Forgot your password?
typodupeerror

Comment hacker behavior (Score 1) 37

The article lists a number of actions that the hacker shall not do. Most are to be expected, such as not modifying the system, not bringing it down, not exposing private information. The first and last points in the list are strange though:

  • Not using social engineering to gain access
  • Not using brute forcing to gain access

Eh? Why are these not valid attack vectors?

The Military

Hacking Nuclear Command and Control 256

The Walking Dude writes "The International Commission on Nuclear Non-proliferation and Disarmament (ICNND) has released an unclassified report exploring the possibility of cyber terrorists launching nuclear weapons. Ominous exploits include unreliable early warning sensors, unsecure nuclear weapons storage, transportation blunders, breaches in the chain of command, and the use of Windows on nuclear submarines. A traditional large-scale terrorist attack, such as the 2008 Mumbai attacks, could be combined with computer network operations in an attempt to start a nuclear war. Amidst the confusion of the traditional attack, communications could be disrupted, false declarations of war could be issued on both sides, and early warning sensors could be spoofed. Adding to this is the short time frame in which a retaliatory nuclear response must be decided upon, in some cases as little as 15 minutes. The amount of firepower that could be unleashed in these 15 minutes would be equivalent to approximately 100,000 Hiroshima bombs."
Medicine

Secrets of Schizophrenia and Depression "Unlocked" 334

Oracle Goddess writes "According to the US National Institute for Mental Health in Bethesda, Maryland, scientists have discovered a remarkable similarity between the genetic faults behind both schizophrenia and manic depression in a breakthrough that is expected to open the way to new treatments for two of the most common mental illnesses, affecting millions of people. Previously schizophrenia and depression were assumed to be two separate conditions, but the new research shows for the first time that both have a common genetic basis that leads people to develop one or the other of the two illnesses."
NASA

NASA Wants to Take the Blast Out of Sonic Booms 187

coondoggie writes to tell us that NASA and JAXA (the Japan Aerospace Exploration Agency) have announced a partnership to study the sonic boom. Hoping to find the key to the next generation of supersonic aircraft, the research will include a look at JAXA's "Silent Supersonic Technology Demonstration Program." "The change in air pressure associated with a sonic boom is only a few pounds per square foot -- about the same pressure change experienced riding an elevator down two or three floors. It is the rate of change, the sudden onset of the pressure change, that makes the sonic boom audible, NASA said. All aircraft generate two cones, at the nose and at the tail. They are usually of similar strength and the time interval between the two as they reach the ground is primarily dependent on the size of the aircraft and its altitude. Most people on the ground cannot distinguish between the two and they are usually heard as a single sonic boom. Sonic booms created by vehicles the size and mass of the space shuttle are very distinguishable and two distinct booms are easily heard."
Bug

Crashing an In-Flight Entertainment System 322

rabblerouzer writes "Hugh Thompson, who was interviewed by Slashdot on the dangers of e-voting, now has a cool blog entry on how he was able to bring down the gaming/movie console on an airplane. He calls it one of the most interesting examples of a software 'abuse case' he has ever seen." Fortunately the IFE system is totally disjoint from the avionics.
Music

Dead Musicians Signing Media Rights Petitions 357

epeus writes "Following from the Gowers coverage and the Musicians' ad in the FT, Larry Lessig admits he was wrong about term extension: 'If you read the list, you'll see that at least some of these artists are apparently dead (e.g. Lonnie Donegan, died 4th November 2002; Freddie Garrity, died 20th May 2006). I take it the ability of these dead authors to sign a petition asking for their copyright terms to be extended can only mean that even after death, term extension continues to inspire. I'm not yet sure how. But I guess I should be a good sport about it, and just confess I was wrong. For if artists can sign petitions after they've died, then why can't they produce new recordings fifty year ago?'"
Security

The Case for OpenID 229

An anonymous reader writes "VeriSign and NetMesh are making the case for OpenID, the grass-roots, decentralized digital identity system already supported by LiveJournal, Six Apart, Technorati, VeriSign and many startups, reportedly growing 5% every single week. They say OpenID 'is fundamentally different from other identity technologies' because it is a 'fully decentralized system' and has a 'much lighter cost structure' than any alternative, like Microsoft Passport, CardSpace or Liberty Alliance. Time to remove username and password from your site and add OpenID libraries instead, so visitors can authenticate with their blog URL?" From the article: "If tomorrow, for example, you decide you don't like the Diffie-Hellman cryptographic key exchange at the root of OpenID authentication, you can develop your own way of authenticating, and deploy it within the OpenID framework. If you have an idea for a new identity-related service that nobody else ever thought of, you can deploy it into the OpenID framework as soon as your code is ready. This radical decentralization on all levels of the stack, both technically and organizationally, is a very strong catalyst for attracting innovators and their innovations. This makes OpenID a superior choice for identity-related innovation."

Why Upper Management Doesn't "Get" IT Security 126

Schneier is reporting that the Department of Homeland Security has decided to delve into why upper management doesn't "get" IT security threats. The results aren't terribly surprising to those in the trenches, stating that most executives view security as something akin to facilities management. "Thankfully", the $495 report (if you aren't a "Conference Board associate") helps tell you how to handle the situation.

How Many Windows? 327

youthoftoday asks: "As part of a recent piece of coursework (I'm a student) I talked to a number of people about how many windows they typically have open at any one time. I received a startling range of responses, and that got me thinking about what people consider a 'normal' working environment in terms of the number of windows they have open and what they like to get done. I usually have about 25 windows open and about 15 tabs in my browser (over two monitors) as a standard working environment in Mac OS X. I usually keep a set of windows in position for about 5 days between restarts. Others prefer to close windows for applications they're not using right at this minute. And we all know people who are scared to have more than one window open. So, how do Slashdot readers use their OSes?"

Throwable Game Controllers 92

dptalia writes "In trolling recent patents, Barry Fox found one for a throwable game controller. This controller would be shaped like a football or a frisbee and be connected wirelessly to a console. The user could then play digital games like catch, or have a distance throwing competition. The controllers have embedded GPS, an altimeter, and an accelerometer to be able to determine the accuracy of the throws."

Comment Teach (Score 1) 737

I'm sure most of the crackers (script kiddies) don't have the faintest idea of the consequences of their actions. To them, the remote system is just another system, another command processor that they can control.

Also, the idea that what they're doing is illegal doesn't sink in; it's only recognised superficially.

I'd say, find alternative sentences that shows the consequences of breaking in. Four weeks of miscellaneous chores in a backup tape factory, reinstalling systems that were broken in to, or something.

Also, make sure beforehand that everyone knows that cracking a system means downtime, a lot of work to reinstall, and consequential damages. All that, even if nothing was broken, because the sysadmin has to reinstall anyway just to be safe.

That being said, I think some responsible cracking should be permissible under some strict conditions (don't break anything, report the security hole, inform the victim), maybe to prove that there actually is a hole. My ISP (XS4ALL) have some rules (Dutch, sorry) on this.

Slashdot Top Deals

If you hype something and it succeeds, you're a genius -- it wasn't a hype. If you hype it and it fails, then it was just a hype. -- Neil Bogart

Working...