Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Submission + - Regular Domains Have More Malware Than Porn Sites (theregister.co.uk)

SnugglesTheBear writes: "New research pours scorn on the comforting but erroneous belief that Windows surfers who avoid smut and wares on the web are likely to avoid exposure to malware.

A study by free anti-virus firm Avast found 99 infected legitimate domains for every infected adult web site. In the UK, Avast found that more infected domains contained the word "London" (such as the blog section of http://kensington-london-hotels.co.uk/ than the word "sex". Among the domains labelled as infected by Avast was the smart phones section of the Vodafone UK website. The mobile phone operator's site contained a malicious JavaScript redirect script that attempted to take advantage of an unpatched Windows Help and Support Centre flaw (CVE-2010-1885) to infect the machines of visiting surfers."

Google

Submission + - YouTube Revenue Sharing for IE users only (ryananddebi.com)

rcragun writes: I just received an email from YouTube inviting me to apply for “revenue sharing” for one of the videos I posted. I followed the link to apply for revenue sharing and clicked through as much of the process as I could. But I couldn't get past the "link your youtube account with adsense" screen. Basically, you need to select a radio button either to create a new adsense account or to enter the details from your existing account. Depending on the button you select, another box will pop up for you to enter the requisite information. I clicked on the radio button and nothing happened. I figured it was a browser issue, even though I was using Google Chrome on Google owned YouTube. So I fired up Firefox and tried the same application process with Firefox. Still no luck. My last recourse: Internet Explorer. Since I run Linux, I had to start up Virtualbox and then launch Internet Explorer in a virtual machine. The result – it worked. You can see the side-by-side photos of the two browsers here: http://www.ryananddebi.com/wp-content/uploads/2010/06/Screenshot.png The moral of the story: If you want to make money off your videos on YouTube, you have to run Internet Explorer.
Open Source

Submission + - The unusual, obscure and useful Linux distros (goodgearguide.com.au)

angry tapir writes: "Most people will be familiar with some of the big names when it comes to Linux — distributions like Ubuntu, Red Hat Enterprise Linux, Debian and Mandriva. Most of the well-known Linux distros are designed to be used as general purpose desktop operating systems or installed on servers. But beyond these distros are hundreds of others either designed to appeal to very specific audiences or to fulfil the somewhat niche needs of some users. We rounded up some of the most interesting Linux distributions out there that you might not have heard of."
Censorship

Submission + - UK Police Threaten Teenage Photojournalist (wordpress.com)

IonOtter writes: In what seems to be a common occurrence, and now a costly one, Metropolitan Police in the UK still don't seem to be getting the message that assaulting photographers is a bad idea. UK press photographer Jules Matteson details the event in his blog, titled The Romford Incident. The incident has already been picked up by The Register, The Independent and the British Journal of Photography, which contains an official statement from the Metropolitan Police.

Submission + - Hack AT&T Voicemail With Android

An anonymous reader writes: It is shockingly easy to gain access to any AT&T customers voicemail using caller ID spoofing techniques. What's worse is that AT&T knows about it: http://www.wireless.att.com/learn/popups/voicemail-security.jsp

On your Android phone, download one of the two caller ID spoofing programs.
Input the number of your target as the destination number and then enter your targets phone number again as the spoofed caller ID.
Then connect your call.

If at any point your target allows your inbound call to touch their voicemail, you will be dropped into a random menu of their voicemail and eventually can drill up or down to get what you want. You can change greetings, erase messages, send voicemails out of the target account and much more.

How many politicians worried about Google WiFi Sniffing will want to know more about this?

Comment Imagine this (Score 1) 433

If this whole kill switch policy keeps getting more and more popular, big businesses will take interest in keeping limited network communications with one another in order to keep their money making power houses running. This will lead to them building their own infrastructure and eventually will have a small internet of their own. Soon they realize, they can make a shit ton of money with all this and start leasing it out to the public for a fee and then they are the new ISPs. The moral of the story is this, you can't stop the internet because the technology is there and many people know how to use and implement it. All these kill switches will lead to a more centralized business world. Can you imagine a Mc Donalds being an ISP? "Hey can I take your order? Would you like some internet with that value meal sir?"

Comment Listen to the BOFH (Score 2, Funny) 274

If the BOFH has taught the IT world anything, it's to always monitor your co-workers. This provides potential means for extortion if there would ever be talk about you being fired or replaced as well as an easy and effective way to climb to the top at startling speeds.

Comment Definitely (Score 1) 337

I can totally see this. If I drive after about an hour or two playing GTA and I see a cop car, my first instinct is to ram into the cop car, wait for the cop to get out, jump into his car, speed off, find a hooker and sleep with her (killing her promptly after), and repeat.

Comment Prevention perhaps? (Score 1) 164

You can't really prosecute the person responsible for the DDoS attack, for obvious reasons, without spending way more time and resources than it is actually worth. I think that is something we can all agree on. But instead of attempting to receive some form of justice from the incidence, why not take measures from being DDoSed by the same computers. For instance, blocking the mac addresses suspected to be involved in the DDoS which you can acquire from a simple connection log could help prevent. You would have to of course have some way of helping legitimate users regain access to your site but that shouldn't be that big of a hassle. Or you could try to alert the owners of the MAC addresses and tell them that there is reason to believe their system in infected etc.

Slashdot Top Deals

"Your mother was a hamster, and your father smelt of elderberrys!" -- Monty Python and the Holy Grail

Working...