Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment Re:So stupid it's got to be official. (Score 4, Informative) 106

I know it's bad form to RTFA, but here's the part where they talk about their current inability to properly decrypt the payload:

The malware uses that configuration to generate a key to unlock the payload and unleash it. Once it finds the configuration itâ(TM)s looking for, it uses that configuration data to perform 10,000 iterations of MD5 to generate a 128-bit RC4 key, which is then used to decrypt the payload. âoeUnless you meet these specific requirements, youâ(TM)re not going to generate the right key to decrypt it,â Schoewenberg says.

Comment Not quite true (Score 3, Informative) 245

What actually happened was that the State Department purchased some anti-Al-Qaeda ads to run when certain key terms were also on the screen, similar to how AdWords works. It's a pretty interesting concept, really - the necessity of displaying advertising on a site can open the door for alternative messages/realities to reach the viewer.

Comment Nice discussion... (Score 1) 338

What I used to love about slashdot was the discussions that would result from articles and questions. But now everyone just jumps down the submitter's throat (though part of that is deserved in this case, especially coming from a brand-new account) if the question isn't phrased properly. Yes, censorship is bad, clandestine monitoring is bad, we should all trust each other, etc. but we all know that isn't the case. Only by offering solutions can we help improve our collective level of problem-solving. For example, I'm already thinking about several ways around this: is there any way to stop a user from using a VPN (or use your monitoring solution to impersonate one), and how are you going to deal with SSL traffic?

Comment Simple solution (Score 1) 78

Yes, it's too simple to actually work, but after data breaches like this, Epsilon should be required to publish all the data that was compromised. It devalues the data held by the malicious entity (a deterrent against future attacks), and allows security personnel to more accurately gauge the risk and present additional strategies for mitigation. Any action that reduces the value of these databases is a step in the right direction.

Comment Re:Open Office Gave Up "Anonymous" Alex Tapanaris (Score 1) 263

I don't think it's a matter of being "well-intentioned" software. One nice feature to add to publishing software would be a "redact metadata" option for publishers. Also, the type of metadata in this case is laughably easy to spoof and cannot be relied upon - why wouldn't I register my desktop publishing software with the name of an enemy?
Data Storage

Building a Searchable Literature Archive With Keywords? 211

Sooner Boomer writes "I'm trying to help drag a professor I work with into the 20th century. Although he is involved in cutting-edge research (nanotechnology), his method of literature search is to begin with digging through the hundreds of 3-ring binders that contain articles (usually from PDFs) that he has printed out. Even though the binders are labeled, the articles can only go under one 'heading' and there's no way to do a keyword search on subject, methods, materials, etc. Yeah, google is pretty good for finding stuff, as are other on-line literature services, but they only work for articles that are already on-line. His literature also includes articles copied from books, professional correspondence, and other sources. Is there a FOSS database or archive method (preferably with a web interface) where he could archive the PDFs and scanned documents and be able to search by keywords? It would also be nice to categorize them under multiple subject headings if possible. I know this has been covered ad nauseum with things like photos and the like, but I'm not looking at storage as such: instead I'm trying to find what's stored."

Comment Tinfoil hat time (Score 1) 332

So Comcast offers ultra-fast speeds at a ridiculous price. Rich p2p pirates purchase this service, get tracked, and get sued.

This could also lead to "harder" GB caps at lower tiers, encouraging users to bump up to a more expensive service.

While I think better last-mile speeds are important, I can't see many "residential" customers willing to pay $100 more per month for increased bandwidth - if you really need that much, you probably already have a business account. There just aren't existing net applications which gain significant performance advantages at these speeds (though I'm sure they're coming).

Slashdot Top Deals

All constants are variables.

Working...