Follow Slashdot stories on Twitter


Forgot your password?

Comment Re:So Cool... (Score 1) 166

I had a Cisco switch and an embedded Linux appliance that needed less than a week to reach the 5 years uptime. Unfortunately a fire broke in the building they were hosted in and the fire brigade had to cut the power. I was prepared to take a screenshot with "show ver" and "uptime" outputs ...

Submission + - Key Stroke Logger - Source Code ( 2

_16s writes: I wrote a passive key stroke logger (back in 2007) called 16k to demonstrate how these type of key stroke loggers work. No one has ever paid it much attention, until yesterday when several anti-keylogging softwares discovered it and realized that their software did not detect it. Since that time, my hosting provider has received multiple abuse notices and take-down requests that I have had to respond to and a few DNS services have blacklisted my domain names (clear cloud dns). My source code and binaries are GPG signed, authenticode signed and MD5'ed and have not changed for more than a year. They've been available for download for many years. And now, all of a sudden, out of the blue they are labeled as malware. I had a small degree of respect for commercial security before this, but now I have none. It seems Security Theater and morons are in charge of companies claiming to make the Web safe. I was hoping /. would help me get the word out.

Slashdot Top Deals

I judge a religion as being good or bad based on whether its adherents become better people as a result of practicing it. - Joe Mullally, computer salesman