Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Comment Re:Spoiled ! (Score 4, Funny) 412

010000010110111 001100100001000 000111100101100 101011100110010 110000100000011 110010110111101 110101001001110 111001001100101 001000000111010 001101000011001 010010000001101 111011011100110 110001111001001 000000110111101 101110011001010 010000001110111 011010000110111 100100111011100 110010000001110 010011001010110 000101100100011 010010110111001 100111001000000 111010001101000 011010010111001 100100000011011 100110111101110 111001011100010 111000101110

i feel so alone.

Comment Re:Physchology (Score 2, Interesting) 274

But do not think, even for a moment, that this gives particularly meaningful data on what a real Mars trip would be like!

i see what you're saying, but i have to disagree some. remember the stanford prison experiment? everyone there knew they were part of a study or an experiment, and yet they went well beyond what their described roles were, into some very dark places.

Submission + - Researcher Discovers ATM Hack, Get's Silenced (

Al writes: "A researcher working for networking company Juniper has been forced to cancel a Black Hat presentation that would have revealed a way to hack into ATM machines. The presentation would have focused on exploiting vulnerabilities in devices running the Windows CE operating system, including some ATMs. The decision to cancel was taken to give the vendor concerned time to patch the problem, although the company was notified many months ago. The article above mentions a growing trend in ATM hacking. In November 2008 thieves stole nearly $9 million from more than 130 cash machines in 49 cities worldwide, and in January of this year, the second biggest maker of ATMs, Diebold, warned customers in an advisory that certain cash machines in Eastern Europe had been loaded with malicious software capable of stealing financial information and the secret PINs from customers performing ATM transactions."

Submission + - Symbian remote root exploit

ladyBug writes: Another Symbian MMS exploit has come into existence. The only difference is, this time it's not only for denial-of-service — the exploit can be used run code on a smartphone, and by using special jailbreak shellcode, this code can be run with root privileges. An exploit that seems to trigger the MMS vulnerability reported in Nokia smartphones earlier this week has already surfaced on russian security website An attacker who successfully exploits the vulnerability could do things such as use GPS to track the phone's location, turn on the microphone for eavesdropping, or take control of the device and add it to a botnet. No patch is currently available.

Submission + - Downloading copyrighted material legal in Spain (

Sqwuzzy writes: Finally someone gets it right. From the article: "A Spanish judge has ruled that downloading copyright files online is legal, as long as it's not for profit, a ruling that would make Spain one of the most lenient in the world"


Comment Re:So impressed by basic tech (Score 1) 192

Properly controlling outgoing traffic is of crucial importance, particularly when dealing with such sensitive information.

agreed, but, (and i do not manage enterprise networks or handle security/compliance) as i understand it, the problem lies in some hardware or software being able to tell the difference between a connection that the user (or legitimate software) intended to initiate (or participate in), and a connection that the user/software did not intend to initiate or participate in.

even if you had human eyes watching and controlling every connection, that would be tough. connecting to a russian IP address from your Toledo, KS office? probably unintended. unless if it's someone in purchasing buying that SQL extension, or Outlook add-on, from that small Russian software developer. or a chinese IP address, with an encrypted connection? is it one of your designers uploading new schematics to the chinese fab company?

in talking with folks from the x-force (IBM's ISS team), enterprise networking, networking VARs, and manufacturers, the intent behind the connection is the hardest thing to program for in network security.

Comment Re:How does a keylogger ever spread? (Score 2, Interesting) 192

I have a much more likely scenario. They simply spread their malware everywhere

with drive-by downloads, phony system messages, work attachments from infected friends, lovers, coworkers, etc. just like what happened to a coworker, an above-average computer user for an IT company. all of a sudden he's got (literally out of nowhere) a new, very microsoft-looking anti-virus* (and considering that ms just came out with, or is coming out with a free fully-featured AV app, (which he knows, since he's in charge of enterprise software, including microsoft EA, etc.) he almost leaves it alone, until it asked him for $70 USD) that claimed to have found a nasty trojan that needed to be removed IMMEDIATELY or else the moon falls, internet dies, cthulhu comes a'calling, etc etc etc.

we've all seen the hokey web popups that claim to have found problems with your PC. this is just the not-new next step. which is all the easier to accomplish with software that you understandably *don't* want the user looking at...

* note: when i saw the phony AV malware, i, too, thought it was the new MS antivirus, until i poked around in it and found misspellings, grammar mistakes, etc. (all you anti-grammar-nazis out there, this is why people bitch about it - it's very hard to take someone seriously when their thoughts are misspelled, unorganized, and give the impression they're representative of someone uneducated/irrelevant - imagine if you booted into AIX, or Windows, or were poking around in Excel, or your legit AV and were greeted with a screen that said "Weclome, user, our helps desk are for 24/7 hour service".....pardon the flamebait at the end please)


Submission + - Microsoft Puts C# and the CLI under Community Prom ( 3

FishWithAHammer writes: Peter Galli of Microsoft posted a blog entry on Port25 today, regarding the explicit placement of C# and the Common Language Infrastructure (the ECMA startard that underpins .NET) under their Community Promise:

It is important to note that, under the Community Promise, anyone can freely implement these specifications with their technology, code, and solutions. You do not need to sign a license agreement, or otherwise communicate to Microsoft how you will implement the specifications. ... Under the Community Promise, Microsoft provides assurance that it will not assert its Necessary Claims against anyone who makes, uses, sells, offers for sale, imports, or distributes any Covered Implementation under any type of development or distribution model, including open-source licensing models such as the LGPL or GPL.

This clears the way for Mono to be fully integrated into GNOME, and Boycott Novell can go back to crying in their corner.

Real Time Strategy (Games)

Submission + - Starcraft 2 Drops LAN Support, Only ( 2

Kemeno writes: Blizzard has announced that they will be dropping LAN support for Starcraft II, citing piracy and quality concerns. Instead, ALL multiplayer games will be hosted through their new service. I suppose I shouldn't be suprised by this move, but wasn't LAN play how the original Starcraft became popular? It's the only way I ever played it, and I don't see why Blizzard would alienate casual LAN gamers in favor of forcing their new service upon everyone (well, except for more profit, of course).

Comment Re:Support Them (Score 1) 174

Support them by becoming a Tor relay

so, i tried this. i was a live Tor relay for one day. then i was banned from every IRC server i might want to use (except the one for Tor). and then, on the second day, Tor quit working.. bandwidth check, good. node publication, good. actually connectivity to the Tor network? nope. i use RR in north TX, from what i hear, they don't block Tor, but i don't have any other explanations.

i'd love to help... it's just not working out. i'm open to possible solutions, or alternatives, though.


Submission + - Best Handset of Freedom?

Father Thomas Dowd writes: "The images we are seeing of Iran are being captured on cell phones, the text is being twittered over SMS. Still, the government has some control the networks, and we are all familiar with fears of wiretap etc. technologies to spy on users. If cell phone is the new tool of freedom, what would the best "freedom handset" contain? I'm thinking a device with an open OS, where each phone could be itself a router for encrypted messages passed through Bluetooth/WiFi/whatever, thereby totally bypassing physical infrastructures when necessary. Of course, some sort of plausible deniability encryption a la Truecrypt would also be good, in case the secret police catch you with your phone. What else might we need?"

Submission + - White House Panel Considers New Paths To Space (

Neil H. writes: The White House's Human Space Flight Plans blue-ribbon panel has posted the material from their first public meeting on the future of NASA's spaceflight program. NASA officials presented their Ares I rocket plans and their belief that they can work around its design flaws, with projected development costs ballooning to $35 billion. The panel also heard several alternative proposals, such as adapting already-existing EELV and SpaceX rockets to carry crew to orbit; these proposals would have better safety margins than the Ares I, be ready sooner, and cost NASA less than $2 billion to complete, but are politically unattractive.

Slashdot Top Deals

It is much harder to find a job than to keep one.