Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment They can just do it the same way they do now ... (Score 2) 58

"Users rarely visit their privacy settings, so Facebook will need to devise a way to get them to do so."

Easy! They can do it the same way they do now - tell one person so they update their status with "Do this or Facebook will delete your account! Re-post!!" and it'll spread like wildfire ...

I mean, those are always legit communications from Facebook staff, right?

China

Submission + - China builds 1-petaflop homegrown supercomputer (extremetech.com)

MrSeb writes: "Drawing yet another battle line between the incumbent oligarchs of the West and the developing hordes of the East, China has unveiled a new supercomputer that uses entirely-homegrown processors — 8,704 of them, to be exact. The computer is called Sunway BlueLight MPP and it has a peak performance of just over 1 petaflop — or around the 15th fastest supercomputer in the world. Sunway uses the ShenWei SW-3 1600, a 16-core, 64-bit MIPS-compatible (RISC) CPU. The process used to make the chips is not known, but it is likely 65 or 45nm, a few generations behind Intel’s latest and greatest. Each of the 139,264 cores runs at 1.1GHz, the entire system has 150TB of memory and 2PB of storage, and of course it’s water-cooled. The ShenWei chips are based on the Loongson/Godson architecture, which China — as in, the country itself — probably reverse engineered from a DEC Alpha CPU in 2001 and has been developing ever since. Sunway is significant for two reasons: a) It's very low-power; it consumes just one megawatt, about half of its contemporaries and one seventh of the US's Jaguar — and b) This is China's first significant supercomputer to be built without Intel or AMD processors."

Comment Yay! 40 MHz N channels! (Score 1) 358

While cell phones not working in my house would be a little irritating, I would be very happy to have radio blocking on the outside walls - sure I couldn't use my wireless in the garden, but neighbors and passers-by wouldn't be able to use it either ... AND, most important of all, it would block out my neighbor's networks which would allow my AP to actually use 40 MHz channels and give me closer to the advertised speeds!

Submission + - Canon's image verification system cracked (h-online.com)

TJNoffy writes: The H Security's H-online reports that "Hacker Dmitry Sklyarov has succeeded in extracting the secret signing key from numerous digital SLR cameras and has used it to sign modified images which Canon's latest OSK-E3 security kit verifies as legitimate. Canon's Original Data Security System is intended to show whether changes have been made to photographs and to verify date and location information.

The system is primarily used for ensuring the integrity of evidence, for reporting accidents and for construction records. The system is also useful for allowing news agencies to determine whether images have been modified. Sklyaro informed Canon of the vulnerability back in September, but has received no response from the camera manufacturer."

Microsoft

Submission + - Researchers Bypass IE Protected Mode (threatpost.com)

Trailrunner7 writes: A new paper from researchers at Verizon Business identifies a method through which an attacker can bypass Internet Explorer Protected Mode and gain elevated privileges once he's successfully exploited a bug on the system. Protected Mode in Internet Explorer is one of a handful of key security mechanisms that Microsoft has added to Windows in the last few years. It is often described as a sandbox, in that it is designed to prevent exploitation of a vulnerability in the browser from leading to more persistent compromise of the underlying system. Protected Mode was introduced in Windows Vista and Internet Explorer 7, and other software vendors have followed Microsoft's lead, introducing sandboxes in applications such as Adobe Reader X and Google Chrome.

In their research, the Verizon Business team found a method that, when combined with an existing memory-corruption vulnerability in the browser, enables an attacker to bypass Protected Mode and elevate his privileges on the compromised machine. The technique enables the attacker to move from a relatively un-privileged level to one with higher privileges, giving him complete access to the logged-in user's account.

Slashdot Top Deals

As you will see, I told them, in no uncertain terms, to see Figure one. -- Dave "First Strike" Pare

Working...