Follow Slashdot stories on Twitter


Forgot your password?
Leap Towards a Career in Ethical Hacking with 60+ Hours of Prep Toward CISM, CISA, & More Certification Exams at 95% off ×

Comment Re:all growed up now (Score 1) 109

how long before they use the tactic of releasing false information about a company they dislike simply to crash their share price or worse abuse it to make a small fortune themselves

. You know, they can make a small fortune even by telling the truth. Just sell it short (or have a straw-man sell it short) before releasing the (accurate) news. Actually, I'd be astonished if they didn't...

Comment Re:wait, wut? (Score 2) 134

Being able to look at people you're talking to in real time at a distance is a common sense fantasy; it is quite another thing to figure out how to do it.

If the "how to do it" is important, then please explain why it is infringement if somebody figures out his own way of how to do it. You can't have it both ways. Typically those bogus patents don't event contain a description of the how to do part...

Comment Re:As it should be, false headline. (Score 1) 298

It could very well make more sense economically to not have the resistors...

But what if they wouldn't find an electricity consumer on such short notice? Would then everything blow up? :-)

It certainly is more productive to have someone use the power for _something_, even if it is electric resistive heating or inductive melting rather than just pump it into the atmosphere.

Nice sentiment, but I somehow doubt that the grid company cares more about the environment or humanity's overall good than about their own wallet. By the same reasoning, it is certainly more productive to give unsellable fruit or vegetables to the homeless rather than throwing it into the trash. But supermarkets doing this are still quite rare, and none are actually pay the homeless to take the fruit or vegetables off their hands...

Comment Re:Upload issue? Huh? (Score 3, Informative) 104

What, in your opinion should the upload receiving routines check? In the example, the website would resize profile photos that users upload. One image format would have the possibly to "include" contents that is to be downloaded from someplace else. Imagemagick performs such downloads by handing off that task to wget (or similar tool), which it calls via system(), completely forgetting to santize the URL (... so somebody might append "; rm -rf / to it, or somesuch). How do you propose that the upload routine of the web site catch this, short of parsing the entire image itself? But if it did that, there'd be no point of using an image processing tool at all, because the wrapper would already half done two thirds of the job.

Comment Re:Upload issue? Huh? (Score 2) 104

Err, why is an image processing library doing network uploads anyway?

Reading comprehension, where are you?

The image processing library does just that, process images. In some cases, it processes images that have been uploaded by users to a web site (think Facebook photo albums), and if the user maliciously uploaded a booby-trapped photo, he can now make the website execute commands that were not intended by the site operator...

Comment Nice quick Google bomb :-) (Score 3, Funny) 52

"The extortion emails encourage targeted victims to Google for the Armada Collective," CloudFlare CEO Matthew Prince wrote. "I'm hopeful this article will start appearing near the top of search results and help organizations act more rationally when they receive such a threat."

... and it did: has as a top hit Empty DDoS Threats: Meet the Armada Collective - CloudFlare

Comment They could tell who paid, if they wanted... (Score 1) 52

Given that the attackers can't tell who has paid the extortion fee and who has not,

Theoretically they could. Just set up a different wallet (or bitcoin address, or whatever the correct term is...) to receive the ransom for each potential victim.

But if they don't, and 2 victims compare notes, then it is easy to spot.

Comment Re: Sunds pretty fishy (Score 1, Interesting) 184

[not the original poster, just normal reading comprehension...]
(Probably) what he means is "Apple doesn't support more than 3 buttons on mice, unless it's their own overpriced $75 "magic mouse". Button 4 and 5 could be used (for example) for back and forward in a browser"
(Didn't even know that Macs support mice with more than one button, hehe, so 3 is already a neat progress...)

Slashdot Top Deals

Nothing succeeds like excess. -- Oscar Wilde