Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

Comment Yay, Apple (Score 1) 96

Important to understand that due to Apple's restrictions, this is not a port of the Gecko engine to iOS. It simply embeds a Safari's UIWebView into Firefox's 'skin'. Same goes for Chrome on iOS. Furthermore, Apple uses unexposed JavaScript optimizations to make Safari faster and doesn't allow those same optimizations in a UIWebView embedded in third party apps. So, unfortunately, Safari will always be the fastest browser on iOS. Yay, Apple. http://www.extremetech.com/mob... http://www.engadget.com/2011/0...

80% of Browsers Found To Be At Risk of Attack 196

CWmike writes "About eight out of every 10 Web browsers run by consumers are vulnerable to attack by exploits of already-patched bugs, a security expert said Thursday. The poor state of browser patching stunned Wolfgang Kandek, CTO of Qualys, which presented data from the company's free BrowserCheck service Wednesday at RSA. 'I really thought it would be lower,' Kandek said. BrowserCheck scans Windows, Mac and Linux machines for vulnerable browsers, as well as up to 18 browser plug-ins, from Adobe's Flash to Windows Media Player. When browsers and plug-ins are tabulated together, between 90% and 65% of all consumer systems scanned with BrowserCheck since June 2010 reported at least one out-of-date component. In January 2011, about 80% of the machines were vulnerable. The most likely plug-in to require a patch: same as last year, Oracle's Java."

Comment Re:oh, it's a troll (Score 1) 174

Sometimes when I'm trying to just find out how good of bandwidth a server has, I just wget some random giant file that's freely available on a big server. Windows Service Packs meet that requirement.

Comment Re:Market share (Score 2, Informative) 481

I've had several times where I'm testing a site in IE6, find a bug or quirk, then press Ctrl-N to open a new IE6 window, and browse to W3C (or other web development related site) to find a reference to that particular element and determine its compatibility with the browser I'm currently in. I'd say that's pretty common.
Windows

Vista Named Year's Most Disappointing Product 842

Shadow7789 writes "No surprise here, but to complete its humiliation, PC World has declared that Windows Vista is the most disappointing product of 2007. Quoting: 'Five years in the making and this is the best Microsoft could do?... No wonder so many users are clinging to XP like shipwrecked sailors to a life raft, while others who made the upgrade are switching back. And when the fastest Vista notebook PC World has ever tested is an Apple MacBook Pro, there's something deeply wrong with the universe.'"

Comment Infinite loop (Score 0) 565

Report them to themselves for ratting out rats. When they add that to their database, they'll be guilty of ratting themselves out for ratting out rats, which means they need to add another entry to their database...

Just don't tell them I sent you.

Censorship

Censoring a Number 1046

Rudd-O writes "Months after successful discovery of the HD-DVD processing key, an unprecedented campaign of censorship, in the form of DMCA takedown notices by the MPAA, has hit the Net. For example Spooky Action at a Distance was killed. More disturbingly, my story got Dugg twice, with the second wave hitting 15,500 votes, and today I found out it had simply disappeared from Digg. How long until the long arm of the MPAA gets to my own site (run in Ecuador) and the rest of them holding the processing key? How long will we let rampant censorship go on, in the name of economic interest?" How long before the magic 16-hex-pairs number shows up in a comment here?
XBox (Games)

Xbox Hypervisor Security Protection Hacked 232

ACTRAiSER writes "A recent Post on Bugtraq claims the hack of the Xbox 360 Security Protection Hypervisor. It includes sample code as well." From Bugtraq "We have discovered a vulnerability in the Xbox 360 hypervisor that allows privilege escalation into hypervisor mode. Together with a method to inject data into non-privileged memory areas, this vulnerability allows an attacker with physical access to an Xbox 360 to run arbitrary code such as alternative operating systems with full privileges and full hardware access."

Slashdot Top Deals

Long computations which yield zero are probably all for naught.

Working...