Please create an account to participate in the Slashdot moderation system


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Submission + - Where do you host open source projects (for non-developer users)?

StealthHunter writes: I know that github is popular as is Google code, but where do you host open source projects when your primary user base just wants to read webpages and download software? As in, the average person that doesn't want to figure out how to use svn or navigate wiki pages. Google code used to have "downloads" but those have recently been abandoned and github's norm is an awkward "tarball commit" for releases. Is SourceForge really the only option?

Submission + - First major Chinese computer security CTF (hosted by Baidu) (

An anonymous reader writes: Computer and Network security Capture the Flag events have recently gained great popularity. Arguably the most well-known is the contest associated with the annual hacker con: DEFCON. Most other CTFs are mostly English-speaking and held by US or European universities (though South Korea is visibly present in the circuit). Now the search giant Baidu is hosting one in Chinese and there are serious prizes. The affiliated university hosts the first Chinese team to make it to the DEFCON CTF finals.

Submission + - Do you ever wonder where video game characters go when they die? (

StealthHunter writes: Recycled into another game! At least temporarily. That is the basis of continue?9876543210

"You are a dead, failed video game character wandering the recesses of the Random Access Memory, trying to find peace in the final moments of your existence before being deleted forever...."

This game is full of objects and scenarios that have deeper meanings. Can you identify the system bus, the creation of null pointers in the vimeo trailer?

Yes, it runs on Linux (and OSX, IOS, and Windows).

Submission + - Browser user-agent triggered backdoor found in D-Link home routers (

StealthHunter writes: It turned out that just by setting a browsers user-agent to "xmlset_roodkcableoj28840ybtide" anyone can remotely bypass all authentication on D-Link routers. It seems that thttpd was modified by Alphanetworks who inserted the backdoor. Unfortunately, vulnerable routers can be easily identified by services like shodanHQ. At least these models may have vulnerable firmware: DIR-100, DI-524, DI-524UP, DI-604S, DI-604UP, DI-604+, TM-G5240.

Submission + - QR code phishing study demonstrates viability of the attack - users ARE curious! (

StealthHunter writes: QR codes are starting to appear everywhere. The 2D barcode is an easy way to get unauthenticated data into a smartphone, and many apps automatically visit URLs found in QR codes without allowing the user to see the URL first. We attempt to teach users not to click on links, but what about QR codes? A new study shows that people scan QR codes primarily out of curiosity, and that the devices used to scan are unpatched against the latest exploits leaving users fundamentally unprotected.

The work from Carnegie Mellon will be presented at the Workshop on Usable Security in Japan next week. The data collection period strangely correlates with news and Slashdot posts observing such an attack.


Submission + - Mobile Phone Use Patterns Identify Individuals Better Than Fingerprints (

chicksdaddy writes: "Mobile phone use may be a more accurate identifier of individuals than even their own fingerprints, according to research published on the web site of the scientific journal Nature.
Scientists at MIT and the Université catholique de Louvain in Belgium analyzed 15 months of mobility data for 1.5 million individuals who the same mobile carrier. Their analysis, “Unique in the Crowd: the privacy bounds of human mobility” showed that data from just four, randomly chosen “spatio-temporal points” (for example, mobile device pings to carrier antennas) was enough to uniquely identify 95% of the individuals, based on their pattern of movement. Even with just two randomly chosen points, the researchers say they could uniquely characterize around half of the 1.5 million mobile phone users. The research has profound implications for privacy, suggesting that the use of mobile devices makes it impossible to remain anonymous – even without the use of tracking software.

For their research, they studied anonymized carrier data from a “significant and representative part of the population of a small European country.” In the study, the researchers used sample data collected between April 2006 and June 2007. Each time a user interacted with their mobile phone operator network by initiating or receiving a call or a text message, the location of the connecting antenna was recorded, providing both a spatial and temporal data point.
“We show that the uniqueness of human mobility traces is high, thereby emphasizing the importance of the idiosyncrasy of human movements for individual privacy,” the researchers write. Given the amount of information that can be inferred from mobility data, as well as the potentially large number of simply anonymized mobility datasets available, this is a growing concern.”"


Submission + - Study says users (at least a set that thinks about security) prefer Android (

StealthHunter writes: The survey, conducted by av-comparatives, asked 5000 users questions about browsers, mobile OS, etc. "The survey also asked about preferred mobile operating systems and preferred browsers. Android took 51 percent of mobile users, Symbian 17 percent, and iOS/Apple 17 percent. The report notes that the dominance of Android means it will remain the biggest target for malware."

This survey doesn't quite match recent market-share numbers by Neilson which shows 52% Android, 34% iOS, and 8% BlackBerry.

Submission + - Fantastic JS1K submissions (

An anonymous reader writes: With just five days left in the current "write 1kb of JavaScript" competition, the submissions are becoming increasingly impressive. Take for instance a beautiful 3d animation, written in 1k and drawing on a 2d canvas. Or a mine cart animation. If you wait long enough you'll actually get to caves! Can you manage to write a demo that fits on the hall of fame before the deadline closes?

Submission + - T-Mobile ends contracts, ends subsidies.

AlphaWolf_HK writes: In what I see as a refreshing change, T-Mobile, the fourth largest carrier in the USA, has made sweeping changes to its service, with its CEO saying: "Here's the deal: If we suck this month, go somewhere else. If we're good, stay with us." after quietly ending contract plans last weekend. As part of that change, the new base plan will include unlimited access, including voice, text, and data. Data will be restricted to edge speeds after 500GB with no overage costs, but can be upgraded to 2.5GB for $10, or unlimited for $20. Portable wifi hotspot usage is also unrestricted for no additional cost. In addition, LTE services just went live in 8 markets. As is already standard practice with t-mobile, you are free to bring your own device. However, customers won't be fronting the full cost of the phone with unsubsidized plans. Unlike in the past, they'll know exactly what they're paying for the phone by means of interest free installments, and paying off the phone is an option at any time. Oh, and they're also offering the iphone 5 next month for $650. Or, you can do as I did and drop a cool $300 on a Nexus 4 directly from google, which unofficially works with t-mobiles LTE.

Slashdot Top Deals

Technological progress has merely provided us with more efficient means for going backwards. -- Aldous Huxley