Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment Re:Well that was the intention of the virus (Score 2) 189

It also uses (i believe) 4 windows specific 0 day hacks. Usually a 'common' virus writer uses only one, because you can use the other 3 to make 3 more viruses. It really shows these people REALLY wanted this to work. and for it to infect as many systems as it could before caught and stopped. Siemens can sell to whomever they want. Iran can use those controllers for making plush teddy bears just as easily as for nuclear refinement. And the command/control servers for the virus were taken offline a while ago, so no-one holds the keys to deactivating virus anymore.

Comment Well that was the intention of the virus (Score 1) 189

Everyone is pretty sure Stuxnet was targeting Iranian nuclear centrifuges, it was a well build virus that did its creators job well. The team who created it did their research, and figured this was the best stab at slowing the Iranian nuclear processing. Just goes to show good planning/funds and smart programmers can do significant damage to some secure facilities.
Google

Submission + - Google Market Trademark Violations: Buyers Beware (geb-dev.de)

An anonymous reader writes: A couple months ago, I purchased a spiffy little application for a buck or two on the Android Marketplace that allowed me to control my Winamp client via Wifi on my home network. It was actually a fantastic app. However, upon flashing my phone to an updated rom and reinstalling my apps, I noticed my remote app was missing.

Low and behold, the app was ganked from the marketplace by Google as the app developer has apparently used the name "Winamp" in the title of the app. (aWinampRemote). No refund. No warning. No nothing.

I'm not really upset about the matter, because life goes on and inevitably, shit happens. But it made me wonder. What now? The developer could upload the app named as something else, but that would require all his users to download the new version to receive automated updates, and users who purchased the pro version are likely looking at another fee. Google is unlikely going to let him resume or rename the old app due to the lock.

So what now, Google / Developer? What now?

I'm just throwing this out there, and I'm open to suggestions. Are buyers responsible for developers mistakes?

Just curious.

Censorship

Submission + - Anonymous' new WikiLeaks strategy (geekosystem.com)

An anonymous reader writes: With “Operation: Leakspin,” a faction of Anonymous has vowed to further WikiLeaks’ original cause by shifting attention away from revenge tactics and back to the leaked US diplomatic cables.

Anonymous' call to arms:
Operation: Leakspin

Begin searching through Wikileaks. Find only the best, least exposed leaks you can get your hands on. Post summaries of them, along with the complete source. Encourage the reader to read more. Make one-to-two-minute YouTube videos reading the leaks. Use misleading tags, everything from “Tea Party” to “Bieber”. Post snippets of the leaks EVERYWHERE. News comments, fan forums, etc.

Making blanket statements about Anonymous that refer to it as a cohesive entity are almost always wrong-headed — As TechDirt’s Mike Masnick observes, it’s the definition of a “distributed and open system” online — but the emergence of this strain of thought in Anonymous is almost certainly a turn for the better.

Facebook

Submission + - Facebook Debuts Hacker Cup Contest (threatpost.com) 1

Trailrunner7 writes: Social networking Web site Facebook has announced that they will begin accepting registrations for the 2011 Hacker Cup, the first annual programming and puzzle solving contest open to software engineers, programmers, puzzle solvers and assorted hackers from around the world.Facebook said this week that registration for the multi-round contest, which was first announced in August, would begin on December 20. The company is planning three online rounds of puzzle solving in January, on the way to the world finals taking place at Facebook Headquarters in Palo Alto, California in March.

Submission + - Android phones get virtualization treatment (networkworld.com)

bednarz writes: "VMware is teaming with LG to sell Android smartphones that are virtualized, allowing a single phone to run two operating systems, one for business use and one for personal use. A user’s personal email and applications would run natively on the Android phone, while a guest operating system contains the employee’s work environment. The devices would also have two phone numbers."
Security

Submission + - Is Anyone in Control of Cloud Security? (net-security.org)

Orome1 writes: Safeguarding the IT infrastructure from unmonitored access, malware and intruder attacks grows more challenging as the operation evolves for cloud service providers. And as a cloud infrastructure grows, so too does the presence of unsecured privileged identities – those so-called super-user accounts that hold elevated permission to access sensitive data, run programs, and change configuration settings on virtually every component of IT. Left unsecured, privileged accounts leave an organization vulnerable to IT staff members who have unmonitored access to sensitive customer data and can change configuration settings on critical components of your infrastructure through anonymous, unaudited access. One of the largest challenges for cloud service customers inside and outside of government is attaining transparency into how public cloud providers are securing their infrastructure. How are your identities being managed and secured?

Submission + - Tooth decay enzyme identified, targeted (wired.co.uk)

Lanxon writes: Biologists have identified the enzyme that's responsible for dental plaque sticking to teeth, and hope to soon identify substances that'll inhibit it, potentially leading to substances that fight tooth decay, reports Wired. The interesting part comes when the researchers discuss inhibiting that enzyme — meaning that the bacteria is unable to attach to the tooth enamel, potentially eradicating plaque.

Comment Nothing Is Free (Score 4, Interesting) 172

Allow me to be one of the 'younger folk'. I agree that it can get damn annoying sometimes, flash advertisements and popup-spam come to mind. But in the end making, hosting, and maintaining a website does cost money. And no service is free. Instead of paying with your money, you pay for websites with your attention. If the 'cost' of privacy violation is too high (facebook), I wont participate. However if the service provided is useful and the adds/privacy isn't too bad (Google, Slashdot, etc.) I'll participate. I think the Canonical COO has a point, we as end consumers don't usually think about the people who have to fund the hardware that makes the web possible. I certainly hope their is some money to be made in the computer industry, or all this money I paid for college will be moot.
Piracy

Submission + - Apple to be sued for piracy over the iPad (google.com)

mentus writes: Brazilian company Transform has obtained a search and seizure order for the iPads being sold by major retailer FastShop in Brazil over alleged piracy of Tranform's own i-Pad: Intelligent Public Access Defibrillator, a portable defibrillator. Transform filled the registration forms with INPI (Patent and Trademark Agency) in 2007 and was granted the right to use the name in January of the current year. Apple is trying to invalidate Transform's licence over the name alleging a similarity between i-Pad and their own iPod trademark.
Patents

Submission + - Apple vs. Android: The Patent Battlemap

An anonymous reader writes: Fortune/CNN.com reports on a slideshow of the escalating conflict between Apple and Android smartphone makers Motorola and HTC. Fortune says the 25-page PDF document is,"as far as we know, the clearest and most definitive map of the patents involved in the disputes" and that large parts of it "have the look of silicon chip architecture drawings." While other charts show all the companies involved in the numerous disputes, the "Apple vs. Android" diagram shows only three litigants but also lists all the patents and courts.

Comment Re:Next up (Score 5, Insightful) 366

"Day by day and almost minute by minute the past was brought up to date. In this way every prediction made by the Party could be shown by documentary evidence to have been correct; nor was any item of news, or any expression of opinion, which conflicted with the needs of the moment, ever allowed to remain on record." ~ 1984 by George Orwell

Comment Microsoft Certification (Score 1) 87

Its great to see that Open Source applications are being reconized by Microsoft. I just hope people don't take these certifications too seriously. I don't have experience in an enterprise setting, but do companies not use a certain software because its not certified my Microsoft? I would assume that the software that best suits your needs would be chosen, not the one that has the title of "Microsoft Certified" because it happened to be tested by third-party tests.

Submission + - SPAM: Anonylink - newest concept in anonymous dating

An anonymous reader writes: This is a new dating site. It's very cool coz it's anonymous and people are connected through email. So once you enter your simple details, it finds you a match and then you and your match can both email match@anonylink.com and communicate anonymously! It's awesome
Link to Original Source

Slashdot Top Deals

Unix will self-destruct in five seconds... 4... 3... 2... 1...

Working...