Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Submission + - Enterprise SSDs potentially lose data in a week (ibtimes.co.uk)

Mal-2 writes: From IB Times:

The standards body for the microelectronics industry has found that Solid State Drives (SSD) can start to lose their data and become corrupted if they are left without power for as little as a week. According to a recent presentation (PDF) by Seagate's Alvin Cox, who is also chairman of the Joint Electron Device Engineering Council (JEDEC), the period of time that data will be retained on an SSD is halved for every 5 degrees Celsius (9 degrees Fahrenheit) rise in temperature in the area where the SSD is stored.


Submission + - Proof-of-Concept Linux Rootkit Leverages GPUs for Stealth

itwbennett writes: A team of developers has created a rootkit for Linux systems that uses the processing power and memory of graphics cards instead of CPUs in order to remain hidden. The rootkit, called Jellyfish, is a proof of concept designed to demonstrate that completely running malware on GPUs (graphics processing units) is a viable option. Such threats could be more sinister than traditional malware programs, according to the Jellyfish developers, in part because there are no tools to analyze GPU malware, they said.

Submission + - Congress to SEC: You can't investigate Congress .. (firstlook.org)

An anonymous reader writes: “Communications with lobbyists, of course, are a normal and routine part of Committee information-gathering,” the brief continued, arguing that there “is no room for the SEC to inquire into the Committee’s or Mr. Sutter’s purpose or motives.”

Comment Software industry to blame? (Score 1) 532

With the US having the most expensive 'health care' on the planet, I do find it particularly specious that they find only the programmers to blame. Besides it isn't 'health care' that's to blame but the health insurance' industry. Besides it's in their interest to obfuscate your medical bills. Notice I said expensive, not better ref.

Submission + - Where Can I Download Unix? (unix.com)

gee-nine writes: Unix is a powerful operating system that allows for multi-user environment and is implemented into a few different platforms. Because it is an open source application, you can get it for a small price or for free.

One of the ways to get it is to download it from the Internet. The popularity of Unix can be seen in other operating systems as some of their elements can be found in other operating systems. Among some of the platforms that are based on the Unix system are FreeBSB, OpenBSB, Solaris Unix, Fedora Linux, Debian Linux, and Ubuntu Linux. So where can I download Unix for each of these platforms? If you want to download the FreeBSB Unix operating system, you can look it up at Freebsb.org. This platform was developed in UCLA, Berkeley, and is compatible for x86, amd64, Alpha/AXP, IA-64, PC-98 and Ultras ARC Architecture. Then, where can I download Unix of OpenBSB? You can download it at the Website Openbsb.

org, where you can even choose your preferences. This system is a free, multi-platform operating system that is based on 4.4BSB. Some of the themes that are emphasized by the system are correctness, portability, standardization, and integrated cryptography. It can also sustain binary emulation of programs from SVR4 Solaris, Linux, and to even Sun OS. On the other hand, the Solaris Unix OS can be downloaded at Sun.com.

It is considered one of the best of the Unix environment based systems, as it shows good scalability, performance and security. The Fedora Linux can be downloaded at Fedoraproject.org. It is a general purpose operating system that is made on a public platform, and is favored among open source software development enthusiasts. The Debian Linux can be downloaded at Debian.org. It can be downloaded for free and it uses Linux Kernel, although most of its tools are created from the GNU project, giving it its name Debian GNU/Linux.

It comes with thousands of packages that make the installation process easy. Lastly, you can download the Ubuntu Linux from its Website Ubuntu.com. Ubuntu is a platform based on community open source which can be used on various devices such as desktops, notebooks, and even servers. This platform can be downloaded for free, and you can actually receive a copy of the software for free, depending on where you are located, by the company who came up with it — Canonical. It comes with most of the essential programs like word processors.

Submission + - Cyberlock lawyers threaten security researcher over vulnerability disclosure

qubezz writes: Security researcher Phar (Mike Davis/IOActive) gave his 30 days of disclosure notice to Cyberlock (apparently a company that makes electronic lock cylinders) that he would release a public advisory on vulnerabilities he found with the company's security devices. On day 29, their lawyers responded with a request to refrain, feigning ignorance of the previous notice, and invoking mention of the DMCA (this is not actually a DMCA takedown notice, as the law firm is attempting to suppress initial disclosure through legal wrangling). Mike's blog states:


The previous DMCA threats are from a company called Cyberlock, I had planned to do a fun little blog post (cause i .. hate blog posts) on the fun of how I obtained one, extracted the firmware bypassing the code protection and figured out its "encryption" and did various other fun things a lock shouldn't do for what its marketed as.. But before I could write that post I needed to let them know what issues we have deemed weaknesses in their gear.. the below axe grinderery is the results.

What should researchers do when companies make baseless legal threats to maintain their security-through-obscurity?

Submission + - Rombertik strikes! In 10 seconds, this computer will self-destruct (betanews.com)

Mark Wilson writes: Viruses can be a serious problem and they take myriad forms. Viruses have become increasingly sophisticated over the years, particularly in the methods used to try to evade detection. Now Cisco's Talos security researchers have discovered the Rombertik which goes to extraordinary lengths to avoid analysis.

Researchers managed to reverse-engineer the virus and found "multiple layers of obfuscation and anti-analysis functionality". One sample was found to include code that would destroy the MBR of the host computer if analysis or debugging is attempted.

The effects of a Rombertik can be devastating. Left to its own devices, the malware will sit happily in the background gathering information about online activity, collecting user credentials and feed them back to a remote server. Writing on the Cisco blog, Ben Baker and Alex Chiu explain that while Rombertik's method of propagation — usually through emails and social networks — is nothing out of the ordinary, the way it operates is something from a different league.

Slashdot Top Deals

May Euell Gibbons eat your only copy of the manual!

Working...