Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security

Submission + - Nmap 4.50 Released in its 10th Birthday (insecure.org)

buanzo writes: "After nearly two years of work since the 4.00 release, Insecure.Org is pleased to announce the immediate, free availability of the Nmap Security Scanner version 4.50 from http://insecure.org/nmap/ . Nmap was first released in 1997, so this release celebrates our 10th anniversary! Major new features since 4.00 include the Zenmap cross-platform GUI, 2nd Generation OS Detection, the Nmap Scripting Engine, a rewritten host discovery system, performance optimization, advanced traceroute functionality, TCP and IP options support, and nearly 1,500 new version detection signatures. Dozens of other important changes — and future plans for Nmap — are listed in the release announcement. We recommend that all current Nmap users upgrade."
Networking

Submission + - NMap 10th anniversary and 4.50 release!

JTD121 writes: This is the 10th anniversary of Nmaps' release, and the release of 4.50 after quite some development.

"This is the first stable release since 4.20 (more than a year ago), and the first major release since 4.00 almost two years ago. Dozens of development releases led up to this. Major new features since 4.00 include the Zenmap cross-platform GUI, 2nd Generation OS Detection, the Nmap Scripting Engine, a rewritten host discovery system, performance optimization, advanced traceroute functionality, TCP and IP options support, and and nearly 1,500 new version detection signatures. More than 300 other improvements were made as well."
Security

Submission + - Nmap hits the Silver Screen (Again)

Devil's BSD writes: "Some of you probably remember a few years ago when Nmap was used in Matrix Revolutions to take down a power grid. Now, Nmap has hit the big screen again, this time in the Bourne Ultimatum. Although it probably flashed by too fast for most of us in the theater, it's clearly visible in the DVD releases. Video stills at http://insecure.org! Also, bash is clearly visible as the shell of choice here. Were they trying to make a subtle connection to the Bourne-Again Shell?"
It's funny.  Laugh.

Submission + - Tracking the Living Dead (zombiemeter.org)

Ron writes: "A new site has just been launched called ZombieMeter. This non-profit site is dedicated to tracking zombie activity seen in the news. It was conceived and written by a couple guys who were bored at work, but it can be amusing (and maybe even scary) to see what's coming.

The ZombieMeter is currently at level 3. This is due to several factors, including a Peruvian meteorite and a police officer being bitten by a man she was trying to help."

Security

Submission + - Phishers using government sites (symantec.com)

Ron writes: "According to Symantec security researcher Nick Sullivan, Symantec has identified a large number of phishing sites hosted on government domains. In June alone, phishing sites were identified on government sites from the following countries: Thailand, Indonesia, Hungary, Argentina, Ukraine, China, Brazil, and more."
Space

Submission + - Help the Galactic Census

Gr8Apes writes: CNN has a story about scientists needing your help in a galactic census. From the story: They are asking volunteers on the Internet to help classify the galaxies as either elliptical or spiral and note, where possible, in which direction they rotate. Astronomers say computer programs have been unable to reliably classify the star systems. With 10,000 to 20,000 people working to classify the galaxies, the process could take as little as a month. With /. alone, they might be able to do it in a week. Give them a helping hand by signing up at Galaxy Zoo.
Security

Submission + - FBI and Data Mining: Not just for terrorists (computerworld.com)

jcatcw writes: Computerworld reports that the FBI is using data mining programs to track everyone from potential terrorists to individuals who file fraudulent automobile insurance claims, according to a DoJ report filed with Congress this week. There are six pattern-based data mining programs that the FBI is using to look for 1) terrorists; 2) identity theft rings; 3) fraudulent housing transactions; 4) Internet pharmacy fraud; 5) automobile insurance fraud; 6) health-care-related fraud.
Security

Submission + - Scammers make friends with charities

Ron writes: "Symantec security researcher Yazan Gable has recently noted that scammers have been making donations to charities to test their ill-gotten credit cards. It is interesting that they choose humanitarian organizations, such as the Red Cross, to test cards. According to a Newsday article, the Red Cross is unaware that this is happening but that they will investigate it. This process of verification has also been automated; Symantec researchers have indicated that automated IRC bots can automatically verify a card. The good news is, if your credit card is stolen, at least some of the money may be going to a good cause!"
Microsoft

Submission + - Hard data on Vista usage: not so much (marketwatch.com)

quixote9 writes: "We've heard conflicting estimates of how widely adopted Vista has been. Now comes some hard data. DRAM makers ramped up to meet the huge expected demand for more memory needed by Vista. Except the demand hasn't materialized. Now they're suffering. Alternatively, maybe everyone's cleverly hacked their Ultimate Aero Glass Vista to fit on their old PCs. You think?"
Software

Submission + - No software in Dell computers!

power3d writes: Hi! Recently Dell started offering Desktops/Laptops with Linux (Ubuntu distro). Obviously, they charge for the installation, even if it's cheaper than Windows. Another problem is that, even for Ubuntu fans, there are many people that prefer to install their own Operating System and other Software. Currently Dell doesn't offer the option of "NO PRE-INSTALLED SOFTWARE". (neither other manufacturers) But Dell has a site where costumers can post their suggestions and Dell will apply those more voted. I've posted the suggestion of offering the option of offering computers without any software. I know that this won't mean anything without the votes of you guys. So I ask you please to go to http://www.ideastorm.com/article/show/67952/No_pre installed_software and make your vote. The registration is very simple. Don't need any confirmation mail or anything. It's made right there. Thank you :)
Security

Submission + - Defeating UAC with a two-stage malware attack

Ron writes: "According to a ZDNet bogger, "an independent security researcher has released details on a two-stage malware attack against Windows Vista to show how easy it is for non-privileged code to replace shortcuts on the Start Menu and intercept UAC (User Account Control) privilege elevation prompts." Basically, users can easily be fooled by malware that replaces shortcuts pointing to programs that already require UAC. When the user thinks he's elevating his program, he's actually elevating the malware. This is also covered in a Symantec blog."
PC Games (Games)

Submission + - New DX10 Benchmarks Do More Bad than Good

NIMBY writes: "An interesting editorial over at PC Perspective looks at the changing status between modern game developers and companies like AMD and NVIDIA that depend on their work to show off their products. Recently, both AMD and NVIDIA separately helped in releasing DX10 benchmarks based on upcoming games that show the other hardware vendor in a negative light. But what went on behind the scenes? Can any collaboration these companies use actually be trusted by reviewers and the public to base a purchasing decision on? The author things the one source of resolution to this is have honest game developers take a stance for the gamer."
Security

Submission + - Sidestepping Vista's UAC

Ron writes: "A security researcher has recently discovered a hole that could help Trojans bypass UAC on Windows Vista. According to his paper, and a Symantec security researcher, this effectively nullifies UAC's protection. The way it works is that the Trojan replaces shortcuts on a user's start menu or desktop with shortcuts to itself. Then, when a user thinks he's elevating his favorite program, such as World of Warcraft, he's actually elevating the malicious program. Cancel or allow?"

Slashdot Top Deals

A rolling disk gathers no MOS.

Working...