Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Submission + - Symbian remote root exploit

ladyBug writes: Another Symbian MMS exploit has come into existence. The only difference is, this time it's not only for denial-of-service — the exploit can be used run code on a smartphone, and by using special jailbreak shellcode, this code can be run with root privileges. An exploit that seems to trigger the MMS vulnerability reported in Nokia smartphones earlier this week has already surfaced on russian security website securityvulns.ru. An attacker who successfully exploits the vulnerability could do things such as use GPS to track the phone's location, turn on the microphone for eavesdropping, or take control of the device and add it to a botnet. No patch is currently available.
Enlightenment

Submission + - Downloading copyrighted material legal in Spain (pcauthority.com.au)

Sqwuzzy writes: Finally someone gets it right. From the article: "A Spanish judge has ruled that downloading copyright files online is legal, as long as it's not for profit, a ruling that would make Spain one of the most lenient in the world"

Article:
http://www.pcauthority.com.au/News/149677,spain-rules-downloading-from-p2p-and-bittorrent-is-legal.aspx

Comment Re:So impressed by basic tech (Score 1) 192

Properly controlling outgoing traffic is of crucial importance, particularly when dealing with such sensitive information.

agreed, but, (and i do not manage enterprise networks or handle security/compliance) as i understand it, the problem lies in some hardware or software being able to tell the difference between a connection that the user (or legitimate software) intended to initiate (or participate in), and a connection that the user/software did not intend to initiate or participate in.

even if you had human eyes watching and controlling every connection, that would be tough. connecting to a russian IP address from your Toledo, KS office? probably unintended. unless if it's someone in purchasing buying that SQL extension, or Outlook add-on, from that small Russian software developer. or a chinese IP address, with an encrypted connection? is it one of your designers uploading new schematics to the chinese fab company?

in talking with folks from the x-force (IBM's ISS team), enterprise networking, networking VARs, and manufacturers, the intent behind the connection is the hardest thing to program for in network security.

Comment Re:How does a keylogger ever spread? (Score 2, Interesting) 192

I have a much more likely scenario. They simply spread their malware everywhere

with drive-by downloads, phony system messages, work attachments from infected friends, lovers, coworkers, etc. just like what happened to a coworker, an above-average computer user for an IT company. all of a sudden he's got (literally out of nowhere) a new, very microsoft-looking anti-virus* (and considering that ms just came out with, or is coming out with a free fully-featured AV app, (which he knows, since he's in charge of enterprise software, including microsoft EA, etc.) he almost leaves it alone, until it asked him for $70 USD) that claimed to have found a nasty trojan that needed to be removed IMMEDIATELY or else the moon falls, internet dies, cthulhu comes a'calling, etc etc etc.

we've all seen the hokey web popups that claim to have found problems with your PC. this is just the not-new next step. which is all the easier to accomplish with software that you understandably *don't* want the user looking at...


* note: when i saw the phony AV malware, i, too, thought it was the new MS antivirus, until i poked around in it and found misspellings, grammar mistakes, etc. (all you anti-grammar-nazis out there, this is why people bitch about it - it's very hard to take someone seriously when their thoughts are misspelled, unorganized, and give the impression they're representative of someone uneducated/irrelevant - imagine if you booted into AIX, or Windows, or were poking around in Excel, or your legit AV and were greeted with a screen that said "Weclome, user, our helps desk are for 24/7 hour service".....pardon the flamebait at the end please)

Microsoft

Submission + - Microsoft Puts C# and the CLI under Community Prom (technet.com) 3

FishWithAHammer writes: Peter Galli of Microsoft posted a blog entry on Port25 today, regarding the explicit placement of C# and the Common Language Infrastructure (the ECMA startard that underpins .NET) under their Community Promise:

It is important to note that, under the Community Promise, anyone can freely implement these specifications with their technology, code, and solutions. You do not need to sign a license agreement, or otherwise communicate to Microsoft how you will implement the specifications. ... Under the Community Promise, Microsoft provides assurance that it will not assert its Necessary Claims against anyone who makes, uses, sells, offers for sale, imports, or distributes any Covered Implementation under any type of development or distribution model, including open-source licensing models such as the LGPL or GPL.

This clears the way for Mono to be fully integrated into GNOME, and Boycott Novell can go back to crying in their corner.

Real Time Strategy (Games)

Submission + - Starcraft 2 Drops LAN Support, Battle.net Only (gamespot.com) 2

Kemeno writes: Blizzard has announced that they will be dropping LAN support for Starcraft II, citing piracy and quality concerns. Instead, ALL multiplayer games will be hosted through their new Battle.net service. I suppose I shouldn't be suprised by this move, but wasn't LAN play how the original Starcraft became popular? It's the only way I ever played it, and I don't see why Blizzard would alienate casual LAN gamers in favor of forcing their new service upon everyone (well, except for more profit, of course).

Comment Re:Support Them (Score 1) 174

Support them by becoming a Tor relay

so, i tried this. i was a live Tor relay for one day. then i was banned from every IRC server i might want to use (except the one for Tor). and then, on the second day, Tor quit working.. bandwidth check, good. node publication, good. actually connectivity to the Tor network? nope. i use RR in north TX, from what i hear, they don't block Tor, but i don't have any other explanations.

i'd love to help... it's just not working out. i'm open to possible solutions, or alternatives, though.

Privacy

Submission + - Best Handset of Freedom?

Father Thomas Dowd writes: "The images we are seeing of Iran are being captured on cell phones, the text is being twittered over SMS. Still, the government has some control the networks, and we are all familiar with fears of wiretap etc. technologies to spy on users. If cell phone is the new tool of freedom, what would the best "freedom handset" contain? I'm thinking a device with an open OS, where each phone could be itself a router for encrypted messages passed through Bluetooth/WiFi/whatever, thereby totally bypassing physical infrastructures when necessary. Of course, some sort of plausible deniability encryption a la Truecrypt would also be good, in case the secret police catch you with your phone. What else might we need?"
Space

Submission + - White House Panel Considers New Paths To Space (nasa.gov)

Neil H. writes: The White House's Human Space Flight Plans blue-ribbon panel has posted the material from their first public meeting on the future of NASA's spaceflight program. NASA officials presented their Ares I rocket plans and their belief that they can work around its design flaws, with projected development costs ballooning to $35 billion. The panel also heard several alternative proposals, such as adapting already-existing EELV and SpaceX rockets to carry crew to orbit; these proposals would have better safety margins than the Ares I, be ready sooner, and cost NASA less than $2 billion to complete, but are politically unattractive.
The Internet

Submission + - Kevin Kelly's Internet Mapping Project (kk.org)

Bram writes: "Wired editor Kevin Kelly has posted the results of "The Internet Mapping Project" on his website. He presents drawings representing a broad public's conceptualization of the Internet as a place or thing, and they make for fascinating viewing. In his words: "I've become very curious about the maps people have in their minds when they enter the internet. So I've been asking people to draw me a map of the internet as they see it. That's all. More than 50 people of all ages and levels of expertise have mapped their geography of online.""
Programming

Submission + - Attention Young Programmers: Save your money! (blogspot.com)

ajole writes: "One reader blogs about how he quit his programming job to become a ski bum bartender after his last couple of jobs have twisted his view of his favorite hobby. The topic caught the attention of several meta-comment sites, including the easily /.'able reddit.com. Here's an excerpt:"I quit my job two weeks ago. I don't want to program at work any more. I'm sick of being inside and stationary, and I'm sick of working in an environment where people don't talk to each other. Over the last few years I've worked for one company producing high-end music software. When I came in I was invincible, and after working for someone with a completely different approach to problem solving (right down to code style), I've become weak and ineffectual. Well, those days are over. I'm going to get my style back and get back on the wagon of invincibility. Programming is art and should be a pure and unadulterated stream of conciousness from the developer to the machine. Python is art. Good design is art. Milestones are art. Good energy is art. [...] I'm psyched to get back to coding for the sake of art, where the idea and the implementation are solid gold. I quit my job, gave up my place, and I'm going to go bar tend in a ski town and program for fun. I've got some PyQt dev kits to write to simplify audio software development, and have a huge Python GIL to deal with. We'll see what happens."

How has your job changed your perspective of programming as an art?"

Comment Re:Vietnamese Agent Orange vs. Iranian Despot (Score 1) 838

then i think you and i are going to end up arguing over how far back to look in what we consider relevant historical context. you did fail to address china, though if 2 decades is too old, then i see why. also, have a look at this. it's easy to see, it's impossible for russia to be considered anything but second world, as the classification was come up with in the cold war to differentiate between us/allies and russia/allies and everyone else. if you look at the differentiater being the IMF's classification, then i would likely disagree with you, but that's likely a whole different little debate. anyway, i'm sure that you have the typical slashdot belief that i'm a naive, asleep american, since i won't jump immediately on board the america-is-the-worst bandwagon, which is too bad.

Slashdot Top Deals

"Gravitation cannot be held responsible for people falling in love." -- Albert Einstein

Working...