Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Compare cell phone plans using Wirefly's innovative plan comparison tool ×
Security

Submission + - Hey Verizon, Why is my WEP Key my MAC Address? (wordpress.com) 2

A complete newb writes: WEP can be cracked in a few minutes with the right tools. But why bother trying to crack it when Verizon sets the default WEP key to the Access Point's MAC address? All you need is the right card in monitor mode and you can get all your neighbors WEP keys. The access point that comes with Fios has the capabilities for WPA but few people bother to change the default settings. With the gaining popularity of Verizon FiOS, customers could be faced with the increased possibility of personal data being stolen from their PC or having their broadband connection hijacked.
Microsoft

Submission + - Microsoft threatens startups over account info (cnn.com)

HangingChad writes: According to Fortune, there are reports that Microsoft is trying to strong arm startups to give preferential treatment to MSN Messenger and are using account information as leverage. "If the company wants to offer other IM services (from Yahoo, Google or AOL, say), Messenger must get top billing. And if the startup wants to offer any other IM service, it must pay Microsoft 25 cents a user per year for a site license." Of course, if the company is willing to use Messenger exclusively "fee will be discounted 100 percent." Getting detailed information is difficult as many of the companies being approached are afraid of reprisals.
Security

Submission + - New Tool Automates Webmail Account Hijacks (washingtonpost.com)

An anonymous reader writes: A pair of software tools demonstrated at the Black Hat security conference today automate the interception of cookie files transmitted over a wireless network that allow attackers to hijack accounts for Gmail, Hotmail, Facebook and a number of other Web 2.0 services, washingtonpost.com's Security Fix reports. From the story: "the attack works even if victims subsequently change their passwords, or actively sign out of their accounts. However, attackers would be unable to change the victim's password, as all of the above-named services force the user to reenter the current password before changing it to a new one."
Software

Submission + - a real telemarketer filter

hate-those-telemarketers writes: I just had one of those telemarketers call me despite being on the do-not-call list. There's still organizations that don't need to adhere to that list. Having googled the caller-id I came accross http://www.whocalled.us/ that seems to be a very comprehensive database of annoying caller-id's calling. What's even better is that in the "about" tab there's a script for asterisk to check all calls against that database. This is like a IP-list for spammers only for real telephony. Fantastic. I've implemented this and now I wish I weren't on the do-not-call list to see telemarketers deal with the very annoying Telemarket torture script that can be found on this site: http://www.voip-info.org/wiki/view/Asterisk+Telema rketer+Torture woo-hoo!!!

Slashdot Top Deals

The person who can smile when something goes wrong has thought of someone to blame it on.

Working...