Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
Security

English Shell Code Could Make Security Harder 291

An anonymous reader writes to tell us that finding malicious code might have just become a little harder. Last week at the ACM Conference on Computer and Communications Security, security researchers Joshua Mason, Sam Small, Fabian Monrose, and Greg MacManus presented a method they developed to generate English shell code [PDF]. Using content from Wikipedia and other public works to train their engine, they convert arbitrary x86 shell code into sentences that read like spam, but are natively executable. "In this paper we revisit the assumption that shell code need be fundamentally different in structure than non-executable data. Specifically, we elucidate how one can use natural language generation techniques to produce shell code that is superficially similar to English prose. We argue that this new development poses significant challenges for in-line payload-based inspection (and emulation) as a defensive measure, and also highlights the need for designing more efficient techniques for preventing shell code injection attacks altogether."
Google

Google To Send Detailed Info About Hacked Web Sites 58

alphadogg writes "In an effort to promote the 'general health of the Web,' Google will send Webmasters snippets of malicious code in the hopes of getting infected Web sites cleaned up faster. The new information will appear as part of Google's Webmaster Tools, a suite of tools that provide data about a Web site, such as site visits. 'We understand the frustration of Webmasters whose sites have been compromised without their knowledge and who discover that their site has been flagged,' wrote Lucas Ballard on Google's online security blog. To Webmasters who are registered with Google, the company will send them an email notifying them of suspicious content along with a list of the affected pages. They'll also be able to see part of the malicious code." Another of the new Webmaster Tools is Fetch as Googlebot, which shows you a page as Google's crawler sees it. This should allow Webmasters to see malicious code that bad guys have hidden on their sites via "cloaking," among other benefits.
Books

100 Years of Copyright Hysteria 280

Nate Anderson pens a fine historical retrospective for Ars Technica: a look at 100 years of Big Content's fearmongering, in their own words. There was John Philip Sousa in 1906 warning that recording technology would destroy the US pastime of gathering around the piano to sing music ("What of the national throat? Will it not weaken? What of the national chest? Will it not shrink?"). There was the photocopier after World War II. There was the VCR in the 1970s, which a movie lobbyist predicted would result in tidal waves, avalanches, and bleeding and hemorrhaging by the music business. He compared the VCR to the Boston Strangler — in this scenario the US public was a woman home alone. Then home taping of music, digital audio tape, MP3 players, and Napster, each of which was predicted to lay waste to entire industries; and so on up to date with DVRs, HD radio, and HDTV. Anderson concludes with a quote from copyright expert William Patry in his book Moral Panics and the Copyright Wars: "I cannot think of a single significant innovation in either the creation or distribution of works of authorship that owes its origins to the copyright industries."
Linux

According to Linus, Linux Is "Bloated" 639

mjasay writes "Linus Torvalds, founder of the Linux kernel, made a somewhat surprising comment at LinuxCon in Portland, Ore., on Monday: 'Linux is bloated.' While the open-source community has long pointed the finger at Microsoft's Windows as bloated, it appears that with success has come added heft, heft that makes Linux 'huge and scary now,' according to Torvalds." TuxRadar provides a small capsule of his remarks as well, as does The Register.
Government

FCC Backs Net Neutrality, Chairman's Full Speech Posted 270

ArmyofGnomes writes "FCC chairman Julius Genachowski delivered Monday on President Obama's promise to back 'net neutrality' — but he went much further than merely seeking to expand rules that prohibit ISPs from filtering or blocking net traffic by proposing that they cover all broadband connections, including data connections for smartphones. Genachowski stated: 'I understand the Internet is a dynamic network and that technology continues to grow and evolve. I recognize that if we were to create unduly detailed rules that attempted to address every possible assault on openness, such rules would become outdated quickly. But the fact that the Internet is evolving rapidly does not mean we can, or should, abandon the underlying values fostered by an open network, or the important goal of setting rules of the road to protect the free and open Internet. ... In view of these challenges and opportunities, and because it is vital that the Internet continue to be an engine of innovation, economic growth, competition and democratic engagement, I believe the FCC must be a smart cop on the beat preserving a free and open Internet.'"
Programming

Who Wants To Be a Billionaire Coder? 318

theodp writes "Computerworld reports that 60-year-old billionaire John Sall still enjoys cranking out code as the chief architect of JMP ('John's Macintosh Project'), the less-profitable-but-more-fun software from SAS that's used primarily by research scientists, engineers, and Six Sigma manufacturing types. 'It's always been my job to be a statistical software developer,' explains SAS co-founder Sall. So if you didn't have to work — and had more money than George Lucas and Steven Spielberg — would you be like Sall and continue to program? And if so, what type of projects would you work on?"
The Internet

Meet Uzbl — a Web Browser With the Unix Philosophy 318

DigDuality writes "Dieter@be over at Arch Linux forums, a release engineer for Arch Linux, got inspired by this post. The idea? To create a browser based on the Unix philosophy: 'Write programs that do one thing and do it well, programs that work well together, programs to handle text streams because that is a universal interface,' among other points. The result? A fast, low-resource browser named Uzbl, based on WebKit, which passes the Acid3 Test with a perfect score. The browser is controlled (by default) by vim-like keybindings, not too dissimilar to vimperator for Firefox. Things like URL changing, loading/saving of bookmarks, saving history, and downloads are handled through external scripts that you write (though the Uzbl software does come with some nice scripts for you to use). It fits great in a tiling window manager and plays extremely well with dmenu. The learning curve is a bit steep, but once you get used to it, it's smooth sailing. Not bad for alpha software. Though built for Arch, it has been reported to work on Ubuntu."
Graphics

Open Source Camera For Computational Photography 167

David Orenstein writes "Stanford Computer Science researchers are developing Frankencamera, an open source, fully programmable and finely tunable camera that will allow computational photography researchers and enthusiasts to develop and test new ideas and applications — no longer limited by the features a camera manufacturer sees fit to supply. Disclosure: The submitter is a science writer for Stanford and wrote the linked article."
Networking

Submission + - twIP - an IP Stack in a Tweet (www.sics.se)

Adam Dunkels writes: "Inspired by the Twitter-sized program that crashes Mac OS X, I just wrote a really, really rudimentary IP stack called twIP, small enough to fit in a Twitter tweet. Although twIP is very far away from a real IP stack, it can do the first task of any IP stack: respond to pings. The entire source code can be found in this 128 characters long tweet. For those who are interested in low-level network programming, a code walkthrough with instructions on how to run the code under FreeBSD is available here. The FAQ: Q: why? A: for fun."
OS X

Submission + - The Story of a Simple and Dangerous Kernel Bug

RazvanM writes: "At the beginning of this month the Mac OS X 10.5.8 closed a kernel vulnerability that lasted more than 4 years, covering all the 10.4 and (almost all) 10.5 Mac OS X releases. This article presents some twitter size programs that trigger the bug. The mechanics are so simple that can be easily explained to anybody possessing some minimal knowledge about how operating systems works. Beside being a good educational example this is also a scary proof that very mature code can still be vulnerable in rather unsophisticated ways."
Operating Systems

Submission + - A Visual Expedition Inside the Linux File Systems (jhu.edu)

RazvanM writes: "This is an attempt to visualize the relations between the Linux File Systems through the eyes of the external symbols their kernel modules use. An initial plot was presented before but this time the scope is much broader. The analysis is done on 1377 kernel modules from 2.6.0 to 2.6.29 but there is also a small dip in the BSD world. The most thorough analysis is done on Daniel Phillips's tree which contains the latest two disk-based file systems for Linux: tux3 and btrfs. The main techniques used to established relations between file systems are hierarchical clustering and phylogenetic trees. Some other things that are presented include a set of rankings based on various properties related to the evolution of the external symbols from one release to another and complete timelines of the kernel releases for Linux, FreeBSD, NetBSD and OpenBSD. In total there are 78 figures and 10 animations. Happy viewing and commenting!"
Software

Submission + - The hairy state of Linux filesystems

RazvanM writes: "Do the OSes really shrink? Perhaps the user space (MySQL, CUPS) is getting slimmer, but how about the internals? Using as a metric the number of external calls between the filesystem modules and the rest of the Linux kernel I argue that this is not the case. The evidence is a graph that shows the evolution of 15 filesystems from 2.6.11 to 2.6.28 along with the current state (2.6.28) for 24 filesystems. Some filesystems that stand out are: nfs for leading in both number of calls and speed of growth; ext4 and fuse for their above-average speed of growth and 9p for its roller coaster path."

Slashdot Top Deals

You can't cheat the phone company.

Working...