Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:So stupid it's got to be official. (Score 4, Informative) 106

I know it's bad form to RTFA, but here's the part where they talk about their current inability to properly decrypt the payload:

The malware uses that configuration to generate a key to unlock the payload and unleash it. Once it finds the configuration itâ(TM)s looking for, it uses that configuration data to perform 10,000 iterations of MD5 to generate a 128-bit RC4 key, which is then used to decrypt the payload. âoeUnless you meet these specific requirements, youâ(TM)re not going to generate the right key to decrypt it,â Schoewenberg says.

Comment Not quite true (Score 3, Informative) 245

What actually happened was that the State Department purchased some anti-Al-Qaeda ads to run when certain key terms were also on the screen, similar to how AdWords works. It's a pretty interesting concept, really - the necessity of displaying advertising on a site can open the door for alternative messages/realities to reach the viewer.

Comment Nice discussion... (Score 1) 338

What I used to love about slashdot was the discussions that would result from articles and questions. But now everyone just jumps down the submitter's throat (though part of that is deserved in this case, especially coming from a brand-new account) if the question isn't phrased properly. Yes, censorship is bad, clandestine monitoring is bad, we should all trust each other, etc. but we all know that isn't the case. Only by offering solutions can we help improve our collective level of problem-solving. For example, I'm already thinking about several ways around this: is there any way to stop a user from using a VPN (or use your monitoring solution to impersonate one), and how are you going to deal with SSL traffic?

Comment Simple solution (Score 1) 78

Yes, it's too simple to actually work, but after data breaches like this, Epsilon should be required to publish all the data that was compromised. It devalues the data held by the malicious entity (a deterrent against future attacks), and allows security personnel to more accurately gauge the risk and present additional strategies for mitigation. Any action that reduces the value of these databases is a step in the right direction.

Comment Re:Open Office Gave Up "Anonymous" Alex Tapanaris (Score 1) 263

I don't think it's a matter of being "well-intentioned" software. One nice feature to add to publishing software would be a "redact metadata" option for publishers. Also, the type of metadata in this case is laughably easy to spoof and cannot be relied upon - why wouldn't I register my desktop publishing software with the name of an enemy?
Data Storage

Building a Searchable Literature Archive With Keywords? 211

Sooner Boomer writes "I'm trying to help drag a professor I work with into the 20th century. Although he is involved in cutting-edge research (nanotechnology), his method of literature search is to begin with digging through the hundreds of 3-ring binders that contain articles (usually from PDFs) that he has printed out. Even though the binders are labeled, the articles can only go under one 'heading' and there's no way to do a keyword search on subject, methods, materials, etc. Yeah, google is pretty good for finding stuff, as are other on-line literature services, but they only work for articles that are already on-line. His literature also includes articles copied from books, professional correspondence, and other sources. Is there a FOSS database or archive method (preferably with a web interface) where he could archive the PDFs and scanned documents and be able to search by keywords? It would also be nice to categorize them under multiple subject headings if possible. I know this has been covered ad nauseum with things like photos and the like, but I'm not looking at storage as such: instead I'm trying to find what's stored."

Comment Tinfoil hat time (Score 1) 332

So Comcast offers ultra-fast speeds at a ridiculous price. Rich p2p pirates purchase this service, get tracked, and get sued.

This could also lead to "harder" GB caps at lower tiers, encouraging users to bump up to a more expensive service.

While I think better last-mile speeds are important, I can't see many "residential" customers willing to pay $100 more per month for increased bandwidth - if you really need that much, you probably already have a business account. There just aren't existing net applications which gain significant performance advantages at these speeds (though I'm sure they're coming).

Submission + - KDE 4.0 Beta 1 Released (kde.org)

An anonymous reader writes: August 2, 2007 (The INTERNET). The KDE Community is happy to announce the immediate availability of the first Beta release for KDE 4.0. This release marks the beginning of the integration process which will bring the powerful new technologies included in the now frozen KDE 4 libraries to the applications. Almost two months after the foundations of KDE 4 have been laid with the first alpha, KDE enters the stage of a full freeze of the library interface. From now on, the applications will focus on integrating the new technology refined during the last months, and the library developers will try to fix all bugs found during this process. No new applications will enter the official KDE modules and usability and accessibility work is of course an ongoing process. In the following weeks KDE developers will be able to add features to their applications until the next beta is released and the application features will be frozen as well.
The Internet

Submission + - Pirate Bay earns 20,000 Euros a day (rixstep.com) 2

An anonymous reader writes: controverisal pro-piracy website the piratebay likes to portray itself as an innocent hobby site that provides a free index without censorship, but recent facts show that the site is earning up to 20,000 Euros per day from its advertising. Taking in money on this scale puts a different slant on the motives behind the Swedish filesharing site, and could open up the runners of the site to prosecution for profiting from copyright infringement.

Submission + - Gmail accounts hacked - no response from Google (livejournal.com)

jared51 writes: A few friends have recently had their Gmail accounts hacked, causing immense life complications. With Gmail storing all information (many people have a handy label "Accounts" making life easier) that has ever been emailed, a hijacker can easily move on to eBay, PayPal and credit card accounts to turn the crime into cash. Making matters worse, Google is impossible to contact by human. Hijacked users must contend with an endless series of forms.

Slashdot Top Deals

"You need tender loving care once a week - so that I can slap you into shape." - Ellyn Mustard