Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

Comment Old news - real, but old (Score 1) 328

From time to time they have conducted mock attacks and it has been demonstrated more than once that an external agent could destroy various pieces of equipment by ordering them to perform out of spec. And there are other weak points as well - hack into the railroads and instruct the train to deliver the coal to the wrong place, for example. But here's a story from August 13 2001 in the LA Times

For two weeks last spring, hackers wormed their way inside a computer system that plays a key role in moving electrical power where it is needed around the state. The computers belong to the California Independent Service Operator, an agency that oversees much of the state's electricity transmission grid--including the massive complex of power plants and transmission lines. Cal-ISO patched the flaw that allowed hackers to roam through portions of its network before power supplies were affected. But the episode sent shock waves throughout the energy industry.
The crux of the issue is that the system is vulnerable - recall 2003 when a single tree branch killed power across several states for a week? That is not indicative of a healthy and robust grid system. And if the system is that vulnerable to an accident what would happen if somebody with malice aforethought (and a degree in EE) decided to spice things up a bit?
Unless the utility companies make explicit plans to correct things a macro-catastrophe is inevitable. Personally I think that a solar storm is more likely than a terrorist attack but it *WILL* happen and tens of millions of people will lose their grid indefinitely (probably several years to restore full access). (I further predict that the system will be rebuilt to the old specs because it will be cheaper and easier to do it that way, flushing an opportunity to build a hardened grid).
This is your transformer. (note that this company claims to be able to repair your transformer in less than 30 weeks - that means that)
This is your transformer after a solar storm. Yes, the sun did this.
This is the transformer with which most geeks are more familiar.

Biotech

Cheap Blood Clot Detection Device 103

Gearoid_Murphy writes "The BBC details the news of a cheap handheld device to detect blood clots on the surface of the brain. The device uses infrared light to penetrate 3 cm into the body; light that has passed through clotted blood changes detectably. A doctor who is testing the device in India said, 'We found a 98% accuracy for showing blood clots or haematomas.'"
Networking

Submission + - Fixing the IPv6 dilema

jd writes: "In an attempt to attract more people to using IPv6, a New Zealand group is offering free porn to those with access to an IPv6 tunnel or connection. This may or may not work, considering that the country involved has a hundred times as many sheep as humans, which may create a degree of scepticism over what exactly is on offer."
The Almighty Buck

EU Launches Antitrust Probe Into iTunes 318

Macthorpe writes "ABC News is reporting that the EU has started an antitrust probe into the way that Apple sells music on iTunes. As you can only purchase from the store of the country where your credit or debit card is registered, the price differences and availability differences between iTunes stores for different EU countries constitute a violation of EU competition laws which forbid territorial sales restrictions.'Apple spokesman Steve Dowling said Monday the company wanted to operate a single store for all of Europe, but music labels and publishers said there were limits to the rights that could they could grant to Apple. "We don't believe Apple did anything to violate EU law," he said. "We will continue to work with the EU to resolve this matter."'"
Hardware Hacking

Submission + - New Powered USB Part 3: Response to Slashdot

Patrick McFarland writes: "I've written a third, and hopefully final part, to the originally two part Why Powered USB Is Needed article that was featured on Slashdot three days ago, and this response is pretty much due to Slashdot users asking smart questions and poking a few holes in my argument. The third part covers how USB 3.0 essentially needs to follow in Firewire's footsteps to truly succeed and overcome people's views on USB as just a low bandwidth bus that no one uses seriously and, combined with New Powered USB, could overtake Firewire in high bandwidth applications."
Software

PC World's 50 Best Tech Products of All Time 399

Ant writes "PC World picks the 50 best tech products of all time. Apple holds down seven places in the list, Microsoft two, and open source software (Red Hat Linux) one. The top five, according to PC World, are: Netscape Navigator (1994), Apple II (1977), TiVo HDR110 (1999), Napster (1999), and Lotus 1-2-3 for DOS (1983).
Windows

Submission + - Professional Rootkits review

cpm80 writes: "Professional Rootkits (http://www.amazon.com/gp/product/0470101547/ref=c m_arms_pdp_dp/102-0642403-7880107) fully details rootkit technology in a modular, easy to learn progression from extremely simple to extremely functional. The book offers both chapter-by-chapter binaries and compile-and-run options, to cater to every level of development. Whether you want to read along and use the precompiled binaries, or modify the code and recompile new binaries, you can start simple and build your knowledge quickly.

The Wrox format really helps with this topic. The author begins with a very simple rootkit that's easy to understand, and slowly adds functionality throughout the book. There are no snippets that require extensive rework to integrate, no vague references to technology beyond the scope of the book, no indecipherable compile errors or blue screens; just good code wrapped in a book that fully details rootkits.

I was amazed by how easy it was to learn Windows kernel internals and use that knowledge to write fully functional rootkits. I took the time to download all the free software required to compile and run the code provided, so I was able to use the modularity of the code to create specific rootkits. I now have a key logger, an Outlook email filter, a network filter and a USB key filter. But aside from these new "utilities" I now have a thorough understanding of rootkits and how they can be used.

On the flip side, there is a certain amount of irresponsibility involved in providing the world with an easy to understand tutorial explaining the development and use of rootkits. Now, anyone who suspects their spouse is cheating can make a key logger. Anyone who thinks their boss is trying to replace them can make an email filter. The book even provides a common technique for installing rootkits from a visited web site! As a software engineer, I find the subject "interesting", but as a security officer, I suspect this book will be more "critical".

There are 14 chapters; of these, 9 chapters detail rootkit technology. The topics are:

A Basic Rootkit (a very simple introduction to rootkits)
Kernel Hooks ( this chapter adds a single kernel hook)
User Hooks (this chapter uses the kernel hook to do "Process Injection")
I/O Processing (this chapter explains Device I/O Control )
Communications (this is very stealthy TDI communications)
Filter Drivers (file filters and network filters!)
Key Logging (the first unloadable key logger I've ever seen)
Concealment (this caters to "old style" rootkit hiding techniques)
E-mail Filtering (Outlook and Lotus Notes "corporate" email filtering)

Knowing how these tricks are performed can be invaluable to both rootkit developers and security specialists. In addition, the book provides chapters on Rootkit Detection and Rootkit Prevention. Even if you're not worried about rootkits, knowing these basic security concepts can make a big difference if you use the Internet.

In summary, it's a great book (unless you're Microsoft) and I can't wait for the Linux version!"
The Almighty Buck

X Prize For a 100-MPG Car 741

Heinen writes in about the X Prize Foundation, which spurred innovation by offering US $10 million for the first privately built spacecraft. The Foundation now plans to offer millions for the first practical car that increases mileage five-fold. The specs for the competition are out in draft form amd call for cars in two categories that are capable of 100 MPG in tests to be run in 2009. The categories are: 4-passenger/4-wheel; and 2-passenger/unspecified wheels. The cars must be manufacturable, not "science projects. The prize is expected to top $10 million. The X Prize Foundation says that so far it has received more than 1,000 inquiries from possible competitors.
Google

Google In Bidding To Buy DoubleClick 120

A number of readers clued us to the latest development in the saga of te sale of DoubleClick: Google has thrown its hat into the ring against Microsoft and (reportedly) Yahoo and AOL. Most of the stories quote a Wall Street Journal piece that is only available to subscribers. Google's entry into the bidding may boost the price for the remaining pieces of DoubleClick (parts of the company having already been sold off) to $2 billion, twice what its current owners paid for the whole thing. Some reports speculate that this figure could give Microsoft pause.

Slashdot Top Deals

Arithmetic is being able to count up to twenty without taking off your shoes. -- Mickey Mouse

Working...