeah, and if I sell 100 grams of fertilizer to someone, that has the potential of aiding terrorism because that person might be buying 100 grams from thousands of people to build a big bomb. Does that mean there should be a law against that? This whole "aiding terrorism" argument is so made up, it makes me physically sick... to be quoting "Friends": "congratulations, you have found the world's thinnest argument".

+ - How to get Gmail to unblock an IPv6 netblock

Submitted by
theonlyholle writes "For the last couple of weeks I've been trying to somehow get Google to unblock an IPv6 block on their Gmail platform. The problem is that seemingly only one or two spam emails from an IPv6 address seem to trigger their automatic filter and cause it to reject further emails from the entire /64 block to be rejected due to an "unusual" amount of UCE. Of course it's not all that unusual, since I have a few customers who forward their incoming email to Gmail and occasionally a spam email slips through my spam filters. What's really annoying is that a) the filter is on such a hair trigger (I have no such problems on IPv4) and b) there seems to be no way of getting Google to adjust their filters. Has anyone been successful in getting through to Google and having an IPv6 block permanently unblocked?"

+ - Flash exploit lets websites activate your webcam->

Submitted by Anonymous Coward
An anonymous reader writes "A new Adobe Flash exploit has been discovered that allows any website you visit to activate your webcam and microphone giving whoever owns the website the opportunty to watch and record you sat at your machine. The exploit involves the use of a hidden iFrame and the Flash Player Settings Manager. With just four clicks of the mouse the camera can be activated silently and the user has no idea. The example given is a simple game that pops-up the webcam output once you've done the appropriate number of clicks.

Adobe has been told about the problem several weeks ago, but has yet to respond. So the exploit has been made public to try and speed things along."

Link to Original Source

Comment: anyone? (Score 2, Insightful) 271

by theonlyholle (#33450568) Attached to: Ping Could Be Apple's Social Networking Backdoor?
for the same reason that people use Internet Explorer - because it comes bundled and you don't have to deal with downloading extra software, setting up an account etc. Not because it's better, more secure or offers anything new - ease of use seems to be a lot more important than all of that.

Comment: social shopping yes - social network no (Score 4, Insightful) 271

by theonlyholle (#33450316) Attached to: Ping Could Be Apple's Social Networking Backdoor?
The problem is that all it is is a social shopping network. And of course it's a "social shopping at the iTunes store" network, so it's very, very limited. I personally think that Apple narrowed the scope of their network too much (you can't even post a link to a live video on YouTube of a song you just bought - or rather, you can but it will show up as text only with no way to click or copy&paste it) and most users will be bored by it very quickly and just ignore it. Even if Apple expands it later, a reputation once ruined is hard to improve...

+ - Checking email for TLS support now easy->

Submitted by theonlyholle
theonlyholle (720311) writes "Finding out if a certain email address is able to receive email securely with TLS based encryption has always been a bit of a hassle, as you had to check every single MX manually. So I wrote a little web tool for myself and some colleagues, which is now open to the general public. Just enter an email address (the left part really doesn't matter, it's just so it's more end-user friendly) and the tool will tell you which MXs accept email for the domain and if they support TLS. Of course you still need to be sure that you support it on your end as well... try it at"
Link to Original Source

Comment: man page != end user documentation (Score 1) 769

by theonlyholle (#30310648) Attached to: Is Linux Documentation Lacking?
The question in the summary shows the extent of the problem. No, a man page is not proper end-user documentation. It's great for a trained IT professional who quickly needs to look up the syntax for a command. But for my mom or my wife's dad, even getting to the man page is a challenge - and to get there, they need to know that man pages exist. Are there even man page viewers for the desktop? Ones that are readily accessible and preinstalled with the default system? But I must come to Linux's defense, too. The documentation on my latest Windows system is not much better, except that a help system is built right into the desktop. It's the availability of third party printed documentation that makes the difference.

+ - How to sell to a pirate->

Submitted by
theonlyholle writes "Paul Battley has an excellent blog post on "how to sell to a pirate" that shows how artificial restrictions on media distribution kept him from paying for the content he wanted to see: "At any stage up until the last, you could have had me as a customer, if you were willing to supply it there and then in a format I could use. However, because of licensing, region coding, and DRM, my best option was the 'pirate' one.""
Link to Original Source

The Real Story On WPA's Flaw 67

Posted by kdawson
from the calm-down dept.
Glenn Fleishman writes "The reports earlier today on WPA's TKIP key type being cracked were incorrect. I spoke at length with Erik Tews, the joint author of the paper that discloses a checksum weakness in TKIP that allows individual short packets to be decrypted without revealing the TKIP key. I wrote this up for Ars Technica with quite a bit of background on WEP and WPA. Tews's paper, co-written with Martin Beck, whom he credits as discovering and implementing a working crack (in aircrack-ng as a module), describes a way to use a backwards-compatible part of TKIP to exploit a weakness that remains from WEP. ARP packets and similarly short packets can be decoded. Longer packets are likely still safe, and TKIP hasn't been cracked. Don't believe the hype, but the exploit is still notable."
Linux Business

Red Hat CEO Says Economic Crisis Favors Open Source 191

Posted by kdawson
from the falling-tide-lifts-some-boats dept.
arashtamere writes "Red Hat president and CEO Jim Whitehurst predicts the enterprise open source software business will emerge from the economic crisis stronger than the proprietary market. 'I've had a couple of conversations with CIOs who said, "We're a Microsoft shop and we don't use any open source whatsoever, but we're already getting pressure to reduce our operating costs and we need you to help put together a plan for us to... use open source to reduce our costs." And we've had other customers literally looking at ripping and replacing WebLogic or WebSphere for JBoss ... I think we'll know in about six to nine months but there is no question that open source will come out of this in relatively better shape than our proprietary competitors,' he told Computerworld."

With your bare hands?!?