Become a fan of Slashdot on Facebook


Forgot your password?

Submission Point and click Gmail hacking at Black Hat->

not5150 writes: "Using Gmail or most other webmail programs over an unsecured access points just got a bit more dangerous. At Black Hat, Robert Graham, CEO of errata security, showed how to capture and clone session cookies. He even hijacked a shocked attendee's Gmail account in the middle of his Black Hat speech."
Link to Original Source
United States

Submission Forensics Expert says Al-Qaeda Images Altered

WerewolfOfVulcan writes: Wired reports that researcher Neal Krawetz revealed some veeeeeery interesting things about the Al-Qaeda images that our government loves to show off.

From the article: "Krawetz was also able to determine that the writing on the banner behind al-Zawahiri's head was added to the image afterward. In the second picture above showing the results of the error level analysis, the light clusters on the image indicate areas of the image that were added or changed. The subtitles and logos in the upper right and lower left corners (IntelCenter is an organization that monitors terrorist activity and As-Sahab is the video production branch of al Qaeda) were all added at the same time, while the banner writing was added at a different time, likely around the same time that al-Zawahiri was added, Krawetz says." Why would Al-Qaeda add an IntelCenter logo to their video? Why would IntelCenter add an Al-Qaeda logo? Methinks we have bigger fish to fry than Gonzo and his fired attorneys... }:-) The article contains links to Krawetz's presentation and the source code he used to analyze the photos.

Submission Don't overlook command line processing

An anonymous reader writes: Command-line processing is historically one of the most ignored areas in software development. Just about any relatively complicated software has dozens of available command-line options. The GNU tool gperf is a "perfect" hash function that, for a given set of user-provided strings, generates C/C++ code for a hash table, a hash function, and a lookup function. This article provides a reference for a good discussion on how to use gperf for effective command-line processing, and on command-line processing techniques in general.

Dinosaurs aren't extinct. They've just learned to hide in the trees.