Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?

Submission + - HTTP is "broken" with critical DDOS flaw, say rese (darkreading.com)

huzur79 writes: Researchers from Proactive Risk, an IT security firm, will demonstrate at an upcoming application security conference a systemic flaw in the HTTP protocol that can easily be exploited through online gaming and other activities into distributed denial-of-service (DDOS) attacks that can flood web servers — even through secure connections — with very slow "POST" traffic that is difficult to distinguish from legitimate traffic, making it hard to prevent.

The demonstration will come November 8th at the OWASP 2010 conference in Washington DC and is led by researcher Wong Onn Chee, who first discovered the attack last year in Singapore, according to a report from Dark Reading, a security-focused web site. The technique can crash both IIS and Apache servers using either HTTP or HTTPS protocols, and could conceivably affect anything using a web connection, including SSL, VPN and other "more secure" systems.


Comment Re:Testing Slashdots Methods for Anonymization (Score 3, Funny) 36

There are many bits of information we can glean!
  1. Your "anonymous" name, #34103516
  2. Date and Time: (Tuesday, November 02 @ 6:04PM)
  3. You were one of the first posts so you probably read Slashdot often. Also, you probably visit Slashdot regularly around 6:00 PM.
  4. Writing Style: Short messages, funny

    So I could search for regular Slashdot users who tend to be active around 6:00 PM, post brief messages, and are often one of the first to comment. Narrow down that list to users who actually did log in on 11/02/2010. Since, we know that you did read this article there is also a decent chance that you commented on this article with your actual user name.

    We will find you!

Comment Re:Solving a different problem (Score 1) 394

Whoops, you are correct. Euclidean Traveling Salesman is NP-Complete. I missed an important reference (http://portal.acm.org/citation.cfm?id=290179.290180) when I was reading about the Euclidean Traveling Salesman Problem.

I had been thinking of a scheme where you essentially would add a tunnel between each pair of flowers, and artificially constrain the paths so that the bees have to travel through the tunnels. You could then artificially make the lengths of some of the tunnels longer than others. However, because ETSP itself is NP-Complete we could reduce factoring to ETSP directly.

I would agree that there could potentially a few useful heuristic's for ETSP that we could learn from the bees, but I highly doubt that any of these heuristics will actually allow us to solve the really hard instances.

Comment Re:Solving a different problem (Score 1) 394

Besides this, there are several other problems with the claim that bees can solve the Traveling Salesman Problem (TSP). The experiments actually show that bees can solves some 'average' instances Euclidean Traveling Salesman Problem (ETSP).
  1. 1. Euclidean Traveling Salesman is probably not NP-Complete.
  2. 2. In fact there is a PTAS (polynomial time approximation scheme) for ETSP so the bees could be computing approximate solutions to ETSP.
  3. 2. Even if we were solving the standard TSP we are only solving it for 'average' case instances. Just because you can solve 'average' case instance doesn't mean you can solve arbitrary instances. With a few exceptions 3-SAT solvers tend to work well for many 'average' case instances.

    I propose a new experiment:
    1. 1. We can pick a hard cryptographic problem (say factoring a number N). We can take our specific instance N from some large public RSA key.
    2. 2. We can easily reduce factoring to TSP to get some specific TSP instance T. This ensures that we pick a hard TSP instance (either that or factoring N and breaking RSA wasn't that hard in the first place). Note that these distances are not necessarily Euclidean!
    3. 3. Add a flower for each vertex in T
    4. 3. Artificially constrain the pathways between flowers so that only direct path between two flowers has distance corresponding to the length of this edge in T.
    5. 4. See what solutions the bees find now.
    6. 5. If the bees do actually find the optimal TSP solution to T then we can use this solution to easily recover the factors of N.

Comment Breaking RSA (Score 1) 394

I would suggest the following experiment:
  1. 1. Pick the RSA key (N=pq) for some large company (say ebay)
  2. 2. Reduce the problem of factoring N into a traveling salesman instance.
  3. 3. Let bees find the solution to traveling salesman instance.
  4. 4. Recover p,q from this solution
  5. 5. Profit

Comment Re:What would the impacts of this be for cryptogra (Score 1) 457

Probably, but in reality people have constructed crypto schemes from slightly stronger assumptions (like existence of trapdoor, one way functions, etc). I don't think anyone has ever created a crypto scheme which would be provably NP-hard to break (ie, an efficient algorithm to break the crypto scheme would yield an efficient algorithm to solve any NP-complete problem). This is an open question. One challenge is that P!=NP says that some problem instances are hard, but for crypto you can't just say that some messages are hard to crack. You have to say that "all encrypted messages" (more realistically all but a "negligible fraction" of encrypted messages) are hard to break.

Comment Re:this is going to create history (Score 4, Interesting) 457

IMO, The P vs NP is fundamentally more tricky than other famous theorems/conjectures (like FLT), because on some level it is a statement about mathematics itself. The assumption that P != NP on some level implies that the finding mathematical proofs is difficult. This means that if P!=NP it may be even more difficult to prove that P!=NP. It has been shown that assuming one-way functions exist (this would imply P!=NP easily enough) that a certain type of proof called "natural proofs" can never be used to separate P from NP.

On the flip side, showing P = NP could be easier, but most people believe this is false, since it would mean that there is essentially one "master algorithm" that can solve any problem in NP efficiently.

The current state of computational complexity theory is that we are no where close to resolving P!=NP, that is unless this proof actually checks out. Honestly, we can't even settle "easier" questions like P vs PSPACE. The implications of a correct proof would be absolutely mind blowing.

Comment Re:'limousine liberalism' (Score 1) 589

I would agree with you that money spent on R & D is not money wasted, but I think the EV/Computers analogy breaks down in several ways.

First, Moore's law will not necessarily apply to the development of battery technology. Moore's law has been amazing and awesome. In my humble opinion one of the major forces behind this rapid growth in the speed of the processor was the processor itself. It would be very difficult to design a chip by hand, but once you have a processor to run some optimizations automatically and build a better chip. Of course once you've built a more powerful processor you can use it to help design even better chips etc... I don't see how this cycle would apply to batteries....

I personally think that R & D is never wasted (unless we know for certain that we can't achieve the goal). Maybe the new technology will drive down the cost of EV's while making them more convenient, maybe it won't. Even if it doesn't we still may end up developing new technologies in other areas. I say its worth it.

Comment Re:So? (Score 1) 691

If you look at the judicial watch report, it is clear that the judge (or close family members) had many more investments. So it seems that not too much of the judge's livelihood depended on the oil investments. Still though, you would hope that the judges personal holdings didn't influence the judge's decision in any way.

Submission + - Judge limits DHS laptop border searches (cnet.com)

An anonymous reader writes: A federal judge has ruled that border agents cannot seize a traveler's laptop, keep in locked up for months, and examine it for contraband files without a warrant half a year later. The ruling apparently says searches at the border are permissible, but that a warrant is required to seize the device for later examination.

Submission + - 02 Scraps Unlimited Data Usage for Smart-Phones (bbc.co.uk)

Jagjr writes: UK phone network O2 has scrapped unlimited data downloads for smartphone customers.

All new and upgrading customers will have their usage capped at between 500 Megabytes (MB) and one gigabyte (GB) depending on their monthly tariff.

Analysts said the move was "inevitable" as more and more consumers switch to data-intensive smartphones that can surf the web and show video.

Other networks are likely to follow O2, they said.

Submission + - Adobe Flash Player 10.1 Released. Win, Mac, Linux (tekgoblin.com)

LordDfg writes: After a long wait, Adobe has finally released the Flash Player 10.1, which offers GPU Acceleration. If you have a Graphic Card [Nvidia 8400+/ATI HD Series] which supports DXVA2[Directx Video Accleration] it will accelerate flash content using it (Less load on the CPU). If you have a low end system and playing youtube HD videos is nearly impossible this simple update will make your life easier. No need for Core2Duo processor to enjoy High Defination Content on the InternetInternetInternet. Btw it also accelerates flash games. In short, anything that uses Flash will offload all the processing to the GPU.

Submission + - Adobe Forgoes Securefix For Flash 10 Goes To 10.1

An anonymous reader writes: The recent critical zero-day security flaw in Flash 10 has fast-tracked the release of Flash 10.1 today.

Flash 10.1 boasts the much anticipated H.264 hardware acceleration. Except for Linux and Mac OS:

Flash Player 10.1, H.264 hardware acceleration is not supported under Linux and Mac OS. Linux currently lacks a developed standard API that supports H.264 hardware video decoding, and Mac OS X does not expose access to the required APIs.

For me, your humble anonymous reporter, who is using Fedora Linux with a ATI IGP 340M, is very pleased that the developers of the OSS drivers have provided hardware acceleration for my GPU: "glxinfo : direct rendering: Yes", "OpenGL renderer string: Mesa DRI R100 (RS200 4337) 20090101 NO-TCL DRI2" but even if Adobe did provide Hardware acceleration H.264 on Linux, they would'nt provide it for me because they disable it for GPU's with SGI in the Client vendor string.

Adobe 10.1, with all its goodness, now gives me around 95% CPU usage as aposed to about 75% with the previous release. Good times. I anticipate my windows friends will have a much better experience.

Slashdot Top Deals

Children begin by loving their parents. After a time they judge them. Rarely, if ever, do they forgive them. - Oscar Wilde